COSC 4. 29: Digital Forensics - Computer Science. Prerequisites: COSC 1. From network security breaches to child pornography, the common bridge is the demonstration that particular electronic media contains incriminating evidence. Real world case studies will be used to provide a better understanding of security issues. Unique forensics issues associated with various operating systems including Linux/Windows operating systems and associated applications are covered. Upon completion of this course, students will be able to: Explain digital forensics and investigations on digital media. Identify relevant electronic evidence associated with various violations of specific laws, including, but not limited to, computer crimes. Locate and recover relevant electronic evidence from digital media using a variety of tools. Identify and articulate probable cause as necessary to obtain a warrant to search for electronic artifacts and recognize the limits of warrants. Explain the principles and practice of ethics and law for computer forensics investigators. Boston University continuing education graduate and undergraduate degree and certificate programs for professionals to help you achieve your career goals. Computer forensic schools offer the associate, bachelor?s or master?s level degrees in computer forensics. The online computer forensic schools offer diverse learning. AccessData is the leading provider of E-Discovery, Computer and Mobile Device Forensics for corporations, law firms and government agencies. SANS Computer Forensics Training Community: discover computer forensic tools and techniques for e-Discovery, investigation and incident response. Explain how to manage/conduct a computer crime investigation involving digital media. Follow a documented investigation process. Present the evidence and conclusions of an investigation in a report form. Describe core computer science theory necessary to perform computer forensics. Steps in preparing for evidence search. Performing a digital hash. Process of digital evidence acquisition Procedures for digital evidence acquisition. Digital evidence storage formats Acquisition tools. Validating data acquisitions. RAID acquisition methods. First Exam (1 hr)Computer science theory behind computer forensics (4 hrs) Windows and DOS file systems Microsoft file structures. The structure of NTFS disks. Windows Registry. Computer Forensics Library (3-Volume Boxed Set) Keith J. Jones, Richard Bejtlich, Curtis W. Rose, Dan Farmer, Wietse Venema, Brian Carrier.Microsoft and DOS start- up tasks. Forensics analysis in Window 1. Response data analysis Linux boot processes and file systems UNIX and Linux disk structures. UNIX and Linux boot processes. Other disk structures. Forensics analysis in Linux. Methods for performing evidence examination (4 hrs) Evidence examination procedure Physical/logical extraction Analysis of extracted data Data hiding techniques Recovering graphics files Types of graphics file formats. Types of data compression. Locating and recovering graphics files. Identifying unknown file formats. Copyright issues with graphics. Second Exam (1 hr) E- mail Investigations. Century College's Cybersecurity and Cloud computing program prepares students for careers in Cybersecurity, information assurance, computer incident, investigation. X-Ways Forensics 18.9. Downloadable only for customers (latest download instructions here) X-Ways Forensics is an advanced work environment for computer forensic. The exciting world of computer forensics offers many opportunities for those who love the blend of technology and the law. These computer forensics certifications are in demand in 2016. Find the most valuable certification for your career path on Tom's IT Pro. The role of e- mail in investigations Client and server roles in e- mail. Tasks in investigating e- mail crimes and violation. The use of e- mail server logs. Available e- mail computer forensics tools. Cell Phone and mobile device forensics Basic concepts of mobile device forensics Procedures for acquiring data from cell phones and mobile device. Evidence presentation (2 hrs) Procedures for documenting and reporting Guidelines for writing reports. Using forensics tools to generate reports. Ethical issues for computer forensics (3 hrs)Expert Testimony in High- Tech Investigations Guidelines for giving testimony as a technical/scientific or expert witness. Guidelines for testifying in court. Guidelines for testifying in dispositions and hearings. Procedures for preparing forensics evidence for testimony incident. Total: 4. 2 hours. Evaluation Methods The final grade will be determined by: Three Exams: 4. Group Project including final presentation: 4. Laboratory Projects: 1. Grading Scale A: > 9. B: 8. 0- 8. 9% C: 7. D: 6. 0- 6. 9% F: < 6. Attendance Policy The attendance policy will follow the guidelines as is given in the IUP Handbook. Guide to Computer Forensics and. Investigations, 3rd edition, Course Technology, 2. Jones, Keith J. Forensic Analysis of Internet Explorer Activity Files, http: //umn. IE. Forensics on the Windows Platform,Part One, http: //www. Cheng, Derek. Freeware Forensics Tools for Unix, http: //www. Leuenberger, Adrian. Windows Forensics - A Case Study: Part One, Security. Focus In. Focus. Article, Dec 2. Barish, Stephen. Windows Forensics - A Case Study: Part Two, Security. Focus In. Focus. Article, Mar 2. EC- Council, Computer Forensics: Hard Disk and Operating Systems, 1st Edition, Course Technology, 2. EC- Council, Computer Forensics: Investigating Data and Image Files, 1st. Edition, Course Technology, 2. Willassen, Svein Yngvar. Forensics and the GSM mobile telephone system, International Journal of Digital Evidence, Spring 2. A0. 65. 88. 58- BFF6- C5. CF8. 6A7. 8D6. DE7. D. pdf. Collins, Max Allan. CSI: Body of Evidence, Pocket Books, 2. Prosecuting Computer Crimes, Computer Crime & Intellectual Property Section, United States Department of Justice. Real Digital Forensics, Addison Wesley, 2. Davis C, Philipp, A, Cowen, D. Hacking. Exposed, Computer Forensics, Mc. Graw Hill, 2. 00. Altheide, C. Forensic Analysis of Windows Hosts using UNIX- based Tools. Digital Investigation, Sept. Carlin, A., Curl, S., Manson, D. To catch a thief: Computer forensics in the classroom. In Proceedings of the 2. Annual Information Systems Educators Conference, Association of Information Technology Professionals, Chicago, IL, 2. Harrison, W. The digital detective: An introduction to digital forensics. In Advances in Computers, vol. Academic Press. Yasinsac, A., Erbacher, R., Marks, D., Pollitt, M. Computer forensics education. IEEESecurity & Privacy, July/Aug.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
January 2017
Categories |