Nov 24, 2024  
2021-2022 Academic Catalog 
    
2021-2022 Academic Catalog [ARCHIVED CATALOG]

Add to Portfolio (opens a new window)

INT-2610 Computer Forensics II


Credits 4
The Computer Forensics II course provides excellent pathways for students to gain the knowledge and skills needed to enter the workforce or transfer to higher education institutions that offer undergraduate education in computers, cybersecurity, and digital forensics and related disciplines. Part 1 of the course emphasizes the proper handling of digital evidence, tools and techniques utilized in digital forensics analysis, the importance of appropriate documentation and report generation, and the laws and ethics governing evidence handling and chain of custody. The course provides a solid foundation to students in forensic investigation techniques. Students learn how to conduct an actual physical crime scene investigation in a hands-on practicum, perform live acquisition of digital evidence at the scene, examine the seized electronic evidence using forensic sound methods, and produce findings in an examiner’s report. Part 2 of the course emphasizes network intrusion discovery and analytics. Students learn operating systems, application and security log analytics. They also use a network analyzer to search for evidence of a compromise. The course objectives support the CompTIA Network + and CompTIA Security+ certifications. 
Prerequisite(s): INT-1700 and (INT-2450 or INT-1550 )
Formerly Formerly FOS-2610 Computer Forensics
Course Outcomes
 

  1. Perform installation, configuration, management, maintenance and troubleshoot forensics application software.
  2. Process crime and incident scenes appropriately, including live acquisition and recovery of evidence.
  3. Understand laws relating to forensics and crime scenes.
  4. Validate Cloud, Mobile, IoT, and Email forensics.
  5. Understand operating system file systems: Mac, Windows, and Linux.
  6. Recover encrypted and deleted data.
  7. Analyze system, application and security logs.
  8. Utilize a network and a forensic analyzer to search for indicators of a compromise.




Add to Portfolio (opens a new window)