|
Jul 08, 2025
|
|
|
|
INT-2600 Computer Forensics
Credits: 3 In this course, students are introduced to computer forensic investigation techniques. Students discuss the importance of appropriate documentation and learn how to write reports about forensic findings. Students also examine the laws and ethics governing evidence handling and chain of custody. They learn how to properly set up a forensic environment and use tools and techniques in digital forensics analysis to properly handle evidence. Students explore operating system file systems, applications, and security log analytics on Mac, Windows, and Linux operating systems. In addition, they learn about network intrusion discovery and analytics, including the recovery of encrypted or deleted files. Students also use a network analyzer to search for and validate evidence of a compromise on cloud, mobile, IoT, and email platforms. Students apply what they learn during practice techniques and procedures in a simulated physical crime scene, where they perform live acquisition of digital evidence at the scene, examine seized electronic evidence using sound forensics methods, and produce findings in an examiner’s report.
The content in this course provides students with the foundational knowledge and skills to prepare for CompTIA Network + and CompTIA Security+ certification exams. However, adequate preparation for the CompTIA Network + and CompTIA Security+ certification exams will require additional independent study.
This credit course may also be taken as continuing education course TEC-710 Computer Forensics.
Prerequisite(s): INT-1010 .
Course Outcomes
- Perform installation, configuration, management, maintenance and troubleshooting of forensics application software
- Process crime and incident scenes appropriately, including live acquisition and recovery of evidence and report writing
- Discuss laws and ethics relating to crime scenes and forensic evidence
- Validate evidence of a digital compromise on the Cloud, Mobile, IoT, and Email platforms
- Compare and contrast security log analytics on macOS, Windows, and Linux machines
- Recover encrypted and deleted data
Add to Portfolio (opens a new window)
|
|