Refer to Discussion Forum, Facilitator Introduction and Expectations
CIT 435 - Cyber Forensics
Introduces the principles and practices of digital forensics including digital investigations, data and file recovery methods, and digital forensics analysis and invalidation. Topics include data acquisition, digital forensics tools, virtual machines, network, mobile devices and cloud forensics.
Prerequisite(s): CIT 331.
Many people do not know that the scientific discipline of computer forensics is gaining prominence, and rapidly becoming essential to recovering evidence that is so vital to pursuing justice for all persons. This course focuses on the use of the most popular forensics tools and provides specific guidance on dealing with civil and criminal matters relating to the law and technology. Includes discussions on how to manage a digital forensics operation in today’s business environment.
Key concepts to be covered in this course
Upon completion of this course, learners should be able to:
Nelson, B., Phillips, A., & Steuart, C. (2016). Guide to Computer Forensics and Investigations (5th ed.). Boston, MA: CENGAGE Learning. ISBN 1-285-06003-2, 978- 1-285-06003-3.
American Psychological Association. (2010). Publication Manual of the American Psychological Association (6th ed.). Washington, DC: American Psychological Association. ISBN 1433805618, 978-1433805615. Companion website: http://www.apastyle.org.
The labs are designed to run as a virtualized computer using a software package such as VMware, Parallels, or VirtualBox. You must have up to date virus protection software on your computer. If your computer does not meet any of these requirements, please contact the instructor immediately. Minimum Requirements for Virtualization • 1 GHz processor (2 GHz or higher recommended)
Online Format: Sign on to WorldClass (D2L) and become familiar with the course navigation.
Classroom-based Format: Read chapters 1 & 2 from the textbook
Classroom-based Format: This assignment is due the first night of class.
Online Format: The instructor will specify the due date for this assignment.
Week | Readings | Graded Assignments or Assessments (Percentage) |
---|---|---|
1: Introduction to Cyber Forensics | Text: Ch. 1 & 2 | Class Discussion:
|
2: Processing Crime and Incident Scenes | Text: Ch. 3 &4 | Class Discussion: • Weekly Discussion Forum (25 pts) Written Assignment: • When Search Warrants are Not Required for Searches and Seizures - Paper (100 pts) |
3: File Systems | Text: Ch. 5 & 7 | Class Discussion: • Weekly Discussion Forum (25 pts) Written Assignment: • Hidden and Deleted Evidence - Paper (100 pts) |
4: Cyber Forensics Tools | Text: Ch.6 & 8 | Class Discussion: • Weekly Discussion Forum (25 pts) Written Assignment: • Examination Processes and Validated Tools in Cyber Forensics - Paper (100 pts) |
5: Digital Forensics Analysis and Validation | Text: Ch. 9 | Class Discussion: • Weekly Discussion Forum (25 pts) Written Assignment: • Best Practices for Cyber Forensics - Paper (100 pts) • Lab (50 pts) |
6: Network and Cloud Forensics | Text: Ch.10 & 13 | Class Discussion: • Weekly Discussion Forum (25 pts) Written Assignment: • Network Types and Forensic Artifacts and Tools - Paper (100 pts) |
7: Email, Social Media, and Mobile Device Forensics | Text: Ch.11 & 12 | Class Discussion: • Weekly Discussion Forum (25 pts) Written Assignment: • Mobile Phone Forensics - Paper (100 pts) |
8: The Professional Cyber Forensics Expert | Text: Ch. 14, 15 & 16 | Class Discussion: • Weekly Discussion Forum (25 pts) Written Assignment: • Cyber Forensics Critical Elements : Final Written Paper (250 pts) |
Maximum Points Possible: 1100 |
Assignments | Weighted Percentage |
---|---|
Weekly Discussion Threads | 20% |
Weekly Assignments | 80% |
TOTAL | 100 % |
Review the CCIS Policies on the Regis University website.
NOTE TO LEARNERS: On occasion, the course facilitator may, at his or her discretion, alter the Learning Activities shown in this Syllabus. The alteration of Learning Activities may not, in any way, change the Learner Outcomes or the grading scale for this course as contained in this syllabus. Examples of circumstances that could justify alterations in Learning Activities could include number of learners in the course; compelling current events; special facilitator experience or expertise; or unanticipated disruptions to class session schedule.