This course is designed for students that would like to learn about the emerging field of Computer Forensics. With high tech crime on the rise, students will be able to acquire skills to become proficient in conducting investigations and analyzing cybercrime cases. Forensics tools, methods and procedures for investigating computers. Data recovery techniques and evidence collection, protection of evidence, expert witness skills and computer crime investigation techniques. Analysis of various file systems and specialized diagnostic software to retrieve data. Prepares in part for CompTIA Security+ and maps to Computer Investigation Specialists exam. CSU transferrable.
Upon completion of this course, a student will be able to:
- Define and describe computer forensics investigations.
- Compare and contrast the various operating systems and file systems.
- Evaluate and choose appropriate software, hardware, and tools to equip a Forensics Lab.
- Retrieve and analyze data from a suspect's computer.
- Create investigative reports and act as an expert witness.
"Guide to Computer Forensics and Investigations", Sixth Edition, Bill Nelson, Amelia Phillips, Chris Steuart; ISBN; 978-1-337-56894-4
- In-class activity: Group discussions on current topics such as 1. Current crimes and legal issues 2. New forensic techniques 3. New hardware and security practices
- In-class activity: Hands~on lab projects such as I. Imaging a hard drive 2. Searching through a forensic image to find evidence 3. Using a forensic boot disk
- Out-of-class assignment: Readings from the textbook on topics such as 1. Investigative techniques 2. Hard drive formats 3. Court procedures
- Out-of-class assignment: Written reports that involve independent research on topics such as: 1. Current legal controversies 2. Privacy and law enforcement searches 3. New hardware and techniques
- Participation: Student contributions to in-class discussions
- Other: Graded hands-on projects
- Exams/Quizzes/Tests: Tests and/or quizzes on topics covered in out-of-class reading, such as: a. Use of forensics hardware and software b. Investigative techniques
- Written work: Written reports involving independent research
- Final Assessment: Comprehensive final exam on topics such as: a. Reading encrypted files b. Viewing and interpreting email headers c. Recovering passwords.
- Introduction - computer investigations in general
- Computer Forensics, definition and description
- Investigations, Law Enforcement and Corporate
- Securing evidence, copying the disk
- Analyzing the digital evidence
- Demonstration of correct procedures and methods.
- Windows, DOS, Macintosh, and Linux overview
- Disk partitions
- The Registry
- NTFS attributes
- EFS recovery agents (Encryption File System)
- DOS and Windows startup sequence.
- MacIntosh and Linux Disks
- Volumes, file systems
- Boot sequence, data structures
- A typical investigator's laboratory and tools
- The need for physical security
- Laptop forensics workstations
- Current computer forensics tools
- Command-line software tools
- Graphical interface tools
- Making a forensics boot floppy disk
- Retrieving evidence using a remote network connection
- Hardware tools
- Workstations
- Write Blockers
- Other common devices
- Gathering digital evidence
- Methods of data acquisition
- Using DOS tools
- Other acquisition tools and methods
- Identifying, securing, and cataloguing digital evidence
- Processing and handling evidence at a crime scene
- Storing and documenting digital evidence
- Analyzing digital data
- Addressing data hiding techniques
- Recovering passwords
- Examining encrypted files
- Email Investigations
- Copying and printing email messages
- Viewing email headers
- Examining server logs in Unix, Windows
- Writing investigation reports and being an expert witness
- Explaining the principal results in plain English, avoiding jargon
- Proper use of reports generated by forensic tools
- Declarations and affidavits