Digital forensics Unit number: 30 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: D/601/1939.
|
|
|
- Arline Reeves
- 9 years ago
- Views:
Transcription
1 Unit title: Digital forensics Unit number: 30 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: D/601/1939 UNIT AIM AND PURPOSE To provide learners with an understanding of digital forensics in social and commercial environments. The learner will explore current computer forensic techniques and apply these to an investigation and analyse their findings.
2 LEARNING OUTCOMES AND ASSESSMENT CRITERIA A pass grade is achieved by meeting all the requirements in the assessment criteria. Learning Outcome (LO) Pass The assessment criteria are the pass requirements for this unit. The Learner will: LO1 Understand the impact of digital forensics on the social and commercial environments The Learner can: 1.1 evaluate current forensic practice 1.2 discuss the potential impact of a forensic investigation 1.3 discuss the impact of motivation, data manipulation and malware LO2 Understand the principles of evidence gathering 2.1 discuss the principles of evidence gathering 2.2 evaluate current evidence gathering practices and assess their impact LO3 Be able to plan and implement digital forensics investigations 3.1 based on a given scenario, plan a digital forensics investigation 3.2 implement a digital forensics investigation 3.3 systematically record each process during investigation LO4 Be able to analyse the outcomes of digital forensics investigations 4.1 present findings of forensics investigation 4.2 critically review and analyse findings
3 GRADING CRITERIA A merit grade is achieved by meeting all the requirements in the pass criteria and the merit descriptors. A distinction grade is achieved by meeting all the requirements in the pass criteria and the merit descriptors and the distinction descriptors. Merit Criteria (M1, M2, M3) (M1, M2, and M3 are mandatory to achieve a merit grade. Each must be achieved at least once per unit to achieve a merit grade.) Distinction Criteria (D1, D2, D3) (D1, D2, and D3 are mandatory to achieve a distinction grade. Each must be achieved at least once per unit to achieve a distinction grade.) (In order to achieve a distinction grade, all merit criteria must also have been achieved.) MANDATORY TO ACHIEVE A MERIT GRADE M1 Analyse concepts, theories or principles to formulate own responses to situations. M2 Analyse own knowledge, understanding and skills to define areas for development. M3 Exercise autonomy and judgement when implementing established courses of action. MANDATORY TO ACHIEVE A DISTINCTION GRADE D1 Evaluate approaches to develop strategies in response to actual or anticipated situations. D2 Evaluate and apply strategies to develop own knowledge, understanding and skills. D3 Determine, direct and communicate new courses of action.
4 TEACHING CONTENT The Teaching Content describes what has to be taught to cover all Learning Outcomes. Learners must be able to apply relevant examples to their work although these do not have to be the same as the examples specified. LO1 Understand the impact of digital forensics on the social and commercial environments Digital Threat Social impact Commercial impact Storage devices, operating systems, forensic analysis, how data is stored, networks, hiding techniques Virus, Trojan, worm, spyware, screen recorder, manipulation of customers e.g. loss of confidence, loss of access, financial loss to customers e.g. financial implications, customer confidence, corporate image. LO2 Understand the principles of evidence gathering Tools Evidence Evidence preservation, software applications packages available e.g. EnCase, LinEn, legislation, civil action Legal authorities both international and local, records, system images, interviewing witnesses. LO3 Be able to plan and implement digital forensics investigations Imaging Network Planning Maintain data integrity, range of storage devices, data recovery Topology, network security, hexadecimal, binary and IP addressing, traffic monitoring, intrusion detection, workstation forensics Legal authorities, legal representatives, corporate personnel, record keeping, time line, evidence gathering, best practice for preserving evidence. LO4 Be able to analyse the outcomes of digital forensics investigations Findings Recommendations Evidence, issues, records, impartial information, legal proceedings Amendments to policies and procedures, staff issues, legal implications.
5 GUIDANCE Delivery guidance It will be beneficial to deliver this unit in a way that uses actual events, industry forecasts or sector specific contexts which offer the learner the opportunity to explore, develop and apply the fundamental principles of the sector or subject area. Typical delivery contexts could include guest speakers and industrial visits. Learners will benefit from being encouraged to exercise autonomy and judgement to analyse case studies, adapt their thinking and reach considered conclusions when evaluating the impact of digital forensics on social and commercial environments. Learners would benefit from being presented with subject/sector-relevant problems from a variety of perspectives, and being given the opportunity to explore them using diverse approaches and schools of thought. For example, industrial visits to see a range of investigations being carried out. Assessment evidence guidance Evidence must be produced to show how a learner has met each of the Learning Outcomes. This evidence could take the form of assignments, project portfolios, presentations or, where appropriate, reflective accounts. Where group work/activities contribute to assessment evidence, the individual contribution from each learner must be clearly identified. All evidence must be available for the visiting moderator to review. Where learners are able to use real situations or observations from work placement, care should be taken to ensure that the record of observation accurately reflects the learner s performance. This should be signed, dated, and included in the evidence. It is best practice to record another individual s perspective of how a practical activity was carried out. Centres may wish to use a witness statement as a record of observation. This should be signed and dated and included in the evidence.
6 RESOURCES Books Britz, Marjie, Computer Forensics and Cyber Crime: An Introduction, Prentice Hall, 2003, ISBN Jones, Keith J., Bejtlich, Richard,. Rose, Curtis W., Farmer, Dan., Venema, Wietse., Carrier, Brian., Computer Forensics Library, Addison-Wesley Educational Publishers Inc, 2007, ISBN Laykin, Erik., Investigative Computer Forensics: The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives, John Wiley & Sons Ltd, 2013, ISBN Bunting, Steve., EnCase Computer Forensics - The Official EnCE: EnCase Certified Examiner Study Guide, John Wiley & Sons Ltd, 2012, ISBN Altheide, Cory., Carvey, Harlan., Digital Forensics with Open Source Tools: Using Open Source Platform Tools for Performing Computer Forensics on Target Systems: Windows, Mac, Linux, Unix, Etc. Syngress Media, 2011, ISBN Solomon, Michael G., Rudolph, K., Tittel, Ed., Broom, Neil., Barrett, Diane., Computer Forensics JumpStart, John Wiley & Sons Ltd, 2011, ISBN Journals The International Journal of Forensic Computer Science, Print ISSN: Online ISSN: Websites Computer Forensics, Malware Analysis & Digital Investigations
Information systems in organisations Unit number: 2 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: M/601/1444
Unit title: Information systems in organisations Unit number: 2 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: M/601/1444 UNIT AIM AND PURPOSE The purpose of this unit is to
Local Area Networking technologies Unit number: 26 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: L/601/1547
Unit title: Local Area Networking technologies Unit number: 26 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: L/601/1547 UNIT AIM AND PURPOSE Learners will gain an understanding
Oxford Cambridge and RSA
Oxford Cambridge and RSA Unit title: Employability skills Unit number: 27 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: A/601/0992 UNIT AIM AND PURPOSE This unit will enable
Networking infrastructure Unit number: 25 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: A/601/1964.
Unit title: Networking infrastructure Unit number: 25 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: A/601/1964 UNIT AIM AND PURPOSE This unit will enable learners to understand
Cambridge TECHNICALS. OCR Level 3 CAMBRIDGE TECHNICAL SPORT F/502/5774 GUIDED LEARNING HOURS: 60
Cambridge TECHNICALS OCR Level 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA in SPORT Organising Sports Events F/502/5774 LEVEL 3 UNIT 19 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 Organising Sports Events
OCR LEVEL 3 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT COMPUTER NETWORKS R/601/7320 LEVEL 3 UNIT 7 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 COMPUTER NETWORKS R/601/7320 LEVEL
DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM
DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM Proposed Program Title: Bachelor of Science in Computing Science- Specialization in Digital Forensics Specialization
Oxford Cambridge and RSA
Oxford Cambridge and RSA Unit title: Principles of health and social care practice Unit number: 21 Level: 5 Credit value: 15 Guided learning hours: 60 Unit reference number: Y/601/1566 UNIT AIM AND PURPOSE
Discuss the ethical, moral and professional issues relating to computer security, ethical hacking and incident response.
Unit Information Form (UIF) UIF1011 The UIF provides essential information to students, staff teams and others on a particular unit. Please refer to the University s Guidance notes on Unit Information
The Basics of Digital Forensics; John Sammons; Syngress, 2011; ISBN-13: 978-1-59749-662-9
COURSE OUTLINE COURSE NUMBER: DIT 33003 1201 COURSE NAME: INSTRUCTOR: INSTRUCTOR CONTACT: COMPUTER FORENSICS GIDZAK Provided in class. DATES & TIMES: March 18-28, 2013, Mon-Thu (8 classes) 9:00am 12:00pm
CIS 4203 IT Forensics & Investigations Summer C
CIS 4203 IT Forensics & Investigations Summer C Course Abstract: This course offers an introduction to system forensics investigation and response. Areas of study include procedures for investigating computer
Cambridge TECHNICALS. OCR Level 2 CAMBRIDGE TECHNICAL SPORT T/502/5528 GUIDED LEARNING HOURS: 60
Cambridge TECHNICALS OCR Level 2 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA in SPORT Lifestyle and the Sports Performer T/502/5528 LEVEL 2 UNIT 6 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 Lifestyle
Unit 13 Social media and digital marketing
2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 13 Social media and digital marketing D/507/5016 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 13: Social media and digital
Tuskegee University Department of Computer Science Course No: CSCI 390 (Computer Forensics) Fall 2011 - MWF 1:00-2:300, BRIM 301
Tuskegee University Department of Computer Science Course No: CSCI 390 (Computer Forensics) Fall 2011 - MWF 1:00-2:300, BRIM 301 Instructor: Dr. C. L. Chen Office: In the office complex Phone: 727-8554
Computer Networks. Credit value: 10 Guided learning hours: 60. Aim and purpose. Unit introduction. Learning outcomes
Unit 9: Computer Networks Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 60 Aim and purpose R/601/7320 BTEC National The aim of this unit is to ensure learners understand the key components
OCR LEVEL 3 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY
EC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
Unit 22 Big Data analytics
2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 22 Big Data analytics F/507/5025 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 22: Big Data analytics F/507/5025 Guided learning
Masters in Applied Cyber Security Upskilling Existing Employees
Masters in Applied Cyber Security Upskilling Existing Employees Origination The Masters in Applied Cyber Security (MACS) emerged from discussions at the Steering Group of ICT Ireland Skillnet where companies
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics
RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY-274 Privacy, Ethics & Computer Forensics I. Basic Course Information A. Course Number & Title: CISY-274 - Privacy, Ethics, & Computer Forensics B. New
OCR LEVEL 3 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT ORGANISATIONAL SYSTEMS SECURITY T/601/7312 LEVEL 3 UNIT 5 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 ORGANISATIONAL SYSTEMS
Syllabus: AIT 671 - Information Systems Infrastructure Lifecycle Management
Syllabus: AIT 671 - Information Systems Infrastructure Lifecycle Management Term: Fall 2013 Instructor: Jay Holcomb, Adjunct Faculty, Department of Applied Information Technology, Volgenau School of Engineering
Computer Hacking Forensic Investigator v8
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Computer Hacking Forensic Investigator v8 Course Description: EC-Council releases the most advanced Computer
Course Design Document. Information Security Management. Version 2.0
Course Design Document Information Security Management Version 2.0 January 2015 Table of Content 1 Versions History... 3 2 Overview of Security and Trust Course... 4 Synopsis... 4 2.1 Prerequisites...
DATA RECOVERY SOLUTIONS EXPERT DATA RECOVERY SOLUTIONS FOR ALL DATA LOSS SCENARIOS.
ITM 642: Digital Forensics Sanjay Goel School of Business University at Albany, State University of New York
INSTRUCTOR INFORMATION Name: Sanjay Goel Email: [email protected] Phone: (518) 442-4925 Office Location: BA 310b, University at Albany Office Hours: TBD CLASS INFORMATION Time: N/A Location: Online Dates:
Qualification Specification
BCS Level 2 ECDL Certificate in IT Application Skills (QCF) 600/6943/0 Version 1.4 March 2016. Contents 1. About BCS 3 2. Equal Opportunities 3 3. Introduction to the qualification 4 3.1 Qualification
T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes
T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes * The graduate has reliably demonstrated the ability to 1. analyze and resolve information
STATE OF CYBER SECURITY IN ETHIOPIA
ETIOPIAN TELECOMMUNICATIONS AGENCY STATE OF CYBER SECURITY IN ETHIOPIA By Mr. Balcha Reba Ethiopian Telecommunications Agency Standards and Inspection Department Head, Standards Division email: [email protected]
DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,
DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE Vahidin Đaltur, Kemal Hajdarević, Internacional Burch University, Faculty of Information Technlogy 71000 Sarajevo, Bosnia
Computer Forensics Preparation
Computer Forensics Preparation This lesson covers Chapters 1 and 2 in Computer Forensics JumpStart, Second Edition. OBJECTIVES When you complete this lesson, you ll be able to Discuss computer forensics
Marketing for Hospitality
Unit 18: Marketing for Hospitality Unit code: T/601/0487 QCF Level 3: BTEC National Credit value: 10 Guided learning hours: 60 Aim and purpose The aim of this unit is to enable learners to gain knowledge
MEDIA OCR LEVEL 2 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS PRINT MEDIA PRODUCTION CERTIFICATE/DIPLOMA IN T/504/0529 LEVEL 2 UNIT 30
Cambridge TECHNICALS OCR LEVEL 2 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN MEDIA PRINT MEDIA PRODUCTION T/504/0529 LEVEL 2 UNIT 30 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 PRINT MEDIA PRODUCTION
Managing Networks. Credit value: 10 Guided learning hours: 60. Aim and purpose. Unit introduction. Learning outcomes
Unit 5: Managing Networks Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 60 Aim and purpose K/601/7663 BTEC National The aim of this unit is to enable learners to understand network management
Planning, Organisation and Control of Resources in Construction and the Built Environment
Unit 7: Planning, Organisation and Control of Resources in Construction and the Built Environment NQF Level 3: Guided learning hours: 60 BTEC National Unit abstract A successful project requires careful
PREPARE YOUR INCIDENT RESPONSE TEAM
PREPARE YOUR INCIDENT RESPONSE TEAM JUNE 2015 Michael Harrington, Fidelis Cybersecurity It s a big problem... The ongoing cyber-thefts from The scale of international theft the In networks 2013, the of
St Michael s Primary School. ICT School Policy Data Protection and E Safety
St Michael s Primary School ICT School Policy Data Protection and E Safety FGB 2013 St. Michael s C.E. Primary School Policy Information Communication Technology This policy document sets out St Michael's
Participate in Business Planning and Improvement in the Land-based Sector
Unit 14: Participate in Business Planning and Improvement in the Land-based Sector Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 60 Aim and purpose F/600/9701 BTEC National This unit
UNIT 1: WORKING AS A TEAM IN HEALTH AND SOCIAL CARE (LEVEL 1)
UNIT 1: WORKING AS A TEAM IN HEALTH AND SOCIAL CARE (LEVEL 1) Learning outcomes By completing this unit, candidates will have the knowledge, understanding and skills to help them work as part of a team
Digital Industries Apprenticeship: Assessment Plan. Cyber Security Technologist. April 2016
Digital Industries Apprenticeship: Assessment Plan Cyber Security Technologist April 2016 1 Digital Industries Apprenticeships: Assessment Plan 1. General Introduction and Overview The apprenticeship Standard
Certified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
Level 3 Certificate in Retail Banking Conduct of Business (CertRBCB )
Level 3 Certificate in Retail Banking Conduct of Business (CertRBCB ) Qualification Specification Page 1 of 12 CONTENTS Page 1. Accreditation information 3 2. Aims of the CertRBCB 4 3. Learning outcomes
Introduction to Marketing
Unit 3: Introduction to Marketing Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 60 Aim and purpose Y/502/5411 BTEC National The aim and purpose of this unit is to give learners an understanding
How To Work For An Aviation Organisation
Unit 12: Human Resources in the Aviation Industry Unit code: R/504/2286 QCF Level 3: BTEC Nationals Credit value: 9 Guided learning hours: 54 Aim and purpose The aim of this unit is to give learners knowledge
GEARS Cyber-Security Services
Florida Department of Management Services Division of State Purchasing Table of Contents Introduction... 1 About GEARS... 2 1. Pre-Incident Services... 3 1.1 Incident Response Agreements... 3 1.2 Assessments
Computer Forensics. Computer Forensics: History, Tools and Outlooks. By John Burns IT-103-002. Research Paper
1 Computer Forensics: History, Tools and Outlooks By John Burns IT-103-002 Research Paper 02/25/2012 "By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code
Short courses presented by the NWU Programme in Forensic Accountancy
Short courses presented by the NWU Programme in Forensic Accountancy Certificate in: Commercial Forensic Accounting Commercial Forensic Law Commercial Forensic Investigation Commercial Forensic Information
Course Syllabus Revised: Dec. 20, 2011.
CFRS 663/TCOM 663 Operations of Intrusion Detection and Forensics Department of Electrical and Computer Engineering George Mason University Spring, 2012 Course Syllabus Revised: Dec. 20, 2011. Instructor
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12
Trends in Malware DRAFT OUTLINE Presentation Synopsis Security is often a game of cat and mouse as security professionals and attackers each vie to stay one step ahead of the other. In this race for dominance,
BUSINESS OCR LEVEL 3 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS BUSINESS PROJECT MANAGEMENT CERTIFICATE/DIPLOMA IN K/502/5459 LEVEL 3 UNIT 18
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN BUSINESS BUSINESS PROJECT MANAGEMENT K/502/5459 LEVEL 3 UNIT 18 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 BUSINESS PROJECT
Short courses presented by the NWU Programme in Forensic Accountancy
Short courses presented by the NWU Programme in Forensic Accountancy Certificate in: Commercial Forensic Accounting Commercial Forensic Law Commercial Forensic Investigation Commercial Forensic Information
Principles of ICT Systems and Data Security
Unit 14: Principles of ICT Systems and Data Security Unit code: L/601/3508 QCF Level 2: BTEC Specialist Credit value: 6 Guided learning hours: 45 Aim and purpose This unit introduces the common types of
Unit 3 Cyber security
2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours:
Course Syllabus - IST 454 Computer and Cyber Forensics General Course Information
General Course Information Department IST Number 454 Title Credits 3 Description Computer and Computer and communication technologies have become the key components to support critical infrastructure services
OCR Level 2 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR Level 2 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT IT security J/601/4057 LEVEL 2 UNIT 18 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 IT SECURITY J/601/4057 LEVEL 2 Aim
Health, Safety and Welfare in Construction and the Built Environment
Unit 1: Health, Safety and Welfare in Construction and the Built Environment NQF Level 3: Guided learning hours: 60 BTEC National Unit abstract Health, safety and welfare are of paramount importance to
Principles of Information Assurance Syllabus
Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information
Manchester City Council Role Profile. Service Manager (Database Analysis), Grade 9
Manchester City Council Role Profile Service Manager (Database Analysis), Grade 9 ICT Service, Corporate Core Directorate Reports to: Service Delivery Manager (IT Operations) Key Role Descriptors: Job
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
Information Systems and Tech (IST)
California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey
Qualification Specification
BCS Level 2 Certificate in IT User Skills (ECDL Core) Version 1.0 December 2015. Contents 1. About BCS 3 2. Equal Opportunities 3 3. Introduction to the qualification 4 3.1 Qualification summary 4 3.2
Keynote: FBI Wednesday, February 4 noon 1:10 p.m.
Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the
Security+ P a g e 1 of 5. 5-Day Instructor Led Course
P a g e 1 of 5 Security+ 5-Day Instructor Led Course Overview This course is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic
COURSE OUTLINE Survey of Operating Systems
Butler Community College Career and Technical Education Division Skyler Lovelace New Fall 2014 Implemented Spring 2015 COURSE OUTLINE Survey of Operating Systems Course Description IN 167. Survey of Operating
Network System Design Lesson Objectives
Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network
Researching Current Issues in Aviation
Unit 18: Researching Current Issues in Aviation Unit code: H/504/2292 QCF Level 4: BTEC Higher National Credit value: 10 Guided learning hours: 60 Aim and purpose The aim of this unit is to give learners
Short courses presented by the NWU Programme in Forensic Accountancy
Short courses presented by the NWU Programme in Forensic Accountancy Certificate in: Commercial Forensic Accounting Commercial Forensic Law Commercial Forensic Investigation Commercial Forensic Information
Some 10,000 people are employed in a business role in Swindon and this number is set to rise as demand increases for skilled business people
50 Call Student Services on: (01793) 498308 or visit www.swindon-college.ac.uk 50 Apply online: www.swindon-college.ac.uk Some 10,000 people are employed in a business role in Swindon and this number is
Quality Handbook. Part A: Governance and award frameworks. Section 3: Postgraduate (taught and research) awards. Section3. Nottingham Trent University
Nottingham Trent University Quality Handbook Part A: Governance and award frameworks Section 3: Postgraduate (taught and research) awards Contents Introduction... 2 Postgraduate taught award framework...
CYBER FORENSICS (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 CYBER FORENSICS (W/LAB) Course Syllabus Course Number: CSFS-0020 OHLAP Credit: Yes OCAS Code: 8134 Course Length: 130 Hours Career Cluster: Information
Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature
Demystifying Cyber Insurance Jamie Monck-Mason & Andrew Hill Introduction What is cyber? Nomenclature 1 What specific risks does cyber insurance cover? First party risks - losses arising from a data breach
Project Planning Using IT
Unit 4: Project Planning Using IT Unit code: A/601/3259 QCF Level 2: BTEC Specialist Credit value: 10 Guided learning hours: 60 Aim and purpose The aim of this unit is to introduce learners to the fundamental
QUALIFICATION HANDBOOK
QUALIFICATION HANDBOOK Level 2 Extended Certificate in Health Informatics (7450-12) February 2012 Version 1.0 Qualification at a glance Subject area City & Guilds number 7450 Health Informatics Age group
University of Cambridge: Programme Specifications POST-GRADUATE DIPLOMA IN PROPERTY INVESTMENT
University of Cambridge: Programme Specifications Every effort has been made to ensure the accuracy of the information in this programme specification. Programme specifications are produced and then reviewed
Business Continuity Policy. Version 1.0
Business Continuity Policy Version.0 January 206 Contents Contents Version control Foreword Policy. Scope.2 Aim and objectives.3 Methods and standards.4 Responsibilities.5 Governance.6 Training and exercises
PATCH MANAGEMENT POLICY IT-P-016
IT-P-016 Date: 28 th March, 2016 Stamford International University ( STIU ) Patch Management Policy Rationale Stamford International University ( STIU ) is responsible for ensuring the confidentiality,
BUSINESS OCR LEVEL 2 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS VERBAL AND NON-VERBAL COMMUNICATION IN BUSINESS CONTEXTS CERTIFICATE/DIPLOMA IN
Cambridge TECHNICALS OCR LEVEL 2 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN BUSINESS VERBAL AND NON-VERBAL COMMUNICATION IN BUSINESS CONTEXTS M/502/5303 LEVEL 2 UNIT 6 GUIDED LEARNING HOURS: 30 UNIT CREDIT
Unit 21 Web design and prototyping
2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 21 Web design and prototyping A/507/5024 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 21: Web design and prototyping A/507/5024
University Centre at Blackburn College. Abbreviated Programme Specification Containing Both Core + Supplementary Information
Abbreviated Programme Specification Containing Both Core + Supplementary Information The Degree consistently involves both employers in all stages of the programme delivery including design, delivery,
QAA Recognition Scheme for Access to Higher Education. The Access to Higher Education Diploma specification 2013
QAA Recognition Scheme for Access to Higher Education The Access to Higher Education Diploma specification 2013 Contents Preface 1 Using this document 1 The Access to HE Diploma 2 Qualification characteristics
C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR
1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge skills in computer
TEXT: Turvey, B. E. (2008). Criminal Profiling: An introduction to behavioral evidence analysis 3 rd Edition. New York: Elsevier, Inc.
CJ6600 CRIMINAL PROFILING SUMMER 2009 SYLLABUS (June 8, 2009 July 29 th, 2009) Instructor: Jack McGrath, Ph.D. Office: 1380 Lawrence Street Center Phone: (303) 960-4782 Email: [email protected]
Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA
Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA Mr. Rojas has over 25 years of information systems consulting, supervisory, managerial and executive experience in various industries. He is considered
ROYAL HOLLOWAY University of London PROGRAMME SPECIFICATION
ROYAL HOLLOWAY University of London PROGRAMME SPECIFICATION This document describes the Master of Science, Master of Science with a Year in Industry, Postgraduate Diploma, and Postgraduate Certificate
C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR
Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge
Understanding Floristry Marketing Strategies
Unit 20: Understanding Floristry Marketing Strategies Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 60 Aim and purpose D/602/0740 BTEC National This unit aims to introduce learners to
Information Systems. Credit value: 10 Guided learning hours: 60. Aim and purpose. Unit introduction. Learning outcomes
Unit 3: Information Systems Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 60 Aim and purpose H/601/7256 BTEC National The aim of this unit is to ensure learners understand how organisations
CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak
CSN08101 Digital Forensics Lecture 1A: Introduction to Forensics Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Digital Forensics You will learn in this module: The principals of computer
Internet Safety and Security: Strategies for Building an Internet Safety Wall
Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet
Workplace Practices and Procedures in Beauty-related Industries
Unit 3: Workplace Practices and Procedures in Beauty-related Industries Unit code: QCF Level 3: Credit value: 5 Guided learning hours: 37 Aim and purpose M/601/4456 BTEC Nationals This is a preparation
