Introduction to Computer Forensics ITP 499 (3 Units)



Similar documents
Advanced Digital Forensics ITP 475 (4 Units)

Security and Computer Forensics ITP 477 (4 Units)

Introduction to Information Technology ITP 101x (4 Units)

Network Security ITP 457 (4 Units)

Macintosh, OSX, & ios Forensics ITP 445 (3 Units)

Computer and Network Forensics INF 528 (3 Units)

Technologies for Interactive Marketing ITP499 (4 Units)

DESIGN FOR USER EXPERIENCE (ITP 310)

Data Warehouses and Business Intelligence ITP 487 (3 Units) Fall Objective

Social Games Workshop ITP499 (3 Units) Spring 2010 (2010-1)

ITP 300: Database Web Development. Database Web Development (Monday section) Fall 2012 Course Units

Enterprise Information Systems ITP 320x (4 Units)

Mobile App Project ITP 442x (4 Units)

Mobile Application Technologies ITP 140 (2 Units)

3D Modeling, Animation, and Special Effects ITP 215x (2 Units)

CE 460 Course Syllabus

3D Modeling, Animation, Compositing, and Special Effects ITP 215x (2 Units)

Mobile Application Development ITP 342 (3 Units)

CE 460 Course Syllabus

Interactive Web Development ITP 301 (4 Units)

Mobile App Design ITP 340x (3 Units)

Mobile Application Development ITP 342 (3 Units)

Introduction to Cloud Technologies ITP 111x (2 Units)

Video Game Programming ITP 380 (4 Units)

Database Web Development ITP 300 (3 Units)

Tentative: Subject to Change CHEM 205Lxg Chemical Forensics: the Science, and its Impact. Course Overview:

Fundamentals of Computer Programming CS 101 (3 Units)

Introduction to Computer Forensics Course Syllabus Spring 2012

EnCase 7 - Basic + Intermediate Topics

INF 203: Introduction to Network Systems (3 credit hours) Spring W1, Class number 9870

GESM 160 Seminar in Quantitative Reasoning Wireless Computing Technologies for Medicine with Legal and Ethical Implications.

CTC 328: Computer Forensics

Multiplayer Game Programming ITP 484x (4 Units)

PROJECT MANAGEMENT DSO 580 Fall 2014

Tuskegee University Department of Computer Science Course No: CSCI 390 (Computer Forensics) Fall MWF 1:00-2:300, BRIM 301

Please see the course lecture plan (at the end of this syllabus) for more detailed information on the topics covered and course requirements.

SAMPLE ONLY. COMM 304 Interpersonal Communication Spring 2015 Tu/Th 11:00 12:20 ANN L101

Teaching Assistant: Ryan Essex Office Hours: 12pm- 1pm Tuesdays location: DNI 275, B5-6 (the Dornsife Neuroimaging Center)

The objectives of the course are to provide students with a solid foundation in all aspects of internet marketing. Specifically my goals are:

University of Southern California Marshall School of Business Administration Management and Organization Dept. MOR NEGOTIATION and PERSUASION

PSY 2012 General Psychology Sections 4041 and 1H85

CSC 341, section 001 Principles of Operating Systems Spring 2015 Monday/Wednesday 1:00 PM 2:15 PM

Introduction to Java Programming ITP 109 (2 Units) Fall 2015

MONTGOMERY COLLEGE Rockville Campus CA141 Introduction to Database Applications Computer Applications Department

Rutgers University, Department of Psychology Developmental Psychology Winter Office Hours Office Phone

IOM433 Creative Information Systems Analysis and Design Spring 2006 T/Th 2-3:50 HOH406 (Labs meet in HOH401)

Reading Materials: Required Text Book: Marjie T. Britz (2009). COMPUTER FORENSICS AND CYBER CRIME; ISBN-13: ; 2 nd

Oklahoma State University Institute of Technology Online Common Syllabus Semester and Year

Course Syllabus - IST 454 Computer and Cyber Forensics General Course Information

CS 300 Data Structures Syllabus - Fall 2014

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline

BUAD 310 Applied Business Statistics. Syllabus Fall 2013

ECON 351: Microeconomics for Business

Psychological Testing (PSYCH 149) Syllabus

Introduction to Public Relations MCM Course Syllabus Spring 2011 Division of Communication and Contemporary Culture

CJ 4480 Digital Forensics II Syllabus - Term

CS 464/564 Networked Systems Security SYLLABUS

PSY 3329 Educational Psychology Online Course Spring Week Course

ISE 515: Engineering Project Management

San José State University College of Engineering/Computer Engineering Department CMPE 206, Computer Network Design, Section 1, Fall 2015

COLLEGE OF BUSINESS MGT8112 Leadership Skills Spring nd Eight Weeks

IS 6363 Computer Forensics Spring 2006

This four (4) credit hour. Students will explore tools and techniques used penetrate, exploit and infiltrate data from computers and networks.

How To Pass Physics 161

CSCI-599 DATA MINING AND STATISTICAL INFERENCE

IOM431:Foundations of Digital Business Innovation

PELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS ADVANCED DATABASE MANAGEMENT SYSTEMS CSIT 2510

Vanguard University of Southern California Natural Science and Mathematics

Database Management Systems ISM 4212 (3 Credit Hours) Fall 2011

FORENSIC SCIENCE: BEYOND CRIME LAB CJUS 488 Online (Moodle): Fall, 2015

Technology and Online Computer Access Requirements: Lake-Sumter State College Course Syllabus

Fall 2015 GES 4120/5120 Internet GIS

ITSY1342 Section 151 (I-Net) Information Technology Security

I INF 300: Probability and Statistics for Data Analytics (3 credit hours) Spring 2015, Class number 9873


CIT 212 Microsoft Networking II Windows Server 2012 R2 Administration Fall 2015

Computer Forensics (3 credit hours)

IINF 202 Introduction to Data and Databases (Spring 2012)

COURSE SYLLABUS FIREWALLS & NETWORK SECURITY. ITSY-2301 Number Lecture - Lab - Credit. ITSY-1342 Prerequisites. April 16, 2015 Revision Date

SCHOOL OF JOURNALISM USC ANNENBERG SCHOOL FOR COMMUNICATION AND JOURNALISM. Journalism 463: Research, Analysis and Insight Spring Units

COMPUTER FORENSICS (EFFECTIVE ) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE CATE STUDENT REPORTING PROCEDURES MANUAL)

ACC 7145: ACCOUNTING SYSTEMS DESIGN AND CONTROL SYLLABUS FOR SUMMER SESSION 2014

USC VITERBI SCHOOL OF ENGINEERING INFORMATICS PROGRAM

CS 425 Software Engineering. Course Syllabus

BIOLOGY TRENT UNIVERSITY BIOL 1051W Human Physiology (Web version) (winter semester) Peterborough

Kean University Department of Criminal Justice Ethics in Criminal Justice CJ Spring 2012

How To Pass The Cis 50 Online Course

GGR272: GEOGRAPHIC INFORMATION AND MAPPING I. Course Outline

PSY 6361 Teaching of Psychology Online Course Spring nd Eight Weeks

Forensic Biology 3318 Syllabus

Transcription:

Introduction to Computer Forensics ITP 499 (3 Units) Description In 2007, the FBI reported that over 200 major companies reported a loss of over 60 million dollars due to computer crime. Computers are becoming more of a threat today than ever before. From cyber-terrorism to identity theft, the digital age has brought about a change in the way that crime is being committed. The usage of computers in crime has lead to the emerging field of computer forensics. This course is designed to give students the tools and techniques for investigating crime involving digital evidence. Objective Prerequisites/ Recommended Preparation Instructor Contacting the Instructor This course is designed as an introductory course in computer forensics. Students will first understand the need for computer forensics. Students will learn best practices for general incidence response. The course will then focus on the tools and techniques to perform a full computer forensic investigation. Upon completing this course, students will: - Understand the fundamentals of computer forensics - Understand the legal aspects of forensics - Understand the relationship between IT and forensics - Learn best practices for incidence response ITP 125 or department approval Joseph Greenfield joseph.greenfield@usc.edu 213-740-4604 Lecture/Lab 5:00 8:00 Tuesday, OHE 406 Required Hacking Exposed: Computer Forensics. Davis, Philipp, and Cowen Textbooks ISBN: 0-07-225675-3 Web Site All course material will be on Blackboard at blackboard.usc.edu Grading Grading will be based on percentages earned in assignments. Students will have structured labs throughout the semester, to be conducted during the scheduled lab time. In addition, students will work in groups to prepare a 20-minute presentation on a topic of their choosing. The presentations will be conducted during the last few weeks of class. Labs 60% Midterm 15% Final Exam 25% Total 100%

Grading Scale The following is the grading scale to be used for the final grades at the end of the semester 93% and above A 90% 93% A- 87% 90% B+ 83% 87% B 80% 83% B- 77% 80% C+ 73% - 77% C 70% 73% C- 67% 70% D+ 63% 67% D 60% 63% D- Below 60% F Policies - Projects turned in after the deadline will automatically have 5% deducted per day. Projects will not be accepted after 1 week beyond the project s deadline - No make-up exams (except for medical or family emergencies) will be offered nor will there be any changes made to the Final Exam schedule. - It is your responsibility to submit your project on or before the due date. It is not the responsibility of the lab assistant. Do not turn in anything to your lab assistant! - All projects will be digitally submitted through blackboard except where specifically specified. Always keep a backup copy of your labs Academic Integrity The use of unauthorized material, communication with fellow students during an examination, attempting to benefit from the work of another student, and similar behavior that defeats the intent of an examination or other class work is unacceptable to the University. It is often difficult to distinguish between a culpable act and inadvertent behaviour resulting from the nervous tension accompanying examinations. When the professor determines that a violation has occurred, appropriate action, as determined by the instructor, will be taken. Although working together is encouraged, all work claimed as yours must in fact be your own effort. Students who plagiarize the work of other students will receive zero points and possibly be referred to Student Judicial Affairs and Community Standards (SJACS). All students should read, understand, and abide by the University Student Conduct Code listed in SCampus, and available at: http://www.usc.edu/student-affairs/sjacs/nonacademicreview.html - 2 -

Students with Disabilities Any student requesting academic accommodations based on a disability is required to register with Disability Services and Programs (DSP) each semester. A letter of verification for approved accommodations can be obtained from DSP. Please be sure the letter is delivered to me (or to your TA) as early in the semester as possible. DSP is located in STU 301 and is open 8:30 a.m. - 5:00 p.m., Monday through Friday. The phone number for DSP is (213) 740-0776. - 3 -

Introduction to Computer Forensics ITP 499 (3 Units) Course Outline Week 1 Introduction to Computer Forensics - Course overview - Understanding the need for computer forensics - Defining computer forensics Reading: Chapter 1 Week 2 Computer Hardware - Understanding the computer components - Digital Media - Hard disk basics Reading: Chapter 2 Week 3 The Forensic Toolkit - Forensic hardware - Hardware write/blockers - Hard drive acquisitions - Processing the scene Reading: Chapters 3 & 4 Lab 1: Hard drive acquisition Week 4 Files and File Systems - Windows file systems - FAT32 - NTFS - Forensic file images Reading: Chapter 6 Lab 2: Preparing the case Week 5 Forensic software - Overview of different software packages - EnCase - Autopsy Lab 3: EnCase introduction - 4 -

Week 6 Bookmarking and Searching - Creating basic search queries - Hex, Decimal, and Binary - ASCII - Unicode Lab 4: Searching evidence for common keywords Week 7 Bookmarking and Searching - Creating basic search queries - Hex, Decimal, and Binary - ASCII - Unicode Lab 4: Searching evidence for common keywords Week 8 GREP Week 9 MIDTERM Week 10 E-mail Analysis - Understanding GREP - Building Regular Expressions - Creating GREP keywords - Viewing and managing keywords and cases Lab 5: GREP lab - Viewing e-mail - Webmail - POP - IMAP Reading: Chapter 11 Lab 6: E-mail analysis lab Week 11 File Signature Analysis - File signatures - File extensions - Differences between - Identifying differences Lab 6: Detecting file manipulation - 5 -

Week 12 Hash Analysis - Understanding hash algorithms - Hashing files - Hash libraries Reading: Instructor notes Lab 7: Hash analysis lab Week 13 Other Windows Artifacts - Common windows artifacts - Recycle bin - My Documents - Recent files - Installed programs Reading: Chapter 12 Lab 8: Basic Computer Forensics Lab Week 14 A real forensic case Week 15 Conclusion - Processing a complete forensic case - Preparing a forensic report Reading: Chapter 14 - Review for the final exam - Conclusion to the course - 6 -