CTC 328: Computer Forensics



Similar documents
CYBER FORENSICS (W/LAB) Course Syllabus

CTC 428 Operating Systems Security Syllabus

COS/PSA 412 Computer Forensics and Investigations

Computer Forensics (3 credit hours)

OUR LADY OF THE LAKE UNIVERSITY SCHOOL OF BUSINESS AND LEADERSHIP CISS 3342 SYLLABUS

CTC 310 Software Project Management

Computer Forensics and Investigations Duration: 5 Days Courseware: CT

Prairie View A&M University P.O. Box 519 Mail Stop 2510 Prairie View, TX 77446

CRJS 4913 CRIMINAL JUSTICE SYSTEMS ABROAD COURSE SYLLABUS

Prairie View A&M University Course Syllabus ACCT 2113 Financial Accounting Fall 2015

Course Syllabus - IST 454 Computer and Cyber Forensics General Course Information

Oklahoma State University Institute of Technology Online Common Syllabus Semester and Year

Tuskegee University Department of Computer Science Course No: CSCI 390 (Computer Forensics) Fall MWF 1:00-2:300, BRIM 301

Nursing Community Health Nursing

Prairie View A&M University P.O. Box 519 Mail Stop 2600 Prairie View, TX 77446

Semester: Fall 2015 Course Title: College Algebra Course Prefix: Math Course No.: 1113 Section No.:P36 CRN: 11830

IS 6363 Computer Forensics Spring 2006

BUS Computer Concepts and Applications for Business Fall 2012

Prairie View A & M University

Course Title: Minorities and the Criminal Justice System Course Prefix: CRJS Course No.: 3933 Section No.: PO1

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

Elmer E. O Banion Science Building Room. Office Phone: FAX:

Term: Spring 2014 Course Title: Internship in Political Science Course Prefix: POSC Course No.: 4153 Section No.: P01 CRN Department of:

Course Title: Principles of Criminal Justice Course Prefix: CRJS Course No.: 1133 Section No.: 10589

Course Requirements & Evaluation Methods

KENNESAW STATE UNIVERSITY GRADUATE COURSE PROPOSAL OR REVISION, Cover Sheet (10/02/2002)

Introduction to Computer Forensics ITP 499 (3 Units)

GEOG/PLAN 210 IMAGE INTERPRETATION AND PHOTOGRAMMETRY

PVAMU Course Syllabi Biology 1054 Anatomy and Physiology I

Lisa K. Thompson, Ph.D., Instructor: (office); (fax); SYLLABUS Spring 2013

ITM 642: Digital Forensics Sanjay Goel School of Business University at Albany, State University of New York

College of Engineering. New Electrical Engineering Building. Prairie View A&M University

MGSC 290 Computer Information Systems in Business SYLLABUS Spring 2008

Course Title: General Psychology CRN: Course Prefix: PSYC Course No.: 1113 Section No.:

IST359 - INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS

CS 261 C and Assembly Language Programming. Course Syllabus

BCIS Business Computer Applications D10

Digital Forensics. Tom Pigg Executive Director Tennessee CSEC

BCIS Business Computer Applications - Online

CENTRAL TEXAS COLLEGE ITSY 2459 SECURITY ASSESSMENT AND AUDITING. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:

Prairie View A&M University P.O. Box 519 Mail Stop MS 2600 Prairie View, TX 77446

Infrastructure for ecommerce

Course Evaluation Methods

PVAMU Course Syllabus for: Philosophy 2303 Critical Thinking Division of Social Work, Behavioral, and Political Sciences

Introduction to Computer Forensics Course Syllabus Spring 2012

Security and Computer Forensics ITP 477 (4 Units)

COURSE SYLLABUS FIREWALLS & NETWORK SECURITY. ITSY-2301 Number Lecture - Lab - Credit. ITSY-1342 Prerequisites. April 16, 2015 Revision Date

Imperial Valley College Course Syllabus - Elementary Differential Equations Math 220

CIS 3515 Mobile Application Development Instructor:

Psychological Testing (PSYCH 149) Syllabus

I. PREREQUISITES For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

Forensic Biology 3318 Syllabus

Of the programs offered by IACIS, the Basic Computer Forensic Examiner (BCFE) Training Program is at the forefront.

Principles of Financial Accounting Bus 210

This four (4) credit hour. Students will explore tools and techniques used penetrate, exploit and infiltrate data from computers and networks.

Course Syllabus CAD 140 Computer-Aided Drafting I 3 Semester Hours

COMM Interpersonal Communication Course Syllabus Fall 2013

Systems and Internet Marketing Syllabus Fall 2012 Department of Management, Marketing and International Business

Mullin, B. J., Hardy, S., & Sutton, W. A. (2014). Sport Marketing, 4 th Edition. Human Kinetics.

ANT 3740: Introduction to Forensic Sciences Monday, Wednesday, Friday, 1:00-1:50pm Building 51, Room 1210

How To Pass A Financial Analysis Course

University of Texas at San Antonio English 2413: Technical Writing Fall 2011

Multimedia 320 Syllabus

CIT 212 Microsoft Networking II Windows Server 2012 R2 Administration Fall 2015


CS 394 Introduction to Computer Architecture Spring 2012

ITSE 1401 Web Design Tools General Syllabus (Note: This general syllabus presents only general course information for nonregistered students)

Advanced Digital Forensics ITP 475 (4 Units)

School of Business and Nonprofit Management Course Syllabus

Course Syllabus. Senior Project Studio. Course Description: Students begin the design and production of advanced interactive project.

CENTRAL TEXAS COLLEGE ITNW 1316 NETWORK ADMINISTRATION. Semester Hours Credit: 3

Southwestern Michigan College School of Business Dowagiac, Michigan. Course Syllabus FALL SEMESTER 2012

CMJ CRIME SCENE INVESTIGATION Spring Syllabus 2015

Belk College of Business Administration, University of North Carolina at Charlotte. INFO : MANAGEMENT INFORMATION SYSTEMS Spring 2012

CJ 480, Criminological Theories Syllabus, Spring 2011

Part A of the Syllabus

BUS 3525 Strategic Management Online

Macintosh, OSX, & ios Forensics ITP 445 (3 Units)

University of Central Florida Department of Electrical Engineering & Computer Science EEL 4914C Spring Senior Design I

IT 145 Section 300 Fall 2013 Web Design Fundamentals: HTML and Style Sheets. Syllabus and Course Outline

CENTRAL TEXAS COLLEGE ITSE 2459 ADVANCED COMPUTER PROGRAMMING C# Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:

BIOL Microbiology Spring 2016

Semester/Year: Spring, 2016

OPERATIONS, BUSINESS ANALYTICS & INFORMATION SYSTEMS

ISM 4403 Section 001 Advanced Business Intelligence 3 credit hours. Term: Spring 2012 Class Location: FL 411 Time: Monday 4:00 6:50

Syllabus. No: CIS 207. Title: Intro to Computer Forensics. Credits: 3. Coordinator: Dr. B. Dike-Anyiam, Computer Science & Networking Lecturer

Transcription:

FALL 2010 CSUDH COMPUTER SCIENCE DEPARTMENT CTC 328: Computer Forensics Instructor: Adam Kaplan, Ph.D. E-Mail: akaplan@csudh.edu Office: NSM E-117 WWW (Blackboard Site): http://toro.csudh.edu Class Meetings: Saturday, 12:30pm - 2:45pm in SAC 2102 Lab Meetings: Saturday, 3:00pm - 4:45pm in SAC 2102 Final Exam: Saturday, December 11 th, 2010, 12:00pm-2:00pm in SAC 2102 All exams except final will be taken in class during regular meeting time. Prerequisites: CSC 116 (Introduction to Computer Hardware & Tools) or consent of instructor. Students should have a working knowledge of hardware and operating systems (OSs) to maximize their success on projects and exercises throughout the course. Text/References Guide to Computer Forensics and Investigations by Bill Nelson, Amelia Phillips, and Christopher Steuart, Course Technology, Cengage Learning, 4 th Edition, 2010. ISBN-13: 978-1-435-49883-9 Catalog Description This course presents methods to properly conduct a computer forensics investigation, beginning with a discussion of ethics while mapping to the objectives of the International Association of Computer Investigative Specialists (IACIS) certification. Course Goals & Objectives The course provides a range of laboratory and hands-on assignments that provide a balanced introduction to the theoretical and practical aspects of computer forensic investigation. Students will learn the basics of data acquisition, computer forensic analysis, e-mail investigations, image file recovery, and investigative report writing.

Learning Outcomes Upon completion of this course, students will be able to Define and demonstrate understanding of Computer Forensics Demonstrate understanding of enforcement agency investigations Demonstrate understanding of corporate investigations Understand what it means to maintain professional conduct Describe a search warrant Prepare a case Begin and execute an investigation Demonstrate understanding of data-recovery workstations and software Demonstrate understanding of file systems Explore Microsoft disk structures Examine New Technology File System (NTFS) disks Demonstrate understanding of Microsoft boot tasks Determine the physical layout of a Computer Forensics lab Select a basic forensic workstation Create forensic boot media Retrieve evidence data remotely using a network connection Use command-line forensics tools Explore forensics tools Explore Computer Forensics hardware Identify digital evidence Secure digital evidence at an incident scene Catalog digital evidence Store digital evidence Obtain a digital hash of a file, and use this to validate evidence Attendance The student is responsible for materials missed during an absence, whether excused or not. Classes will start at the prescribed time and will end at the prescribed time. Instructor will be available during the posted office hours and you may make an appointment for times not posted. Academic Honor Code Programming assignments must be done individually. Failure to do so will result in a violation of the CSUDH Academic Honor Code. The following cases will be considered as violations: identical code, and extremely similar code. Violations will be reported to the Office of Vice President of Academic Affairs. Attendance Policy Excessive absences will result in lowered grades. Excessive absenteeism, whether excused or unexcused, may result in a student s course grade being reduced or in assignment of a grade of F. Absences are accumulated beginning with the first day of class.

Student Academic Appeals Process Authority and responsibility for assigning grades to students rests with the faculty. However, in those instances where students believe that miscommunication, error, or unfairness of any kind may have adversely affected the instructor s assessment of their academic performance, the student has a right to appeal by the procedure listed in the Undergraduate Catalog and by doing so within thirty days of receiving the grade or experiencing any other problematic academic event that prompted the complaint. ADA Statement Students with disabilities, who believe they may need an academic adjustment in this class, are encouraged to contact me as soon as possible to better ensure receipt of timely adjustments. Definition Of Cheating and Plagiarism CSUDH is dedicated to a high standard of academic integrity among its faculty and students. In becoming part of the California State University academic community, students are responsible for honesty and independent effort. Disciplinary action will be taken against any student who alone or with others engages in any act of academic fraud or deceit. (Read University Regulations in University Catalog) Project Descriptions: TBA Grading Labs 40% Midterm Exam 30% Final Exam 30% Grading Scale 96-100 = A 90-95 = A- 87-89 = B+ 83-86 = B 80-82=B- 77-79=C+ 73-76=C 70-72=C- 67-69=D+ 63-66=D below 60 = F

Tentative Course Outline Week Topic Lab Discuss syllabus 1 (8/28) Computer Forensics and investigations as a profession (Chapter 1) Understanding computer investigations (Chapter 2) 2 (9/4) Understanding computer investigations (Chapter 2, cont) The Investigator s Office & Laboratory (Chapter 3) Acquire a USB drive with ProDiscover Basic 3 (9/11) Data Acquisition (Chapter 4) Linux Live media and Linux acquisition 4 (9/18) Processing Crime & Incident Scenes (Chapter 5) 5 (9/25) Working with Windows and DOS Systems (Chapter 6) 6 (10/2) Working with Windows and DOS Systems (Chapter 6, cont) Obtaining a digital hash and conducting investigation with FTK Examining files and file-systems in Hex Workshop Hex Workshop: examining common file headers 7 (10/9) Current Computer Forensics Tools (Chapter 7) Midterm Exam review 8 (10/16) Midterm Exam 9 (10/23) Macintosh and Linux Boot Processes and File Systems (Chapter 8) Linux command-line tools and forensic software

10 (10/30) Computer Forensics Analysis and Validation (Chapter 9) Bit shifting in Hex Workshop / Remote acquisition with DiskExplorer and HDHOST 11 (11/6) Recovering Graphics Files (Chapter 10) Finding and fixing altered JPEG headers 12 (11/13) Virtual Machines, Network Forensics, and Live Acquisitions (Chapter 11) Reconstruct a graphics file from fragments 13 (11/20) E-Mail Investigations (Chapter 12) Recovering email in FTK and carving email with Hex Workshop 14 (11/27) THANKSGIVING HOLIDAY (No lecture this week) 15 (12/4) Cell Phone and Mobile Device Forensics (Chapter 13) Report Writing for High-Tech Investigations (Chapter 14) 16 (12/11) Final Exam All lab work is due no later than the last week of the semester (Saturday 12/4, week 15).