PREREQUISITE(S): CTS 1131, CTS 1133 and CTS 1120



Similar documents
COURSE NUMBER: CTS 2371

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE. Child Care and Education Organizational Leadership and Management

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE. Introduction to Programming with Visual Basic.NET

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE. CTS 2655 and CNT 2102 with grade of C or higher in both courses

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

FLORIDA STATE COLLEGE AT JACKSONVILLE NON-COLLEGE CREDIT COURSE OUTLINE. Insurance Customer Service Representative

FLORIDA STATE COLLEGE AT JACKSONVILLE NON-COLLEGE CREDIT COURSE OUTLINE

FLORIDA STATE COLLEGE AT JACKSONVILLE NON-COLLEGE CREDIT COURSE OUTLINE

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

FLORIDA STATE COLLEGE AT JACKSONVILLE NON-COLLEGE CREDIT COURSE OUTLINE

FLORIDA STATE COLLEGE AT JACKSONVILLE NON-COLLEGE CREDIT COURSE OUTLINE

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE. Automatic Transmissions and Transaxles

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE. Calculus for Business and Social Sciences

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

FLORIDA STATE COLLEGE AT JACKSONVILLE NON-COLLEGE CREDIT COURSE OUTLINE

How To Pass A Credit Course At Florida State College At Jacksonville

FLORIDA STATE COLLEGE AT JACKSONVILLE NON-COLLEGE CREDIT COURSE OUTLINE

Georgia Perimeter College Common Course Outline

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 103 Computer Concepts and Programming

Computer Forensics and Investigations Duration: 5 Days Courseware: CT

Computer and Information Science

COWLEY COLLEGE & Area Vocational Technical School

COMPUTER FORENSICS (EFFECTIVE ) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE CATE STUDENT REPORTING PROCEDURES MANUAL)

CTC 328: Computer Forensics

NORTH CAROLINA COMMUNITY COLLEGE SYSTEM H. Martin Lancaster, President

CYBER FORENSICS (W/LAB) Course Syllabus

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 276 Windows Security Management

Criteria for Accrediting Computer Science Programs Effective for Evaluations during the Accreditation Cycle

Frank Phillips College. ITSY1391 Computer Forensics II

CTN281 - Security+ Certification Prep

Guide to Computer Forensics and Investigations, Second Edition

Introduction to Computer Forensics ITP 499 (3 Units)

CURRICULUM ACTION INFORMATION. (For assistance, contact Curriculum Services at The curriculum package will be returned if incomplete)

Digital Forensics. Tom Pigg Executive Director Tennessee CSEC

(collapse all) Current Version Print Requester(s)

Master of Science in Forensics

Clackamas Community College Online Course/Outline Submission System

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014

Department of Finance and Administration Telephone and Information Technology Resources Policy and Procedures March 2007

Criminal Justice II, August 2013, Page 1 of 5

CMJ CRIME SCENE INVESTIGATION Spring Syllabus 2015

St. Maryʼs College High School Forensic Science

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

RARITAN VALLEY COMMUNITY COLLEGE COMPUTER SCIENCE (CS) DEPARTMENT. CISY Computer Literacy

CST 244 Computer Forensics and Investigation Spring, 2010

Digital Forensics Tutorials Acquiring an Image with FTK Imager

Monfort College of Business Semester Course Syllabus ( ) COURSE PREFIX/TITLE: BACS 382 TCP/IP Network Security Sem. Hrs. 3 Ed.

Significance of Hash Value Generation in Digital Forensic: A Case Study

ARTICULATION AGREEMENT Harford Community College Associate of Science Degree in Chemistry. and

Monfort College of Business Semester Course Syllabus ( )

Certified Digital Forensics Examiner

FORENSIC SCIENCE INSTITUTE COURSE DESCRIPTIONS

Certified Digital Forensics Examiner

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

CURRICULUM ACTION INFORMATION. (For assistance, contact Curriculum Services at The curriculum package will be returned if incomplete)

Page 1 of 5 Position Code #P Forensic Identification - Technological Crimes Unit ASSOCIATION: Civilian LOCATION: Headquarters

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 275 UNIX and Linux Security Management

The American Academy of Forensic Sciences &

EC-Council Ethical Hacking and Countermeasures

Sponsored Programs Guidance Cradle to Grave

CIS 156. Firewalls and Intrusion Detection

2012/2013 Programme Specification Data. Engineering

COMMUNITY UNIT SCHOOL DISTRICT 200. Course Description

Ohio Supercomputer Center

CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak

Frank Phillips College. ITSY 2359: Security Assessment & Auditing

Computer Hacking Forensic Investigator v8

MED 2400 MEDICAL INFORMATICS FUNDAMENTALS

GENERAL EDUCATION REQUIREMENTS

Certified Digital Forensics Examiner

Frank Phillips College ITNW2305 Network Administration. Prerequisite and/or Co-requisite: BCIS1405 Advanced Microcomputer Applications

Tuskegee University Department of Computer Science Course No: CSCI 390 (Computer Forensics) Fall MWF 1:00-2:300, BRIM 301

Network Security Policy

ITM 642: Digital Forensics Sanjay Goel School of Business University at Albany, State University of New York

Indiana University East Faculty Senate

University of Pikeville Division of Nursing RN-to-BSN Program. Admission and Curriculum Information

70250 Graduate Certificate in Digital Forensics

ASU College of Education Course Syllabus ED 4972, ED 4973, ED 4974, ED 4975 or EDG 5660 Clinical Teaching

NEW YORK CITY COLLEGE OF TECHNOLOGY -CUNY

ACADEMIC YEAR SCHOOL OF INFORMATION TECHNOLOGY. AS in INFORMATION TECHNOLOGY. BS in INFORMATION TECHNOLOGY

Syllabus. Required Textbooks: 1. Title: Hands-On Networking Fundamentals Author: Palmer Edition: 2nd Copyright Year: 2013 ISBN:

Georgia Department of Education

Our Colorado region is offering a FREE Disaster Recovery Review promotional through June 30, 2009!

1D SBCCC COURSES AND STANDARDS FOR CURRICULUM PROGRAMS The Combined Course Library and curriculum standards for associate degree, diploma, and

Advanced Digital Forensics ITP 475 (4 Units)

Prerequisite: Test placement in ENG101 or successful completion of ENG98 if required.

2 ND CYCLE PROGRAM IN LEGAL STUDIES

EnCase 7 - Basic + Intermediate Topics

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE CISY 102 COMPUTER LITERACY

Contents The College of Information Science and Technology Undergraduate Course Descriptions

Birmingham City University Faculty of Technology, Engineering and the Environment. Undergraduate Programme. Programme Specification

CS135 Computer Science I Spring 2015

Transcription:

Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CAP 2140 COURSE TITLE: Data Forensics I PREREQUISITE(S): CTS 1131, CTS 1133 and CTS 1120 COREQUISITE(S): None CREDIT HOURS: 4 CONTACT HOURS/WEEK: 4 CONTACT HOUR BREAKDOWN: Lecture Discussion: 3 Laboratory: 1 Other : FACULTY WORKLOAD POINTS: 4 STANDARDIZED CLASS SIZE ALLOCATION: 20 COURSE DESCRIPTION: This course provides information on identifying inappropriate uses of corporate IT, gathering electronic evidence of wrongdoing, securing corporate systems from further misuse, and protecting electronic evidence from intentional or accidental modification. Hands-on exercises are an integral part of the course. SUGGESTED TEXT(S): Guide to Computer Forensics and Investigations; Publisher: Thompson (Current edition) IMPLEMENTATION DATE: Spring Term, 2003 (20032) REVIEW OR MODIFICATION DATE: Spring Term, 2007 (20072) Spring Term, 2011 (20112) Proposal 2010-03

Form 2A, Page 2 COURSE TOPICS CONTACT HOURS PER TOPIC I. Basic computer forensics and how to prepare for and conduct a computer investigation. 8 II. Installation of computer forensics workstations and software. 8 III. Techniques in digital evidence acquisition. 8 IV Conduct an investigation on evidence media that has had its contents obfuscated to avoid detection. The evidence files will be altered and unreadable by normal means. 8 V. Low-level file reconstruction. 8 VI. Basics of a corporate investigation. 6 VII. Basics of being an expert witness in a criminal case involving forensics. 6 VII. Hands-on testing 4 VIII. Written Testing 4 60

Form 2A, Page 3 PROGRAM TITLE: COURSE TITLE: Networking Services Technology Data Forensics I CIP NUMBER: 1511090103 LIST PERFORMANCE STANDARDS ADDRESSED: NUMBER(S): TITLES(S): 01.0 DEMONSTRATE UNDERSTANDING OF NETWORKED ENVIRONMENTS The student will be able to: 01.01 Explain the use of binary numbers to represent instructions and data. 01.02 Describe the hardware implications of the use of binary representation of instructions and data. 01.03 Convert numbers among decimal, binary, and hexadecimal representation. 01.04 Perform binary arithmetic. 01.05 Identify various coding schemes (ASCII, etc.). 01.09 Identify and discuss issues (such as security, privacy, redundancy, etc.) related to networked environments. 01.10 Identify and discuss issues related to naming conventions for user ids, email, passwords, and network devices. 04.0 UNDERSTAND, INSTALL AND CONFIGURE COMPUTER SOFTWARE The student will be able to: 04.01 Describe the functions and major components (BIOS, task management, etc.) of a computer operating system. 04.02 Identify current operating systems and describe their important features. 04.04 Identify current systems utilities and describe their functions. 04.05 Use system software to perform routine maintenance tasks such as backup, hard drive defragmentation, etc. 04.10 Use basic features of office productivity software. 04.12 Use software produced by multiple vendors. 08.0 PERFORM NETWORK ADMINISTRATION AND MANAGEMENT ACTIVITIES The student will be able to: 08.02 Establish, document and disseminate user security guidelines. 08.08 Perform network monitoring activities to ensure account integrity. 08.11 Document security policies and violations. 08.12 Install and update anti-virus software. 08.15 Address security issues raised by the ability to access server remotely.

LIST PERFORMANCE STANDARDS ADDRESSED: (Continued) NUMBER(S): TITLES(S): 12.0 DEMONSTRATE PROFESSIONAL DEVELOPMENT SKILLS The student will be able to understand the importance of: 12.01 Attending classes, seminars, and workshops. 12.02 Reviewing literature and reading current literature. 12.03 Evaluating skills and taking necessary steps to upgrade.

Florida State College At Jacksonville Course Learning Outcomes & Assessment NOTE: Use either the Tab key or mouse click to move from field to field. The box will expand to accommodate your entry. Section 1 COURSE PREFIX AND NUMBER: CAP 2140 COURSE TITLE: Data Forensics I SEMESTER CREDIT HOURS (CC): 4 CONTACT HOURS (NCC): Section 2 OF COURSE: (Click on the box to check all that apply) AA Elective AS Required Professional Course College Prep AS Professional Elective AAS Required Professional Course Technical Certificate Other PSAV Apprenticeship General Education: (For General Education courses, you must also complete Section 3 and Section 7) Section 3 (If applicable) INDICATE BELOW THE DISCIPLINE AREA FOR GENERAL EDUCATION COURSES: Communications Social & Behavioral Sciences Mathematics Natural Sciences Humanities Section 4 INTELLECTUAL COMPETENCIES: Reading Speaking Critical Analysis Writing Listening Information Literacy Quantitative Skills Ethical Judgment Scientific Method of Inquiry Working Collaboratively Section 5 STATE GENERAL EDUCATION LEARNING OUTCOME AREA Critical Communication Scientific and Quantitative Reasoning Thinking Information Global Sociocultural Responsibility Literacy Section 6 LEARNING OUTCOMES Type of Outcome: Gen.Ed, Program, Course The student will understand basic computer forensics and how to prepare for and conduct a computer investigation. METHOD OF ASSESSMENT The classroom environment will include a mock crime scene. The student must investigate the scene in a professional manner consistent with proper evidence gathering techniques.

Section 6 (Continued) LEARNING OUTCOMES Type of Outcome: Gen.Ed, Program, Course METHOD OF ASSESSMENT The student will become proficient in the installation of computer forensics workstations and software. The student will learn state of the art techniques in digital evidence acquisition. The student will conduct an investigation on evidence media that has had its contents obfuscated to avoid detection. The evidence files will be altered and unreadable by normal means. The student will become proficient with low-level file reconstruction. Students will be taught the basics of a corporate investigation. The student will learn the basics of being an expert witness in a criminal case involving forensics. Each student will install, test, and configure computer forensic software including Forensic Toolkit, Encase, Digital Intelligence DriveSpy and Imager. Each student will perform data acquisition techniques on a variety of storage devices including hard drives, USB drives, PDSs and Cell phones. The digital fingerprint of the particular device will be compared to the student s results for verification of accuracy. Each student will reconstruct the Directory structure of a File Allocation Table (FAT), manually recover erased and corrupted files, and rebuild file headers and extensions as needed. The student will be trained in the use of Hex tools and required to reconstruct file headers and trailers to their proper values. Students will be assigned to one of three teams. Each team will analyze a corporate policy violation scenario and create recommendations and supporting report documents. Students will hold a mock trial submitting the evidence gathered from the corporate policy violation. Each student will act as an expert witness and be judged on his or her professionalism. Section 7 Name of Person Completing This Form Ernie Friend