Oct 18, 2021  
2021 - 2022 Catalog 
2021 - 2022 Catalog
Add to Portfolio (opens a new window)

CSI 220W - Digital Forensics II

Credits: 3
Instructional Contact Hours: 3

Develops skills using forensic tools to preserve, examine, analyze, and report digital evidence/findings with a focus on areas of user accessibility such as the Windows registry, browser, logs, and password-protected files.  Emphasis is placed on understanding applied file systems and an introduction to areas of specialized forensics such as mobile, cloud, and email investigations.

Prerequisite(s): CSI 110W  and CSI 120W  both with a grade of “C” or better.
Corequisite(s): None
Lecture Hours: 45 Lab Hours: 0
Meets MTA Requirement: None
Pass/NoCredit: Yes

Outcomes and Objectives
  1. Identify the recommended specifications for a digital forensics workstation.
  2. Demonstrate the basic functions, configurations, outputs, tools, and settings of digital forensic analysis software.
  3. Analyze forensic images of Windows and Linux operating systems using digital forensic analysis software.
  4. Conduct a forensic examination of an image of the Windows operating system in a lawful manner.
  5. Demonstrate how to defeat password protected files.
  6. Apply knowledge of applied file systems such as FAT, NTFS, and EXT.
  7. Identify components of the major operating systems including Windows, Macintosh, and Linux.
  8. Identify areas of user activity in the Windows and Linux operating systems.
    1. Analyze browser activity.
    2. Interpret log files.
    3. Capture and examine volatile memory.
  9. Demonstrate the core principles of digital forensic investigations.
    1. Identify evidence.
    2. Preserve evidence.
    3. Examine data.
    4.  Analyze results.
    5. Report findings.
  10. Demonstrate the procedures of the digital forensic processes.
    1. Wipe media.
    2. Use write blocking devices.
    3. Image devices.
    4. Validate images.
    5. Document findings.
  11. Identify the basic principles of specialized forensic and electronic discovery.
    1. Explain the components of mobile forensic investigations.
    2. Identify mechanisms of cloud and internet digital forensics.
    3. Articulate the components of network and virtual machine forensics.
    4. Explain the various components of email and social media forensics.

Add to Portfolio (opens a new window)