|
Nov 15, 2024
|
|
|
|
CSI 220W - Digital Forensics IICredits: 3 Instructional Contact Hours: 3
Develops skills using forensic tools to preserve, examine, analyze, and report digital evidence/findings with a focus on areas of user accessibility such as the Windows registry, browser, logs, and password-protected files. Emphasis is placed on understanding applied file systems and an introduction to areas of specialized forensics such as mobile, cloud, and email investigations.
Prerequisite(s): CSI 110W and CSI 120W both with a grade of “C” or better. Corequisite(s): None Lecture Hours: 45 Lab Hours: 0 Meets MTA Requirement: None Pass/NoCredit: Yes
Outcomes and Objectives
- Identify the recommended specifications for a digital forensics workstation.
- Demonstrate the basic functions, configurations, outputs, tools, and settings of digital forensic analysis software.
- Analyze forensic images of Windows and Linux operating systems using digital forensic analysis software.
- Conduct a forensic examination of an image of the Windows operating system in a lawful manner.
- Demonstrate how to defeat password protected files.
- Apply knowledge of applied file systems such as FAT, NTFS, and EXT.
- Identify components of the major operating systems including Windows, Macintosh, and Linux.
- Identify areas of user activity in the Windows and Linux operating systems.
- Analyze browser activity.
- Interpret log files.
- Capture and examine volatile memory.
- Demonstrate the core principles of digital forensic investigations.
- Identify evidence.
- Preserve evidence.
- Examine data.
- Analyze results.
- Report findings.
- Demonstrate the procedures of the digital forensic processes.
- Wipe media.
- Use write blocking devices.
- Image devices.
- Validate images.
- Document findings.
- Identify the basic principles of specialized forensic and electronic discovery.
- Explain the components of mobile forensic investigations.
- Identify mechanisms of cloud and internet digital forensics.
- Articulate the components of network and virtual machine forensics.
- Explain the various components of email and social media forensics.
Add to Portfolio (opens a new window)
|
|