Oct 23, 2019  
2017-2018 Catalog 
    
2017-2018 Catalog [ARCHIVED CATALOG]

[Add to Portfolio]

CIS 360 - Mobile Forensics

5 Credits
For completion of the BAS in CyberSecurity and Forensics. It is assumed students have had an introductory course in digital forensics. Students will learn the issues of forensics pertinent to mobile and wireless. This includes devices such as cell phones, palmtops, smart phones, iPhones, iPads, digital cameras, pagers, etc. Students will be exposed to commercial and shareware applications that can be used.

Pre-requisite(s) CIS 155 min 2.0
Program Admission Required Yes Admitted Program BAS - CIS
Fees CF

Designed to Serve For students admitted to the BAS program in CyberSecurity and Forensics.
Active Date 2016-05-04

Grading System Decimal Grade
Class Limit 24
Contact Hours: Lecture 44 Lab 22 Worksite 0 Clinical 0 Other 0
Total Contact Hours 66
Degree Distributions:
Course Outline
I. Mobile device communications and characteristics

A. Components of a digital communications system

B. Digital Signaling

C. Spread Spectrum Signals

D. Multi-User Communication Access Techniques

E. CDMA, TDMA, FDMA, SDMA, PDMA



II. Mobile Technologies

A. 2G -> 3G -> 4G / LTE -> 5G

B. Standards Heritage

C. Core Architecture Evolution

D. Design Choices

E. Encryption

F. Mobile Use of SS7

G. RRC Signaling

H. Billing/Charging

I. Wireless Security (WEP vs WPA2)



III. Mobile Devices

A. Tablets - iOS and Android

B. Data devices (MP3, iPods, etc.)

C. Personal Digital Assistants (PDAs)

D. Smart Phones

E. Feature Phones

F. Misc. devices (GPS, personal fitness monitors, etc.)



IV. Mobile Device Operating Systems

A. iOS

B. Windows

C. Android

D. Tizen



V. Mobile device data extraction

A. Jail-breaking

B. Rooting

C. Logical

D. File System

E. Physical

F. JTAG

G. SIM cards

H. Chip-off (lecture only, no hands on for chip-off)



VI. Mobile device attacks & vulnerabilities

A. Applications

B. Passwords

C. Encryption

D. JTAG

E. Chip-off (lecture only, no hands on for chip-off)



VII. Mobile device vulnerabilities and attacks

A. Applications

B. Passwords

C. Encryption

D. AVS

E. Security patches

F. Physical theft

G. Unsecured WiFi connections





Student Learning Outcomes
Describe mobile device digital communications methods.

Describe how a mobile device maintains connectivity to the network while in motion

Describe how infrastructure nodes handle passing the mobile device from one node to the next.

Compare and contrast different digital communications methods and describe the advantages and disadvantages of each.

Describe methods for the acquisition/analysis of mobile devices (e.g., device storage, system data, cell tower logs).

Explain the legal issues related to mobile device forensic activities.

Explain the strengths and weaknesses of various mobile encryption standards such as WEP and which ones have been addressed and how.

Compare and contrast the various mobile device data extraction methodologies and understand the capabilities of each

Understand the meanings, the methods, the advantages, and the risks of Jail-breaking and rooting mobile devices.



[Add to Portfolio]