|
Jul 01, 2025
|
|
|
|
CIS 370 - Network Forensics and Investigations5 Credits Students must be admitted to the appropriate BAS program to take this course. It is assumed that they have completed CIS 155 or its equivalent. This course focuses on tracking down network intruders or at least ascertaining how they got in and what they did. Intruders can be internal or external attackers. When, what, where, and how they were able to gain access gives a network administrator clues to design flaws in the network architecture and shortcomings in policies or procedures. An introduction to investigations in the cloud is included along with the legal aspects of network investigations. This is a hands-on class in which students test network forensics tools and how to use them in internal or external investigations.
Pre-requisite(s) CIS 155 min 2.0 Program Admission Required Yes Admitted Program BAS - CIS FeesCF
Quarters Typically Offered
Winter Evening Spring Evening
Designed to Serve For students admitted to the BAS program in CyberSecurity and Forensics. Active Date 2014-11-07
Grading Basis Decimal Grade Class Limit 24 Contact Hours: Lecture 44 Lab 22 Field Studies 0 Clinical 0 Independent Studies 0 Total Contact Hours 66 Degree Distributions: ProfTech Course Yes Restricted Elective Yes Course Outline I. Review of Networks and Infrastructure
a. Defense in Depth
b. DMZs
c. Virtual machines and devices
II. Review of Device Forensics
III. Internet Protocols
a. Review of Internet Suite
b. Vulnerabilities of the protocols
IV. Network Based Evidence
a. Where to find evidence
b. Encryption
V. Network Evidence Acquisition
a. Popular tools
b. Physical interception
c. Traffic monitoring
VI. Network Evidence Analysis
a. Popular Analysis Tools including visualization tools
b. Packet Analysis
c. Flow Analysis
VII. Applying Statistics to the Evidence
VIII. Network Intrusion Detection
a. Install and use popular tools such as Snort, Wireshark, Alien Vault
b. How to recognize footprints
c. NIDs/NIPs
d. Packet Logging
IX. Network Devices and Logs
a. Log architecture
b. Log analysis
c. Routers, Switches and Firewalls
d. Web Proxies
X. Network Tunneling
XI. Malware Forensics
XII. Cloud Forensics
XIII. Forensics in the Internet of Things (IoT)
XIV. Network Forensics and Forensic Accounting
XV. Applicable Laws
a. Understanding the laws that may affect an investigation
b. Collecting evidence in a manner that can be presented in court
Student Learning Outcomes Explain standard network infrastructure and how it affects investigations
Describe the reasons behind Defense in Depth, DMZs and the use of virtual machines in network infrastructure
Describe Internet protocols and their use such as IP, TCP, ARP, etc.
Explain how data hiding, encryption and other techniques are used by intruders
Explain and demonstrate where network based evidence can be found
Explain, install and demonstrate how to use popular network monitoring tools
Demonstrate how to perform packet and flow analysis.
Apply statistics to packet and flow analysis
Install and demonstrate competency in the use of popular tools such as Snort, Wireshark and Alien Vault
Demonstrate competency in the finding and analysis of log files from network devices such as routers and switches
Add to Portfolio (opens a new window)
|
|