|
Jan 15, 2025
|
|
|
|
CIS 235 - Cyber Forensics and Data Recovery5 Credits Builds on CIS 155. Covers evidentiary procedures more fully and addresses the ramifications to digital evidence/computer forensics in a rapidly changing technology. Addresses enterprise systems, databases, distributed system data recovery and investigations. Covers a variety of devices and Linux tools. Prepares students to perform digital forensics investigations in large corporate environments, government environments and the medical field while developing an understanding of the challenges awaiting them, including intrusion scenarios.
Pre-requisite(s) CIS 155 min 2.0 FeesCF
Quarters Typically Offered Winter Evening Designed to Serve Students enrolled in the Digital Forensics and Investigations AAS program. Industry professionals with hardware experience needing hardware and digital recovery and computer forensics investigation skills. Active Date 20200330T21:14:45
Grading Basis Decimal Grade Class Limit 24 Contact Hours: Lecture 44 Lab 22 Total Contact Hours 66 Degree Distributions: ProfTech Course Yes Restricted Elective Yes Course Outline
- Understand the Windows and Linux operating system structures as they apply to computer forensic importance.
- Understand file headers.
- Utilize basic Linux commands to recover or identify forensic data.
- Identify corporate network resources that can be brought to bear for digital investigations.
- Create forensic images of virtual machines and analyze same.
- Utilize various forensics tools such as X-ways and Winhex.
- Have an introductory overview of electronic discovery tools and methods.
- Conduct in-depth data carving and Registry reviews of forensic evidence.
- Document Forensic processes and procedures used in the forensic investigation.
Student Learning Outcomes Discuss the issues and importance of digital evidence in civil, corporate and criminal litigation cases.
Effectively use the command line to investigate the Linux operating system and employ Linux based forensics tools.
Effectively create forensic images of virtual environments.
Convert forensic evidence into virtual environments
Analyze forensic data using a variety of tools isuch as X-Ways, WinHex and other software.
Create and use forensic boot discs and virtual machines.
Document processes and procedures used in the various steps of the forensic investigation and evidence examinations.
Add to Portfolio (opens a new window)
|
|