|
Jan 15, 2025
|
|
|
|
CIS 360 - Mobile Forensics5 Credits For completion of the BAS in CyberSecurity and Forensics. It is assumed students have had an introductory course in digital forensics. Students will learn the issues of forensics pertinent to mobile and wireless. This includes devices such as cell phones, palmtops, smart phones, iPhones, iPads, digital cameras, pagers, etc. Students will be exposed to commercial and shareware applications that can be used.
Pre-requisite(s) CIS 155 min 2.0 Program Admission Required Yes Admitted Program BAS - CIS FeesCF
Quarters Typically Offered Fall Evening Spring Evening
Designed to Serve For students admitted to the BAS program in CyberSecurity and Forensics. Active Date 20200330T21:14:47
Grading Basis Decimal Grade Class Limit 24 Contact Hours: Lecture 44 Lab 22 Total Contact Hours 66 Degree Distributions: ProfTech Course Yes Restricted Elective Yes Course Outline
- Mobile device communications and characteristics
- Components of a digital communications system
- Digital Signaling
- Spread Spectrum Signals
- Multi-User Communication Access Techniques
- CDMA, TDMA, FDMA, SDMA, PDMA
- Mobile Technologies
- 2G -> 3G -> 4G / LTE -> 5G, 6G
- Standards Heritage
- Core Architecture Evolution
- Design Choices
- Encryption
- Wireless Security (WEP vs WPA2)
- Mobile Devices
- Tablets - iOS and Android
- Data devices (MP3, iPods, etc.)
- Smart Phones
- Feature Phones
- Misc. devices (GPS, personal fitness monitors, drones, etc.)
- Mobile Device Operating Systems
- iOS
- Windows
- Android
- Tizen
- Mobile device data extraction
- Jail-breaking
- Rooting
- Logical
- File System
- Physical
- JTAG
- SIM cards
- Chip-off (lecture only, no hands on for chip-off)
- Mobile device attacks & vulnerabilities
- Applications
- Passwords
- Encryption
- Unsecured WiFi connections
- Security patches
- Physical theft
Student Learning Outcomes Explain the characteristics of mobile device communications including signal types, communication access, etc.
Describe methods for the acquisition/analysis of mobile devices (e.g., device storage, system data, cell tower logs).
Use commercial and open source software to acquire and analyze a variety of mobile devices.
Explain the legal issues related to mobile device forensic activities.
Compare and contrast the various mobile device data extraction methodologies and understand the capabilities and risks associated with each including jailbreaking and rooting.
Explain the strengths and weaknesses of various mobile encryption standards such as WEP and which ones have been addressed by forensic software and how.
Add to Portfolio (opens a new window)
|
|