|
Jul 16, 2025
|
|
|
|
CIS 360 - Mobile Forensics5 Credits For completion of the BAS in Cybersecurity and Digital Forensics. It is assumed students have had an introductory course in digital forensics. Students will learn the issues of forensics pertinent to mobile and wireless. This includes devices such as cell phones, palmtops, smart phones, iPhones, iPads, digital cameras, pagers, etc. Students will be exposed to commercial and shareware applications that can be used.
Pre-requisite(s) CIS 155 min 2.0 Program Admission Required Yes Admitted Program BAS - CIS FeesAcademic Technology Fee
Quarters Typically Offered Spring Evening
Designed to Serve For students admitted to the BAS program in Cybersecurity and Digital Forensics. Active Date 20250401T11:43:49
Grading Basis Decimal Grade Class Limit 24 Contact Hours: Lecture 44 Lab 22 Total Contact Hours 66 Degree Distributions: ProfTech Course Yes Restricted Elective Yes Course Outline - Mobile device communications and characteristics
- Components of a digital communications system
- Digital Signaling
- Spread Spectrum Signals
- Multi-User Communication Access Techniques
- CDMA, TDMA, FDMA, SDMA, PDMA
- Mobile Technologies
- 2G -> 3G -> 4G / LTE -> 5G, 6G
- Standards Heritage
- Core Architecture Evolution
- Design Choices
- Encryption
- Wireless Security (WEP vs WPA2)
- Mobile Devices
- Tablets - iOS and Android
- Data devices (MP3, iPods, etc.)
- Smart Phones
- Feature Phones
- Misc. devices (GPS, personal fitness monitors, drones, etc.)
- Mobile Device Operating Systems
- iOS
- Windows
- Android
- Tizen
- Mobile device data extraction
- Jail-breaking
- Rooting
- Logical
- File System
- Physical
- JTAG
- SIM cards
- Chip-off (lecture only, no hands on for chip-off)
- Mobile device attacks & vulnerabilities
- Applications
- Passwords
- Encryption
- Unsecured WiFi connections
- Security patches
- Physical theft
Student Learning Outcomes Explain the characteristics of mobile device communications including signal types, communication access, etc.
Describe methods for the acquisition/analysis of mobile devices (e.g., device storage, system data, cell tower logs).
Use commercial and open source software to acquire and analyze a variety of mobile devices.
Explain the differences between Android and iOS security features.
Explain the legal issues related to mobile device forensic activities as they pertain to the Fourth Amendment and case law.
Compare and contrast the various drone extraction methodologies and understand the capabilities and legal risks associated with each including commercial versus private ownership.
Explain the strengths and weaknesses of various mobile encryption standards.
Add to Portfolio (opens a new window)
|
|