ISY 270 Computer Forensics


Campus Location:
Georgetown, Dover, Wilmington
Effective Date:
2018-51
Prerequisite:
CNE 192
Co-Requisites:

None

Course Credits and Hours:
4.00 credits
3.00 lecture hours/week
2.00 lab hours/week
Course Description:

This course introduces digital investigations, preparing students to acquire and analyze digital evidence. It covers file structures in different computer operating systems, data recovery techniques, data hiding, data preservation techniques, chain-of-evidence procedures and expert witness testimony.

Required Text(s):

Obtain current textbook information by viewing the campus bookstore online or visit a campus bookstore. Check your course schedule for the course number and section.

Additional Materials:

None

Schedule Type:
Classroom Course
Disclaimer:

None

Core Course Performance Objectives (CCPOs):
  1. Examine computer forensics and investigations. (CCC 5; PGC 2)
  2. Evaluate different computer operating systems, there boot processes, and file systems. (CCC 5, 6; PGC 2)
  3. Prepare and evaluate current computer forensics tools. (CCC 5; PGC 2)
  4. Process crime and incident scenes. (CCC 5; PGC 2)
  5. Perform forensic analysis. (CCC 5; PGC 2)
  6. Write investigation reports, and prepare to become an expert witness. (CCC 5; PGC 2)

See Core Curriculum Competencies and Program Graduate Competencies at the end of the syllabus. CCPOs are linked to every competency they develop.

Measurable Performance Objectives (MPOs):

Upon completion of this course, the student will:

  1. Examine computer forensics and investigations.
    1. Compare definitions of computer forensics.
    2. Develop computer forensics resources.
    3. Prepare a computer investigation.
    4. Execute a computer investigation.
  2. Evaluate different computer operating systems, their boot processes, and file systems.
    1. Compare the different operating systems.
    2. Compare the different file systems.
    3. Explain boot processes for different operating systems.
  3. Prepare and evaluate current computer forensics tools.
    1. Prepare a basic forensics workstation.
    2. Evaluate computer forensics software command-line and graphical user interface (GUI) tools.
    3. Evaluate computer forensics hardware tools.
  4. Process crime and incident scenes.
    1. Prepare for a search.
    2. Secure computer incident or crime scene.
    3. Collect digital evidence.
  5. Perform forensic analysis.
    1. Acquire data with acquisition toolkits.
    2. Plan data recovery contingencies.
    3. Address data hiding techniques.
    4. Prepare email investigations.
    5. Recover image files.
  6. Write investigation reports, and prepare to become an expert witness.
    1. Create clearly written reports pertaining to supporting materials.
    2. Examine a formal report.
    3. Prepare for deposition, court testimony, and cross-examination.
Evaluation Criteria/Policies:

Students must demonstrate proficiency on all CCPOs at a minimal 75 percent level to successfully complete the course. The grade will be determined using the Delaware Tech grading system:

92 100 = A
83 91 = B
75 82 = C
0 74 = F

Students should refer to the Student Handbook for information on the Academic Standing Policy, the Academic Integrity Policy, Student Rights and Responsibilities, and other policies relevant to their academic progress.

 
Core Curriculum Competencies (CCCs are the competencies every graduate will develop):
  1. Apply clear and effective communication skills.
  2. Use critical thinking to solve problems.
  3. Collaborate to achieve a common goal.
  4. Demonstrate professional and ethical conduct.
  5. Use information literacy for effective vocational and/or academic research.
  6. Apply quantitative reasoning and/or scientific inquiry to solve practical problems.
Program Graduate Competencies (PGCs are the competencies every graduate will develop specific to his or her major):
  1. Identify and remediate vulnerabilities.
  2. Design, plan, and install network systems.
  3. Install and configure operating systems.
  4. Demonstrate the ability to write and debug scripts.
  5. Demonstrate professionalism and ethical responsibility.
  6. Communicate effectively to diverse groups of stakeholders.
  7. Perform change management analysis and documentation.
  8. Perform evidence collection and forensics analysis.
  9. Create, modify, and/or implement security policies.
Disabilities Support Statement:

The College is committed to providing reasonable accommodations for students with disabilities. Students are encouraged to schedule an appointment with the campus Disabilities Support Counselor to request an accommodation needed due to a disability. A listing of campus Disabilities Support Counselors and contact information can be found at the disabilities services web page or visit the campus Advising Center.

Minimum Technology Requirements:
Minimum technology requirements for online, hybrid, video conferencing and web conferencing courses.