Course Number and Title: ISY 270 Computer Forensics
This course introduces digital investigations, preparing students to acquire and analyze digital evidence. It covers file structures in different computer operating systems, data recovery techniques, data hiding, data preservation techniques, chain-of-evidence procedures and expert witness testimony.
- Examine computer forensics and investigations. (CCC 5; PGC 2)
- Evaluate different computer operating systems, there boot processes, and file systems. (CCC 5, 6; PGC 2)
- Prepare and evaluate current computer forensics tools. (CCC 5; PGC 2)
- Process crime and incident scenes. (CCC 5; PGC 2)
- Perform forensic analysis. (CCC 5; PGC 2)
- Write investigation reports, and prepare to become an expert witness. (CCC 5; PGC 2)
See Core Curriculum Competencies and Program Graduate Competencies at the end of the syllabus. CCPOs are linked to every competency they develop.
Upon completion of this course, the student will:
- Examine computer forensics and investigations.
- Compare definitions of computer forensics.
- Develop computer forensics resources.
- Prepare a computer investigation.
- Execute a computer investigation.
- Evaluate different computer operating systems, their boot processes, and file systems.
- Compare the different operating systems.
- Compare the different file systems.
- Explain boot processes for different operating systems.
- Prepare and evaluate current computer forensics tools.
- Prepare a basic forensics workstation.
- Evaluate computer forensics software command-line and graphical user interface (GUI) tools.
- Evaluate computer forensics hardware tools.
- Process crime and incident scenes.
- Prepare for a search.
- Secure computer incident or crime scene.
- Collect digital evidence.
- Perform forensic analysis.
- Acquire data with acquisition toolkits.
- Plan data recovery contingencies.
- Address data hiding techniques.
- Prepare email investigations.
- Recover image files.
- Write investigation reports, and prepare to become an expert witness.
- Create clearly written reports pertaining to supporting materials.
- Examine a formal report.
- Prepare for deposition, court testimony, and cross-examination.
Students must demonstrate proficiency on all CCPOs at a minimal 75 percent level to successfully complete the course. The grade will be determined using the Delaware Tech grading system:
Students should refer to the Student Handbook for information on the Academic Standing Policy, the Academic Integrity Policy, Student Rights and Responsibilities, and other policies relevant to their academic progress.
- Apply clear and effective communication skills.
- Use critical thinking to solve problems.
- Collaborate to achieve a common goal.
- Demonstrate professional and ethical conduct.
- Use information literacy for effective vocational and/or academic research.
- Apply quantitative reasoning and/or scientific inquiry to solve practical problems.
- Identify and remediate vulnerabilities.
- Design, plan, and install network systems.
- Install and configure operating systems.
- Demonstrate the ability to write and debug scripts.
- Demonstrate professionalism and ethical responsibility.
- Communicate effectively to diverse groups of stakeholders.
- Perform change management analysis and documentation.
- Perform evidence collection and forensics analysis.
- Create, modify, and/or implement security policies.
The College is committed to providing reasonable accommodations for students with disabilities. Students are encouraged to schedule an appointment with the campus Disabilities Support Counselor to request an accommodation needed due to a disability. A listing of campus Disabilities Support Counselors and contact information can be found at the disabilities services web page or visit the campus Advising Center.