2011-2012 Catalog 
    
    Mar 29, 2024  
2011-2012 Catalog [ARCHIVED CATALOG]

Add to Personal Catalog (opens a new window)

CIS 293 - Digital Forensics III


5.0 Credits
Detecting/documenting root kits, the Trojan horse theory, & other advanced topics. Creation of hash sets of hacker tools and illicit programs to be made available to digital forensic professionals throughout the world. Topics may vary based on current trends. Prerequisite: CIS 273  with a GPA of a least 2.5, or instructor approval.

Course Objectives
Upon successful completion of this course, students will be able to:

  1. Demonstrate methods to use VMware/Virtual PC as a forensic analysis tool. [REASON]
  2. Utilize common forensic tools to process a case from start to finish. [REASON]
  3. Create a comprehensive forensic analysis report. [COMMUNICATE]
  4. Develop and use regular expressions to increase search effectiveness. [REASON]
  5. Create and verify hash sets of various formats, including Hashkeeper, NSRL, and FTK. [REASON]
  6. Describe a code of ethics and conduct related to the information security and digital forensics professions. [COMMUNICATE]
  7. Identify standards of professionalism and ethical behavior for information security and digital forensics professionals, and apply these standards successfully to ethical dilemmas. [ACT]
  8. Create a list of issues related to computer privacy and document how to address them technically and ethically. [REASON]



Add to Personal Catalog (opens a new window)