This course introduces students to computer forensics, the emerging role of the computer forensics examiner, forensic evidence preservation, and legal and ethical foundations. This course provides a comparative study of information technology, evidence analysis, chain of custody, and data retrieval from computer hardware and software applications. Students have hands-on experiences using various computer forensic methods, evidence preservation techniques and documentation.
Use the correct investigating tools and procedures to maximize effectiveness of evidence gathering (Program Goal 2).
Maintain evidence in pristine condition for it to be admissible in a legal action, (Program Goal 2).
Investigate large-scale attacks such as identity theft, fraud, phishing, extortion, and malware infections (Program Goal 2).
Demonstrate knowledge of the legal and ethical foundations for proper handling of traditional and electronic evidence, as well as the laws regarding search warrants and civil rights (Program Goal 2).
Prepare computer forensics documentation, and recognize data analysis techniques and reporting protocols (Program Goal 2).
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.