This course introduces students to computer forensics, the emerging role of the computer forensics examiner, forensic evidence preservation, and legal and ethical foundations. This course provides a comparative study of information technology, evidence analysis, chain of custody, and data retrieval from computer hardware and software applications. Students have hands-on experiences using various computer forensic methods, evidence preservation techniques and documentation.
- Use the correct investigating tools and procedures to maximize effectiveness of evidence gathering (Program Goal 2).
- Maintain evidence in pristine condition for it to be admissible in a legal action, (Program Goal 2).
- Investigate large-scale attacks such as identity theft, fraud, phishing, extortion, and malware infections (Program Goal 2).
- Demonstrate knowledge of the legal and ethical foundations for proper handling of traditional and electronic evidence, as well as the laws regarding search warrants and civil rights (Program Goal 2).
- Prepare computer forensics documentation, and recognize data analysis techniques and reporting protocols (Program Goal 2).