Sep 30, 2024  
GRCC Curriculum Database (2024-2025 Academic Year) 
    
GRCC Curriculum Database (2024-2025 Academic Year)
Add to Catalog (opens a new window)

CIS 276 - Computer Forensics


Description
This course introduces students to the forensic investigation of computer crime.  Students study a branch of forensic science that deals with the investigation and recovery of materials found in digital devices, often due to criminal activity, and learn the tools and methods used to conduct investigations involving digital material. Topics include investigation tools, evidence acquisition and control, and writing investigation reports. Ultimately, students begin the journey to becoming skilled digital forensics investigators.
Credit Hours: 3
Contact Hours: 3
School: School of STEM
Department: Computer Information Systems
Discipline: CIS
Last Revision Date Effective: 2017-04-11 10:29:23
Course Review & Revision Year: 2025-2026
Course Type:
Program Requirement- Offering designed to meet the learning needs of students in a specific GRCC program.
Course Format:
Lecture - 1:1

General Education Requirement: None
General Education Learner Outcomes (GELO):
NA
Course Learning Outcomes:
  1. Identify the role of computer forensics in responding to crimes and solving business challenges.
  2. Examine system forensics issues, laws, and skills.
  3. Procure evidence in physical and virtualized environments.
  4. Examine the impact of sequestration on the evidence-gathering process.
  5. Collect evidence in network and e-mail environments.
  6. Examine automated digital forensic analysis.
  7. Report investigative findings of potential evidentiary value.
  8. Examine the constraints on digital forensic investigations.
  9. Clearly and completely state and describe a problem/issue. 
  10. Use well-designed search strategies to gather data and information. 

Approved for Online Delivery?: Yes
Course Outline:
I.  Introduction to Forensics

II.  Overview of Computer Crime

III.  Forensics Methods and Labs

IV.  Collecting, Seizing, and Protecting Evidence

V.  Understanding Information-Hiding Techniques

VI.  Recovering Data

VII.  Email Forensics

VIII.  Windows Forensics

IX.  Linux Forensics

X.  Mac Forensics

XI.  Mobile Forensics

XII.  Performing Network Analysis

XIII.  Incident and Intrusion Response

XIV.  Trends and Future Directions

XV.  System Forensics Resources
Mandatory CLO Competency Assessment Measures:
None
Name of Industry Recognize Credentials: None
Instructional Strategies:
Lecture:  30-60%

Lab work:  10-40%

Facilitated discussion: 0-20%

Group work: 0-10%

 


Mandatory Course Components:
None
Academic Program Prerequisite: None
Prerequisites/Other Requirements: CIS 178  (C or Higher)
English Prerequisite(s): None
Math Prerequisite(s): None
Course Corerequisite(s): None
Course-Specific Placement Test: None
Consent to Enroll in Course: No Department Consent Required
Total Lecture Hours Per Week: 3
Faculty Credential Requirements:
Master’s Degree (GRCC general requirement), 18 graduate credit hours in discipline being taught (HLC Requirement), Professionally qualified through work experience in field (Perkins Act or Other) (list below)
Faculty Credential Requirement Details: 4000 hours of Professional Network Security Administration or Post Graduate Degree in Information Security
Maximum Course Enrollment: 24
Equivalent Courses: None
Dual Enrollment Allowed?: No
Number of Times Course can be taken for credit: 1
First Term Valid: Fall 2015 (8/1/2015)
Programs Where This Courses is a Requirement:
CyberSecurity, Certificate
1st Catalog Year: 2015-2016
People Soft Course ID Number: 104383
Course CIP Code: 11.9999



Add to Catalog (opens a new window)