|
Sep 30, 2024
|
|
|
|
CIS 276 - Computer Forensics Description This course introduces students to the forensic investigation of computer crime. Students study a branch of forensic science that deals with the investigation and recovery of materials found in digital devices, often due to criminal activity, and learn the tools and methods used to conduct investigations involving digital material. Topics include investigation tools, evidence acquisition and control, and writing investigation reports. Ultimately, students begin the journey to becoming skilled digital forensics investigators. Credit Hours: 3 Contact Hours: 3 School: School of STEM Department: Computer Information Systems Discipline: CIS Last Revision Date Effective: 2017-04-11 10:29:23 Course Review & Revision Year: 2025-2026 Course Type: Program Requirement- Offering designed to meet the learning needs of students in a specific GRCC program. Course Format: Lecture - 1:1
General Education Requirement: None General Education Learner Outcomes (GELO): NA Course Learning Outcomes:
- Identify the role of computer forensics in responding to crimes and solving business challenges.
- Examine system forensics issues, laws, and skills.
- Procure evidence in physical and virtualized environments.
- Examine the impact of sequestration on the evidence-gathering process.
- Collect evidence in network and e-mail environments.
- Examine automated digital forensic analysis.
- Report investigative findings of potential evidentiary value.
- Examine the constraints on digital forensic investigations.
- Clearly and completely state and describe a problem/issue.
- Use well-designed search strategies to gather data and information.
Approved for Online Delivery?: Yes Course Outline: I. Introduction to Forensics
II. Overview of Computer Crime
III. Forensics Methods and Labs
IV. Collecting, Seizing, and Protecting Evidence
V. Understanding Information-Hiding Techniques
VI. Recovering Data
VII. Email Forensics
VIII. Windows Forensics
IX. Linux Forensics
X. Mac Forensics
XI. Mobile Forensics
XII. Performing Network Analysis
XIII. Incident and Intrusion Response
XIV. Trends and Future Directions
XV. System Forensics Resources Mandatory CLO Competency Assessment Measures: None Name of Industry Recognize Credentials: None Instructional Strategies: Lecture: 30-60%
Lab work: 10-40%
Facilitated discussion: 0-20%
Group work: 0-10%
Mandatory Course Components: None Academic Program Prerequisite: None Prerequisites/Other Requirements: CIS 178 (C or Higher) English Prerequisite(s): None Math Prerequisite(s): None Course Corerequisite(s): None Course-Specific Placement Test: None Consent to Enroll in Course: No Department Consent Required Total Lecture Hours Per Week: 3 Faculty Credential Requirements: Master’s Degree (GRCC general requirement), 18 graduate credit hours in discipline being taught (HLC Requirement), Professionally qualified through work experience in field (Perkins Act or Other) (list below) Faculty Credential Requirement Details: 4000 hours of Professional Network Security Administration or Post Graduate Degree in Information Security Maximum Course Enrollment: 24 Equivalent Courses: None Dual Enrollment Allowed?: No Number of Times Course can be taken for credit: 1 First Term Valid: Fall 2015 (8/1/2015) Programs Where This Courses is a Requirement: CyberSecurity, Certificate 1st Catalog Year: 2015-2016 People Soft Course ID Number: 104383 Course CIP Code: 11.9999
Add to Catalog (opens a new window)
|
|