| |
Mar 04, 2026
|
|
|
|
|
CIS 276 - Computer Forensics Description This course introduces students to the forensic investigation of computer crime. Students study a branch of forensic science that deals with the investigation and recovery of materials found in digital devices, often due to criminal activity, and learn the tools and methods used to conduct investigations involving digital material. Topics include investigation tools, evidence acquisition and control, and writing investigation reports. Ultimately, students begin the journey to becoming skilled digital forensics investigators. Credit Hours: 3 Contact Hours: 3 Prerequisites/Other Requirements: CIS 178 (C or Higher) English Prerequisite(s): None Math Prerequisite(s): None Course Corequisite(s): None Academic Program Prerequisite: None Consent to Enroll in Course: No Department Consent Required Dual Enrollment Allowed?: No Number of Times Course can be taken for credit: 1 Programs Where This Course is a Requirement: CyberSecurity, Certificate General Education Requirement: None General Education Learner Outcomes (GELO): NA Course Learning Outcomes:
- Identify the role of computer forensics in responding to crimes and solving business challenges.
- Examine system forensics issues, laws, and skills.
- Procure evidence in physical and virtualized environments.
- Examine the impact of sequestration on the evidence-gathering process.
- Collect evidence in network and e-mail environments.
- Examine automated digital forensic analysis.
- Report investigative findings of potential evidentiary value.
- Examine the constraints on digital forensic investigations.
- Clearly and completely state and describe a problem/issue.
- Use well-designed search strategies to gather data and information.
Course Outline: I. Introduction to Forensics
II. Overview of Computer Crime
III. Forensics Methods and Labs
IV. Collecting, Seizing, and Protecting Evidence
V. Understanding Information-Hiding Techniques
VI. Recovering Data
VII. Email Forensics
VIII. Windows Forensics
IX. Linux Forensics
X. Mac Forensics
XI. Mobile Forensics
XII. Performing Network Analysis
XIII. Incident and Intrusion Response
XIV. Trends and Future Directions
XV. System Forensics Resources Approved for Online and Hybrid Delivery?: Yes Instructional Strategies: Lecture: 30-60%
Lab work: 10-40%
Facilitated discussion: 0-20%
Group work: 0-10%
Mandatory Course Components: None Equivalent Courses: None Accepted GRCC Advanced Placement (AP) Exam Credit: None AP Min. Score: NA Name of Industry Recognize Credentials: None
Course prepares students to seek the following external certification: No Course-Specific Placement Test: None Mandatory Department Assessment Measures: None Course Type: Program Requirement- Offering designed to meet the learning needs of students in a specific GRCC program. Course Format: Lecture - 1:1 Total Lecture Hours Per Week: 3 People Soft Course ID Number: 104383 Course CIP Code: 11.9999 Maximum Course Enrollment: 24 School: School of STEM Department: Computer Information Systems Discipline: CIS First Term Valid: Fall 2015 (8/1/2015) 1st Catalog Year: 2015-2016 Faculty Credential Requirements: Master’s Degree (GRCC general requirement), 18 graduate credit hours in discipline being taught (HLC Requirement), Professionally qualified through work experience in field (Perkins Act or Other) (list below) Faculty Credential Requirement Details: 4000 hours of Professional Network Security Administration or Post Graduate Degree in Information Security Last Revision Date Effective: 2017-04-11 10:29:23 Course Review & Revision Year: 2025-2026
Add to Catalog (opens a new window)
|
|