CFOR 101 Computer Forensics I

This course focuses on the emerging role of the computer forensics examiner, forensic evidence preservation and introduces students to computer forensic tools. This course provides a comparative study of information technology, evidence analysis, chain of custody, and data retrieval from computer hardware and software applications. Students will have hands-on laboratory experience using various computer forensic tools, evidence preservation techniques and documentation.

Credits

3

Hours Weekly

2 hours lecture, 2 hours lab weekly

Course Objectives

  1. 1. Define computer forensics and identify the laws related to computer forensics.
  2. 2. Describe processing crime and incident scene and chain of custody.
  3. 3. Identify the safety precautions required for working with computer equipment.
  4. 4. Identify PC motherboard components such as processor, memory, hard drives, zip drives and overall
    computer operation.
  5. 5. Perform basic forensic examination using DOS operating system.
  6. 6. Describe various forensic tools used in computer forensics.
  7. 7. Compare and contrast the main features of Windows based operating systems.
  8. 8. Install IDE and SCSI hard drives and configure primary partition and logical partition and analyze how
    data is stored.
  9. 9. Apply computer forensic procedures for seizure, preservation and documentation of electronic evidence.
  10. 10. Examine the role of unallocated space, RAM slack and file slack in computer forensics.
  11. 11. Define privileged communications and confidentiality.

Course Objectives

  1. 1. Define computer forensics and identify the laws related to computer forensics.
  2. 2. Describe processing crime and incident scene and chain of custody.
  3. 3. Identify the safety precautions required for working with computer equipment.
  4. 4. Identify PC motherboard components such as processor, memory, hard drives, zip drives and overall
    computer operation.
  5. 5. Perform basic forensic examination using DOS operating system.
  6. 6. Describe various forensic tools used in computer forensics.
  7. 7. Compare and contrast the main features of Windows based operating systems.
  8. 8. Install IDE and SCSI hard drives and configure primary partition and logical partition and analyze how
    data is stored.
  9. 9. Apply computer forensic procedures for seizure, preservation and documentation of electronic evidence.
  10. 10. Examine the role of unallocated space, RAM slack and file slack in computer forensics.
  11. 11. Define privileged communications and confidentiality.