CFOR 200 Computer Forensics II

This course is designed to cover advanced concepts in computer forensic analysis and the development of investigative thinking and awareness. This course covers basic criminal law concepts, related national electronic laws, and sources of electronic information as it applies to computer forensics. Study of data hiding techniques, encryption, and password recovery will also be covered. Students will have hands-on laboratory experience using various computer forensic tools, evidence-gathering, and documentation techniques.

Credits

3

Prerequisite

CFOR 101

Hours Weekly

2 hours lecture, 2 hours lab weekly

Course Objectives

  1. 1. Explore various career opportunities for computer forensic examiners.
  2. 2. Define identity theft.
  3. 3. Define subpoenas and search warrants.
  4. 4. Examine local and national laws affecting computer forensic examiners.
  5. 5. Identify sources of electronic information for computer forensic examiners.
  6. 6. Describe proper evidence handling and seizure techniques using case studies.
  7. 7. Prepare electronic evidence documentation reports.
  8. 8. Develop investigative thinking and awareness of electronic media.
  9. 9. Examine various data hiding techniques.
  10. 10. Define encryption terminology and hashing.
  11. 11. Compare and contrast electronic password cracking and password recovery tools.

Course Objectives

  1. 1. Explore various career opportunities for computer forensic examiners.
  2. 2. Define identity theft.
  3. 3. Define subpoenas and search warrants.
  4. 4. Examine local and national laws affecting computer forensic examiners.
  5. 5. Identify sources of electronic information for computer forensic examiners.
  6. 6. Describe proper evidence handling and seizure techniques using case studies.
  7. 7. Prepare electronic evidence documentation reports.
  8. 8. Develop investigative thinking and awareness of electronic media.
  9. 9. Examine various data hiding techniques.
  10. 10. Define encryption terminology and hashing.
  11. 11. Compare and contrast electronic password cracking and password recovery tools.