In this course, students continue not only to learn how to identify and collect digital evidence through forensics search tools, but also to study the emerging data mining techniques. The topics include how to design a plan for a computer crime investigation; how to select a computer software tool to perform the investigation; how to articulate the laws applying to the appropriation of computers for forensics analysis; how to verify the integrity of the evidence being obtained; how to prepare the evidence collected for the use in the court; and how to present the evidence as an expert eyewitness in court. Some hypothetical and real cases are also discussed in class.
Note: Students are responsible to both be aware of and abide by prerequisites for CFS and ICS courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.First day attendance is mandatory.
4 Undergraduate credits
Effective August 26, 2006 to present
- Design a plan for a computer crime investigation.
- Identify and collect digital evidence using digital forensics tools.
- Select computer software tools to perform a digital forensic investigation.
- Verify the integrity of evidence obtained in a digital forensic investigation.
- Prepare evidence collected for use in court.
- Understand and apply the laws that apply to the appropriation of computers for forensic analysis.