Transcript title
Practical Digital Forensics
Credits
4
Grading mode
Standard letter grades
Total contact hours
50
Lecture hours
30
Other hours
20
Course Description
Presents digital forensics instruction from a systems security perspective. Students participating in this intermediate-level class will use a variety of digital forensics tools and software; and are exposed to drive image making, investigations of files and documents, and working with various PC and mobile device hardware. Investigative techniques practiced in this class are performed in a secure environment.
Course learning outcomes
1. Analyze various cases to determine digital actions of a user.
2. Compare and contrast analysis differences between common computer operating systems.
3. Demonstrate analysis techniques to open SAM, SYSTEM and SECURITY files.
4. Demonstrate the creation of a digital image of a physical storage device.
5. Describe appropriate evidence handling process.
6. Describe how analysis of computer logs demonstrate attribution.
7. Describe various laws affecting the pursuance of a forensic analysis.
8. Explain how deleted digital information can be recovered.
9. Using an existing report template, write a report of an analysis of digital evidence for a case.
10. Using common digital forensics tools, demonstrate the technique for locating a variety of file types.
Content outline
- User actions:
- Evidential
- Non-evidential
- Operating Systems differences for forensic analysis Windows, MacOS, Linux
- File Types:
- SAM file types
- SYSTEM files and
- SECURITY files including logs
- Different digital images on physical storage devices:
- jpg
- png
- gnu
- mov
- Evidence handling processes
- Digital evidence
- Physical evidence
- Computer logging techniques - various access methods - evidence
- Attribution from evidence - OS analysis, logs, physical files, images
- Extracting evidence from a digital file
- Image
- Text
- Video
- Binary or Hex
- Legal implications of digital evidence versus physical evidence.
- Recovery of deleted or damaged information from physical devices.
- Recovery of deleted or damaged information from Internet sources
- Recovery of deleted or damaged information from Operating System or Dark Web sources.
- Location of hidden files and images
- Forensic Analysis reporting methods - tools and templates
- Legal requirements for Forensic Analysis reports
Required materials
None.