Apr 24, 2024  
2023-24 Catalog 
    
2023-24 Catalog
Add to Portfolio (opens a new window)

CIS 235 - Cyber Forensics and Data Recovery

5 Credits
Builds on CIS 155. Covers evidentiary procedures more fully and addresses the ramifications to digital evidence/computer forensics in a rapidly changing technology. Addresses enterprise systems, databases, distributed system data recovery and investigations. Covers a variety of devices and Linux tools. Prepares students to perform digital forensics investigations in large corporate environments, government environments and the medical field while developing an understanding of the challenges awaiting them, including intrusion scenarios.

Pre-requisite(s) CIS 155 min 2.0
FeesCF

Quarters Typically Offered
Winter Evening
Designed to Serve Students enrolled in the Digital Forensics and Investigations AAS program. Industry professionals with hardware experience needing hardware and digital recovery and computer forensics investigation skills.
Active Date 20200330T21:14:45

Grading Basis Decimal Grade
Class Limit 24
Contact Hours: Lecture 44 Lab 22
Total Contact Hours 66
Degree Distributions:
ProfTech Course Yes
Restricted Elective Yes
Course Outline
  • Understand the Windows and Linux operating system structures as they apply to computer forensic importance.
  • Understand file headers.
  • Utilize basic Linux commands to recover or identify forensic data.
  • Identify corporate network resources that can be brought to bear for digital investigations. 
  • Create forensic images of virtual machines and analyze same.
  • Utilize various forensics tools such as X-ways and Winhex.
  • Have an introductory overview of electronic discovery tools and methods.
  • Conduct in-depth data carving and Registry reviews of forensic evidence.
  • Document Forensic processes and procedures used in the forensic investigation.


Student Learning Outcomes
Discuss the issues and importance of digital evidence in civil, corporate and criminal litigation cases.

Effectively use the command line to investigate the Linux operating system and employ Linux based forensics tools.

Effectively create forensic images of virtual environments.

Convert forensic evidence into virtual environments

Analyze forensic data using a variety of tools isuch as X-Ways, WinHex and other software.

Create and use forensic boot discs and virtual machines.

Document processes and procedures used in the various steps of the forensic investigation and evidence examinations.



Add to Portfolio (opens a new window)