Apr 19, 2024  
2023-24 Catalog 
    
2023-24 Catalog
Add to Portfolio (opens a new window)

CIS 360 - Mobile Forensics

5 Credits
For completion of the BAS in CyberSecurity and Forensics. It is assumed students have had an introductory course in digital forensics. Students will learn the issues of forensics pertinent to mobile and wireless. This includes devices such as cell phones, palmtops, smart phones, iPhones, iPads, digital cameras, pagers, etc. Students will be exposed to commercial and shareware applications that can be used.

Pre-requisite(s) CIS 155 min 2.0
Program Admission Required Yes Admitted Program BAS - CIS
FeesCF

Quarters Typically Offered
Fall Evening
Spring Evening

Designed to Serve For students admitted to the BAS program in CyberSecurity and Forensics.
Active Date 20200330T21:14:47

Grading Basis Decimal Grade
Class Limit 24
Contact Hours: Lecture 44 Lab 22
Total Contact Hours 66
Degree Distributions:
ProfTech Course Yes
Restricted Elective Yes
Course Outline
  1. Mobile device communications and characteristics
    1. Components of a digital communications system
    2. Digital Signaling
    3. Spread Spectrum Signals
    4. Multi-User Communication Access Techniques
    5. CDMA, TDMA, FDMA, SDMA, PDMA
  2. Mobile Technologies
    1. 2G -> 3G -> 4G / LTE -> 5G, 6G
    2. Standards Heritage
    3. Core Architecture Evolution
    4. Design Choices
    5. Encryption
    6. Wireless Security (WEP vs WPA2)
  3. Mobile Devices
    1. Tablets - iOS and Android
    2. Data devices (MP3, iPods, etc.)
    3. Smart Phones
    4. Feature Phones
    5. Misc. devices (GPS, personal fitness monitors, drones, etc.)
  4. Mobile Device Operating Systems
    1. iOS
    2. Windows
    3. Android
    4. Tizen
  5. Mobile device data extraction
    1. Jail-breaking
    2. Rooting
    3. Logical
    4. File System
    5. Physical
    6. JTAG
    7. SIM cards
    8. Chip-off (lecture only, no hands on for chip-off)
  6. Mobile device attacks & vulnerabilities
    1. Applications
    2. Passwords
    3. Encryption
    4. Unsecured WiFi connections
    5. Security patches
    6. Physical theft


Student Learning Outcomes
Explain the characteristics of mobile device communications including signal types, communication access, etc.

Describe methods for the acquisition/analysis of mobile devices (e.g., device storage, system data, cell tower logs).

Use commercial and open source software to acquire and analyze a variety of mobile devices.

Explain the legal issues related to mobile device forensic activities.

Compare and contrast the various mobile device data extraction methodologies and understand the capabilities and risks associated with each including jailbreaking and rooting.

Explain the strengths and weaknesses of various mobile encryption standards such as WEP and which ones have been addressed by forensic software and how.



Add to Portfolio (opens a new window)