INFO 5531 Computer Forensics Essentials 3 credits

 Introduction to issues of both in data privacy and computer forensics - using available tools learners can reveal the stored passwords on their computer and access previously deleted data. Explains of the role of computer forensics in both the business and private worlds, identifies he current techniques and tools for forensics examinations; describes and identifies basic principles of good professional practice for a forensic computer practitioner; develops familiarity with forensic tools and application in different situations. Risk exposure for electronic commerce business; offenders and abuses; criminal opportunities; evidential aspects, case studies, E-discovery, forensic readiness, corporate planning and response, from evidence collection to business continuity; testing vulnerabilities; reverse engineering. Specific, evaluated graduate-level activities, and/or performances are identified in the course syllabus. PREREQ: INFO 5507 and INFO 3380 or permission of instructor.

INFO 5531 Computer Forensics Outline

I. Legal & Ethical Principles –
• This section addresses ethical behavior and compliance with regulatory frameworks.  
1. Nature of Evidence
2. Chain of Custody
3. Rules of Procedure
4. Role of Expert Witness
5. Codes of Ethics

II. Investigations –
• This section encompasses the investigative measures and techniques required to gather digital evidence.
1. Investigative Process
2. Evidence Management
3. Criminal Investigations
4. Civil Investigations
5. Administrative Investigations
6. Response to Security Incidents
7. e-Discovery
8. Intellectual Property

III. Forensic Science –
• This section entails applying a broad spectrum of sciences and technologies to investigate and establish facts in relation to criminal or civil law.
1. Fundamental Principles
2. Forensic Methods
3. Forensic Planning & Analysis
4. Report Writing & Presentation
5. QA, Control, Management
6. Evidence Analysis Correlation

IV. Digital Forensics –
• This section refers to the collection of any digital evidence which can be defined as data stored or transmitted via electronic means.
1. Media & File System Forensics
2. Operating Systems Forensics
3. Network Forensics
4. Mobile Devices
5. Multimedia & Content
6. Virtual System Forensics
7. Forensic Techniques & Tools
8. Anti-Forensic Tech & Tools

V. Application Forensics –
• This section addresses the forensics complexities of the many application types that a forensics trained individual may encounter during a forensic investigation.
1. Software Forensics
2. Web, Email, Messaging
3. Database Forensics
4. Malware Forensics


VI. Hybrid & Emerging Technologies –
• This section of the course contains the ever evolving technologies that the forensic examiner is expected to have a sound understanding.
1. Cloud Forensics
2. Social Networks
3. Big Data Paradigm
4. Control Systems
5. Critical Infrastructure
6. Virtual/Augmented Reality

Syllabus can be found here

Sample Security Content:

  • Digital forensics
  • Risk management and mitigation
  • Legal and ethical implications
  • Vulnerability analysis
NIATEC National Science Foundation Information Assurance Directorate Department of Homeland Security CISSE Scholarship For Service