Feb 08, 2023  
2021-2022 Undergraduate Academic Catalog 
2021-2022 Undergraduate Academic Catalog [ARCHIVED CATALOG]

Add to Portfolio (opens a new window)

BA 4750 - Computer and Info Systems Forensics

2 lecture hours 2 lab hours 3 credits
Course Description
The rapid advance of technology and social media has created significant demand for highly educated specialists in the discipline of computer and information systems forensics. The next generation of “digital detectives” will have to possess the knowledge, skills, and experience to conduct complex, data-intensive forensics examinations involving various operating systems, platforms, and file types. This hands-on, lab-based course guides students through conducting a high-tech investigation, from acquiring digital evidence to reporting findings with special emphasis on ethics. Topics covered include how to set up a forensics lab, how to acquire the proper and necessary tools, and how to conduct the investigation and subsequent digital analysis. The lab-based course includes face-to-face class sessions, in-class and virtual labs. This course maps to and helps prepare for a number of certifications including the International Association of Computer Investigative Specialists (IACIS), Computer|Hacking Forensic Investigator (C|HFI), and the globally recognized CISSP Certified Information Systems Security Professional certifications. (prereq: BA 3720 )
Course Learning Outcomes
Upon successful completion of this course, the student will be able to:
  • Understand computer investigations
  • Data acquisition
  • Process crime and incident scenes
  • Work with computer forensics tools
  • Work with various operating and file systems
  • Investigate email, cell phones, and mobile devices
  • Report writing and testimony for high-tech investigation
  • Witness ethics

Prerequisites by Topic
  • Networking, operating system, and computer security experience

Course Topics
  • The profession of computer forensics and investigation
  • Computer investigations
  • Data acquisition
  • Processing crime and incident scenes
  • Working with Windows and DOS systems
  • Computer forensics tools
  • Computer Forensics analysis and validation
  • Recovering graphic files
  • Virtual machines, network forensics, and live acquisitions
  • E-mail investigations
  • Cell phone and mobile device forensics
  • Report writing and expert testimony in high-tech investigations
  • Ethics for the expert witness

Dr. Jeffrey Blessing

Add to Portfolio (opens a new window)