|
Nov 22, 2024
|
|
|
|
NET 179 - Digital Forensic Analysis I Credits: 3 Lecture Hours: 2 Lab Hours: 2 Practicum Hours: 0 Work Experience: 0 Course Type: Voc/Tech This course serves as a technical introduction to the forensic process involved in the imaging, searching and processing of digital evidence from computers and mobile devices. Topics covered in the course include a strong emphasis on investigative documentation, recognition of potential evidence sources, sterile evidence acquisition and analysis, and data recovery methodologies. State-of- the-art hardware and software will be used in hands-on labs and case studies. Prerequisite: NET 373 Competencies
- Demonstrate court-acceptable investigation procedures and documentation
- Identify/plan the chain-of-custody
- Utilize fact-based reporting
- Describe the importance of logging search, seizure, and processing of all electronic evidence
- Keep notes/ongoing documentation pertinent to investigation
- List details contained in typical post-examination reports
- Explain the steps of a forensic investigation: verification of legal authority, collecting preliminary data, investigative environmental impact determination, securing and transporting evidence, acquisition of evidence, examination
- Examine appropriate methods for securing and transporting evidence
- Locate and document potential evidence
- Tag evidence
- Bag evidence
- Transport evidence
- Demonstrate appropriate evidence acquisition techniques
- Document system physical topology
- Document logical system characteristics including BIOS properties, boot configurations and date/time settings
- Outline common secondary data storage
- Identify physical interfaces
- Differentiate between magnetic and solid state storage
- Describe standard hard drive geometry, addressing, and configuration
- Describe purpose/functionality of RAID
- Identify required hardware and software for forensic investigations
- Develop appropriate procedures for forensic duplication
- Determine proper wiping techniques
- Demonstrate proper write-blocking using accepted methods
- Show the function of hash values in authentication of data acquisition
- Explain the function of compression in data acquisition
- Describe evidence examination
- Describe physical extraction/examination techniques
- Describe logical extraction/examination techniques
- Analyze data
- Use manual methods to retrieve data
- Use industry standard tools to automate analysis including
- Apply data hash value comparisons to improve efficiency
- Examine typical user data and system files using automated tools
- Perform searches using various keywords and contextual indicators
- Examine data contained in compressed data files/containers
- Examine web based artifacts
- Examine mobile device data
Add to Portfolio (opens a new window)
|
|