|
Jun 01, 2025
|
|
|
|
NET 373 - Forensic Prac Cybersecurity Credits: 4 Lecture Hours: 2 Lab Hours: 4 Practicum Hours: 0 Work Experience: 0 Course Type: Voc/Tech Upon completion of this course, students will be familiar with the interface, file management, resource allocation and common administration procedures of various popular operating systems. The course describes data organization and file properties that contribute to forensic investigation. Additional topics include a strong emphasis on investigative documentation, recognition of potential evidence sources, sterile evidence acquisition and analysis, and data recovery methodologies. State-of-the-art hardware and software will be used in hands-on labs and case studies. Competencies
- Interpret computer codes and numbering systems
- Describe ASCII codes
- Explain binary numbering systems
- Explain hexadecimal numbering systems
- Employ a course of action through critical thinking
- Develop problem-solving skills
- Reinforce fundamental knowledge and skills through new situations
- Defend proposed solution or course of action
- Formulate opinions based on knowledge and experience
- Evaluate purpose of a computer operating system (OS) and its components
- Define kernel
- Differentiate between single-user and multi-user systems
- Contrast file management implementations
- Apply the effective use of a Hex Editor application
- Demonstrate identifying data offsets.
- Practice inserting, altering, deleting, and carving data manually and using the software tools
- Perform binary math using XOR, ADD, ADD, and subtract
- Evaluate binary encryption schemes
- Define what encryption is
- Contrast different binary encryption methods
- Interpret binary level encryption methods
- Interpret binary level decryption methods
- Distinguish file types by their signatures
- Classify common file extensions including, but not limited to: .txt, .pdf, .doc, .xls, .jpg, .gif, .bmp, .tmp, .htm, .log, .zip
- Explain the correlation of “magic numbers”/file signatures and specific application data
- Recover deleted data based on their signature
- Explore the key components of the Master Boot Record (MBR) Partitioning
- Break down the MBR partition table
- Examine sectors and clusters
- Differentiate between partitions and volumes
- Recover deleted MBR partitions
- Examine the key components of the GUID Partition Table
- Differentiate the Master Boot Record (MBR) and GUID Partition Table (GPT) organizational schemes
- Decode appropriate the partition header
- Decode the GPT partition table
- Diagram the backup partition table
- Recover deleted GPT partitions
- Explain the primary OS artifacts
- Describe file naming conventions
- Describe dating methods (creation/modification/access)
- Identify file attributes
- Describe metadata
- Analyze the FAT file systems
- Differentiate between FAT16 and FAT32
- Parse the FAT volume boot record
- Parse the FAT directory structure
- Outline how files are saved in a FAT file system
- Outline what occurs when a file is deleted
- Recover deleted files
- Outline what occurs when drive is formatted with a FAT file system
- Analyze the NTFS file system
- Differentiate between FAT and NTFS
- Parse the NTFS volume boot record
- Characterize the Metadata file system files
- Parse the $MFT structure
- Outline how files are saved in a NTFS file system
- Outline what occurs when a file is deleted
- Outline what occurs when drive is formatted with a NTFS file system
- Examine the exFAT file system.
- Differentiate between FAT and NTFS and exFAT
- Parse the exFAT volume boot record
- Characterize the Metadata file system files
- Parse the exFAT directory structure
- Outline how files are saved in a exFAT file system
- Outline what occurs when a file is deleted
- Outline what occurs when drive is formatted with an exFAT file system
Competencies Revised Date: AY2022
Add to Portfolio (opens a new window)
|
|