CYB449 - Computer Forensics Investigative Process
Course Description
This course focuses on a detailed approach to computer forensics and evidence analysis. In this course students will cover major forensic investigation scenarios that enable students to acquire necessary hands-on experience on forensic investigation techniques including Searching and Seizing Computers, Digital Forensics, First Responder Procedures, and Understanding Hard Disks and File Systems.
This undergraduate course is 5 weeks.
PLEASE NOTE:
Attendance and participation are mandatory in all university courses, and specific requirements may differ by course. If attendance requirements are not met, a student may be removed from the course. Please review the Course Attendance Policy in the Catalog for more information.
Course Objectives
Week 1
- Classify different types of cybercrimes.
- Evaluate types and sources of digital evidence.
- Describe roles and responsibilities of computer forensics investigators.
- Discuss the code of ethics for computer forensics investigators.
Week 2
- Determine the phases involved in the computer forensics investigation process.
- Describe the roles of the first responder.
- Perform search and seizure, evidence collection, management, and preservation.
- Discuss about data duplication, deleted data recovery, and evidence examination.
Week 3
- Describe the different types of disk drives and their characteristics.
- Identify the types of hard disk interfaces and discuss the various hard disk components.
- Describe hard disk partitions.
- Summarize various boot processes.
Week 4
- Differentiate between various RAID storage systems.
- Demonstrate file system analysis.
- Discuss applications of The Sleuth Kit (TSK).
Week 5
- Compare live and static data acquisition.
- Determine the best data acquisition method.
- Describe different data acquisition and duplication tools and when they should be used.
- Summarize the data acquisition and duplication best practices.
Prerequisites
CYB/447 – Insider Threat and Reporting or equivalentDisclaimers
The University of Phoenix reserves the right to modify courses.
While widely available, not all programs are available to residents of all states. Please check with an Enrollment Representative.
Transferability of credit is at the discretion of the receiving institution. It is the student’s responsibility to confirm whether or not credits earned at University of Phoenix will be accepted by another institution of the student’s choice.
If you have a question contact us at 866-354-1800.
This course belongs to the following bundles offer:
- Computer Hacking Forensics Investigator Course Collection : Computer Hacking Forensics Investigator Course Collection