CYB453 - Network, Wireless, Web, Email and Mobile Forensics
Course Description
This course focuses on a detailed approach to computer forensics and evidence analysis. In this course students will cover forensic investigation scenarios that enable students to acquire necessary hands-on experience using forensic investigation such as Steganography and Image File Forensics, Application Password Crackers, Log Capturing and Event Correlation, Investigating Logs and Network Traffic, Investigating Wireless and Web Attacks, Tracking Emails, Mobile Forensics and Investigative Reports.
This undergraduate course is 5 weeks.
This course has a prerequisite. Please see details in the Prerequisite section below.
PLEASE NOTE:
Attendance and participation are mandatory in all university courses, and specific requirements may differ by course. If attendance requirements are not met, a student may be removed from the course. Please review the Course Attendance Policy in the Catalog for more information.
Course Objectives
Week 1
- Describe the unique evidence that can be found through network forensics.
- Identify a variety of logs in hardware and software that track network?activity.
- Assess network forensic readiness.
Week 2
- Describe the evidence that can be found through?analyzing?Internet?of Things (IOT) and emergent technologies.
- Utilize tools and techniques to gather evidence related to network forensics
- Analyze data from a?network traffic?investigation
- Analyze evidence in logs related to network activity.
Week 3
- Examine types of web application attacks.
- Discuss challenges forensic investigators have in?performing?web application investigations.
- Examine the cache,?cookies, and history recorded in web browsers.
- Analyze?domain?and IP address queries related to a web attack.
Week 4
- Discuss the importance of database forensics and?impact?of data breaches.
- Examine evidence files related to database forensics.
- Analyze?tools and techniques for MSSQL and MySQL forensics.
Week 5
- Discuss the advantages and disadvantages of cloud computing from a user and forensic investigator perspective.
- Analyze the methods used by?common attacks on cloud services.
- Examine methods for investigating the cloud storage services Dropbox and Google Drive.
Prerequisites
A prerequisite is required for this course. The purpose of a prerequisite is to ensure students have the knowledge and/or skills needed to be successful in the course. Students are required to take the courses in this bundle in the prescribed sequence to ensure the prerequisites are met.
CYB451 - Computer Forensics Lab or equivalent
Disclaimers
The University of Phoenix reserves the right to modify courses.
While widely available, not all programs are available to residents of all states. Please check with an Enrollment Representative.
Transferability of credit is at the discretion of the receiving institution. It is the student’s responsibility to confirm whether or not credits earned at University of Phoenix will be accepted by another institution of the student’s choice.
If you have a question contact us at 866-354-1800.
This course belongs to the following bundles offer:
- Computer Hacking Forensics Investigator Course Collection : Computer Hacking Forensics Investigator Course Collection