Loading...

Course Description

This course focuses on a detailed approach to computer forensics and evidence analysis. In this course students will cover forensic investigation scenarios that enable students to acquire necessary hands-on experience using forensic investigation such as Steganography and Image File Forensics, Application Password Crackers, Log Capturing and Event Correlation, Investigating Logs and Network Traffic, Investigating Wireless and Web Attacks, Tracking Emails, Mobile Forensics and Investigative Reports.

This undergraduate course is 5 weeks.

This course has a prerequisite. Please see details in the Prerequisite section below.

PLEASE NOTE:
Attendance and participation are mandatory in all university courses, and specific requirements may differ by course. If attendance requirements are not met, a student may be removed from the course. Please review the Course Attendance Policy in the Catalog for more information.

Course Objectives

Week 1

  • Describe the unique evidence that can be found through network forensics. 
  • Identify a variety of logs in hardware and software that track network?activity. 
  • Assess network forensic readiness. 

Week 2

  • Describe the evidence that can be found through?analyzing?Internet?of Things (IOT) and emergent technologies. 
  • Utilize tools and techniques to gather evidence related to network forensics 
  • Analyze data from a?network traffic?investigation 
  • Analyze evidence in logs related to network activity.  

Week 3

  • Examine types of web application attacks. 
  • Discuss challenges forensic investigators have in?performing?web application investigations. 
  • Examine the cache,?cookies, and history recorded in web browsers. 
  • Analyze?domain?and IP address queries related to a web attack. 

Week 4

  • Discuss the importance of database forensics and?impact?of data breaches. 
  • Examine evidence files related to database forensics. 
  • Analyze?tools and techniques for MSSQL and MySQL forensics. 

Week 5

  • Discuss the advantages and disadvantages of cloud computing from a user and forensic investigator perspective. 
  • Analyze the methods used by?common attacks on cloud services. 
  • Examine methods for investigating the cloud storage services Dropbox and Google Drive. 

Prerequisites

A prerequisite is required for this course. The purpose of a prerequisite is to ensure students have the knowledge and/or skills needed to be successful in the course. Students are required to take the courses in this bundle in the prescribed sequence to ensure the prerequisites are met. 

CYB451 - Computer Forensics Lab or equivalent

Disclaimers

The University of Phoenix reserves the right to modify courses.

While widely available, not all programs are available to residents of all states. Please check with an Enrollment Representative.

Transferability of credit is at the discretion of the receiving institution. It is the student’s responsibility to confirm whether or not credits earned at University of Phoenix will be accepted by another institution of the student’s choice.

If you have a question contact us at 866-354-1800.

This course belongs to the following bundles offer:

Loading...
Enroll Now - Select a section to enroll in
Network, Wireless, Web, Email and Mobile Forensics
Type
Instructor Led
Days
T, M
Time
12:00AM to 11:59AM
Dates
Jul 02, 2024 to Aug 05, 2024
Campus
Online Campus
Building
Online Non-Degree
Schedule and Location
Contact Hours
119.8
Location
  • Online Campus
Course Fee(s)
Undergraduate Tuition credit (3 units) $1,194.00 Click here to get more information
Section Fees
Resource Fee $170.00 Mandatory
Credits/Units
3 Credit Hours
Required fields are indicated by .