| Searching Current Courses For Fall 2016 |
|
Course: |
PSM 223
|
|
Title: | Forensic Computer Analysis III |
|
Long Title: | Forensic Computer Analysis: Computer Forensics III |
|
Course Description: | Provides knowledge of forensic software programs and their usage in identifying data that is believed to no longer exists on a computer system and the processes needed to gather that data for forensic examination and preservation. Court testimony, chain of custody and trial preparation concerning the collected computer evidence and documentation guidelines is reviewed. |
|
Min Credit: | 3 |
|
Max Credit: | |
|
Course Notes: | unique to CCD |
|
Origin Notes: | CCD |
STANDARD COMPETENCIES:
I. Discuss and define RSA¿s MD5 algorithm
II. Define computer usage timeline analysis and the relevance it holds in computer investigations
III. Discuss documentation of computer evidence findings and related testimony in deposition or at trial
IV. Discuss the steps of computer evidence documentation
V. Discuss disk structures and related computer evidence issues
VI. Discuss the secure deletion of sensitive data and the process of validation used to verify data that no longer exists
VII. Discuss and define trojan horse programs, encryption, and data hiding techniques
VIII. Discuss file header identification
IX. Discuss the reconstruction of graphic file images from sources such as swap files, slack, and unallocated storage space
X Discuss the reconstruction of deleted files as it relates to testimony and documentation
XI. Discuss various software applications used for forensic recovery of deleted files
TOPICAL OUTLINE:
I. Encryption techniques including RSA MD5
II. Develop a timeline for computer usage
III. Guidelines for the collection of computer evidence findings in preparation for testimony or deposition
IV. Verification of deleted data and the process of verification
V. Identify trojan horse programs, encryption types, and data hiding techniques
VI. Reconstruct files from swap files, slack, deleted files and unallocated storage space.
VII. Apply software applications used for forensic recovery of deleted files
Skip to top of page