Go to Main Content

 

 

HELP | EXIT

Common Course Numbering System

 

Your current Institution is CCCS
Transparent Image

 Searching Current Courses For Fall 2016

  Course: PSM 223
  Title:Forensic Computer Analysis III
  Long Title:Forensic Computer Analysis: Computer Forensics III
  Course Description:Provides knowledge of forensic software programs and their usage in identifying data that is believed to no longer exists on a computer system and the processes needed to gather that data for forensic examination and preservation. Court testimony, chain of custody and trial preparation concerning the collected computer evidence and documentation guidelines is reviewed.
  Min Credit:3
  Max Credit:

  Course Notes: unique to CCD
  Origin Notes: CCD

 STANDARD COMPETENCIES:
 
 I.      Discuss and define RSA¿s MD5 algorithm
 II.     Define computer usage timeline analysis and the relevance it holds in computer investigations
 III.    Discuss documentation of computer evidence findings and related testimony in deposition or at trial
 IV.     Discuss the steps of computer evidence documentation
 V.      Discuss disk structures and related computer evidence issues
 VI.     Discuss the secure deletion of sensitive data and the process  of validation used to verify data that no longer exists
 VII.    Discuss and define trojan horse programs, encryption, and data hiding techniques
 VIII.   Discuss file header identification
 IX.     Discuss the reconstruction of graphic file images from sources such as swap files, slack, and unallocated storage space
 X       Discuss the reconstruction of deleted files as it relates to testimony and documentation
 XI.     Discuss various software applications used for forensic recovery of deleted files


 TOPICAL OUTLINE:
 
 I.      Encryption techniques including RSA MD5
 II.     Develop a timeline for computer usage
 III.    Guidelines for the collection of computer evidence findings in preparation for testimony or deposition
 IV.     Verification of deleted data and the process of verification
 V.      Identify trojan horse programs, encryption types, and data hiding techniques
 VI.     Reconstruct files from swap files, slack, deleted files and unallocated storage space.
 VII.    Apply software applications used for forensic recovery of deleted files


Transparent Image
Skip to top of page

Skip CCNS Pub Presentation Links

[ CCNS Main Menu ]

Release: 8.5.3