This course will focus on examining the fundamentals of system forensics, i.e.: what forensics is, an overview of computer crime, and the types of laws that affect forensic investigations. A significant part of the course is devoted to examining the tools, techniques, and methods used to perform computer forensics and investigations. Students will learn how to collect, preserve, analyze, and document all types of digital evidence, from computers running various operating systems, mobile devices, e-mail, and more. (3 credits)
- ENG 101: English Composition 1
- ENG 102: English Composition 2
- ITE 145: Fundamentals of Information Systems Security
- ITE 220: Networking and Data Communcation (Recommended)
Student Learning Outcomes (SLOs)
Students who successfully complete this course will be able to:
- Summarize the basic principles of computer forensics.
- Summarize important laws regarding computer forensics.
- Describe various computer crimes and how they are investigated.
- Describe digital forensic methodology and labs.
- Outline the proper approach to collecting, seizing, and protecting evidence.
- Explain techniques for hiding and scrambling information as well as how data is recovered.
- Summarize various types of digital forensics.
- Explain how to perform a network analysis.
- Describe incident and intrusion response.
- Identify trends in and resources for digital forensics.
General Education Outcomes (GEOs)
Please check the applicable GEOs for this course, if any, by outcomes at GEO Category Search, or by subject area at GEO Discipline Search.
Course Activities and Grading
Discussions (Weeks 1 - 8)
Written Assignments (Weeks 1 - 8)
Lab Assignments (Weeks 2 - 8)
Project (Weeks 2, 3, 5, 6, 8)
Final Exam (Week 8)
Available through Charter Oak State College's online bookstore
- Easttom, Chuck. Digital Forensics, Investigation, and Response - with Access. 4th ed. Burlington, MA: Jones & Bartlett Learning, 2022. ISBN-13: 978-1-284-24448-9
Readings and Exercises
Topics: Introduction to Forensics and Computer Crimes
Topics: Forensic Methods and Evidence Handling
Topics: Steganography and Data Recovery
Topics: Incident Response and Windows Forensics
Topics: Linux and Mac OS Forensics
Topics: Email Forensics and Mobile Forensics
Topic: Network Forensics
Topics: Memory Forensics and Future Trends , Course Review and Final Examination
COSC Accessibility Statement
Charter Oak State College encourages students with disabilities, including non-visible disabilities such as chronic diseases, learning disabilities, head injury, attention deficit/hyperactive disorder, or psychiatric disabilities, to discuss appropriate accommodations with the Office of Accessibility Services at OAS@charteroak.edu.
COSC Policies, Course Policies, Academic Support Services and Resources
Students are responsible for knowing all Charter Oak State College (COSC) institutional policies, course-specific policies, procedures, and available academic support services and resources. Please see COSC Policies for COSC institutional policies, and see also specific policies related to this course. See COSC Resources for information regarding available academic support services and resources.