This course will focus on examining the fundamentals of system forensics, i.e.: what forensics is, an overview of computer crime, and the types of laws that affect forensic investigations. A significant part of the course is devoted to examining the tools, techniques, and methods used to perform computer forensics and investigations. Students will learn how to collect, preserve, analyze, and document all types of digital evidence, from computers running various operating systems, mobile devices, e-mail, and more. (3 credits)
- ENG 101: English Composition 1
- ENG 102: English Composition 2
- ITE 145: Fundamentals of Information Systems Security
- ITE 220: Networking and Data Communcation (Recommended)
Student Learning Outcomes (SLOs)
Students who successfully complete this course will be able to:
- Summarize the basic principles of computer forensics.
- Summarize important laws regarding computer forensics.
- Describe various computer crimes and how they are investigated.
- Describe digital forensic methodology and labs.
- Outline the proper approach to collecting, seizing, and protecting evidence.
- Explain techniques for hiding and scrambling information as well as how data is recovered.
- Summarize various types of digital forensics.
- Explain how to perform a network analysis.
- Describe incident and intrusion response.
- Identify trends in and resources for digital forensics.
General Education Outcomes (GEOs)
Course Activities and Grading
Final Exam (Week 8)
Available through Charter Oak State College's online bookstore
- Easttom, Chuck. System Forensics, Investigation, and Response - Print Bundle for LMS Integrations. 3rd ed. Burlington, MA: Jones & Bartlett Learning, 2018. ISBN-13: 9781284186338
- Note: This is a bundle which includes the textbook and the Access Code required for this course. We discourage students from purchasing “used” materials from other sources due to access codes not working properly.
Readings and Exercises
Topics: Introduction to Forensics and Computer Crimes
Topics: Forensic Methods, Labs, and Future Trends
Topics: Collecting, Seizing and Protecting Evidence
Topics: Understanding Techniques for Hiding and Scrambling Information, and Recovering Data
Topics: Email, Windows and Linux Forensics
Topics: Macintosh and Mobile Forensics
Topic: Performing Network Analysis
Topics: Course Review and Final Examination
COSC Accessibility Statement
Charter Oak State College encourages students with disabilities, including non-visible disabilities such as chronic diseases, learning disabilities, head injury, attention deficit/hyperactive disorder, or psychiatric disabilities, to discuss appropriate accommodations with the Office of Accessibility Services at OAS@charteroak.edu.
COSC Policies, Course Policies, Academic Support Services and Resources
Students are responsible for knowing all Charter Oak State College (COSC) institutional policies, course-specific policies, procedures, and available academic support services and resources. Please see COSC Policies for COSC institutional policies, and see also specific policies related to this course. See COSC Resources for information regarding available academic support services and resources.