CYBR C250: Intermediate Digital Forensics
Item | Value |
---|---|
Curriculum Committee Approval Date | 10/27/2023 |
Top Code | 070800 - Computer Infrastructure and Support |
Units | 3 Total Units |
Hours | 72 Total Hours (Lecture Hours 54; Lab Hours 18) |
Total Outside of Class Hours | 0 |
Course Credit Status | Credit: Degree Applicable (D) |
Material Fee | No |
Basic Skills | Not Basic Skills (N) |
Repeatable | No |
Grading Policy | Standard Letter (S),
|
Course Description
Students will explore digital forensic techniques using industry-recognized tools. Topics covered include an introduction to network forensics and mobile device forensics, investigative and extraction tools, live acquisition data, evidence reporting, time-stomping and anti-forensic techniques, and the significance of time zones for forensic case analysis. Hands-on assignments will be used to develop technical skills relevant to entry-level cybersecurity professionals. This course is intended for students with computer experience and an interest in cyber defense for private organizations or government law enforcement. Careers and emerging trends in the field of cybersecurity will be evaluated. ADVISORY: IT C04 and CYBR C150. Transfer Credit: CSU.
Course Level Student Learning Outcome(s)
- Evaluate a collection of digital evidence to distinguish and extract relevant items.
- Given a simulated case, use a forensic framework or methodology to analyze and reconstruct the electronic events of the case.
- Given a simulated case, analyze the evidence and produce a report to describe evidence and present findings.
Course Objectives
- 1. Describe the digital forensics investigation lifecycle.
- 2. Demonstrate the use of industry-recognized tools to perform a forensic analysis of a simulated case.
- 3. Demonstrate the techniques used to find time-stomping and anti-forensic techniques.
Lecture Content
Introduction to Digital Forensics Frameworks Checklist for entry-level analysts Investigative/extraction tools Linux-based tools SIFT workstation Types of forensic reviews Live data acquisition Mobile device forensics Network forensics Memory forensics Specialized tools Mac/Apple forensics Anti-forensic techniques Significance of time zones for analysis Anti-forensics/red team artifacts Time-stomping Case forensic activities Comprehensive Windows forensics simulated case Evidence report development Mock testimony
Lab Content
Students will work with remote lab environments to complete hands-on activities. MITRE ATTCK Matrix Analyze the Linux File System LoLBin SANS SIFT Decoding and Lolbins Network Forensics Memory Forensics Examining Windows Logs for Logon and Logoff Times Finding Users SIDS Advanced Memory Forensics Master File Table The Security Event Log Forensics Case Notes Ransomware Cloud Forensics Exploring Advanced Forensic Areas
Method(s) of Instruction
- Lecture (02)
- DE Live Online Lecture (02S)
- DE Online Lecture (02X)
- Lab (04)
- DE Live Online Lab (04S)
- DE Online Lab (04X)
Instructional Techniques
This course will utilize a combination of lecture, hands-on guided laboratory assignments, classroom/discussion student interactions, problem solving, quizzes, tests, and troubleshooting assignments to achieve the goals and objectives of this course. All instructional methods are consistent across all modalities.
Reading Assignments
Read about the widely-accepted digital forensics frameworks. Read about multiple types of forensic analyses using Windows, Linux, and Macintosh-based tools. Read about digital forensics cases.
Writing Assignments
Complete a report of digital forensics analysis performed in preparation for expected expert witness testimony.
Out-of-class Assignments
Complete multiple types of forensics with Windows, Linux, and Macintosh-based tools. Complete hands-on lab to demonstrate and document proper digital forensics processes and procedures. Video an expert witness testimony. Conduct digital forensics analysis using tools resulting in a written report and expert witness testimony.
Demonstration of Critical Thinking
Students will conduct technical analysis using best practices, processes, and procedures.
Required Writing, Problem Solving, Skills Demonstration
Skills will be demonstrated through completion of hands-on lab exercises using forensics and incident handling tools and document the analysis performed in preparation for expert witness testimony.
Eligible Disciplines
Computer information systems (computer network installation, microcomputer ...: Any bachelors degree and two years of professional experience, or any associate degree and six years of professional experience. Computer service technology: Any bachelors degree and two years of professional experience, or any associate degree and six years of professional experience.
Textbooks Resources
1. Required Johansen, G. Digital Forensics and Incident Response, 3rd ed. Packt, 2022
Other Resources
1. Coastline Library 2. OER - Open Educational Resources