Active Outline
General Information
- Course ID (CB01A and CB01B)
- CISD104.
- Course Title (CB02)
- Digital Forensics and Hacking Investigation
- Course Credit Status
- Credit - Degree Applicable
- Effective Term
- Fall 2024
- Course Description
- The course is an introduction to computer cybercrime and hacking investigation processes. Topics include computer forensics tools, hacking investigation tools, data recovery, information gathering techniques, computer data preservation techniques, and computer cybercrime investigation techniques. System administrators, security professionals, IT staff, and law enforcement personnel, would benefit from taking this course. Also, this course can help prepare students to pass computer forensics certification examinations, such as the EC-Council Computer Hacking Forensic Investigator (CHFI) or the Certified Forensic Computer Examiner (CFCE) credential.
- Faculty Requirements
- Discipline 1
- [Computer Information Systems (Computer network installation, microcomputer technology, computer applications)]
- FSA
- [FHDA FSA - CIS]
- Course Family
- Not Applicable
Course Justification
This is a course in a CTE program that was developed based on state and national trends needing computer security professionals. According to the CUS Bureau of Labor Statistics, Computer Security analysts are one of the highest paying areas in California through 2031 with projected to grow 35 percent from 2021 to 2031. Median salary in 2021 is $102,600. This course will be included in our Cybersecurity A.A. degree. This course provides students with the foundation skills for computer security jobs in the Silicon Valley.
Foothill Equivalency
- Does the course have a Foothill equivalent?
- No
- Foothill Course ID
Formerly Statement
Course Development Options
- Basic Skill Status (CB08)
- Course is not a basic skills course.
- Grade Options
- Letter Grade
- Pass/No Pass
- Repeat Limit
- 0
Transferability & Gen. Ed. Options
- Transferability
- Not transferable
Units and Hours
Summary
- Minimum Credit Units
- 4.5
- Maximum Credit Units
- 4.5
Weekly Student Hours
Type | In Class | Out of Class |
---|---|---|
Lecture Hours | 4.0 | 8.0 |
Laboratory Hours | 1.5 | 0.0 |
Course Student Hours
- Course Duration (Weeks)
- 12.0
- Hours per unit divisor
- 36.0
Course In-Class (Contact) Hours
- Lecture
- 48.0
- Laboratory
- 18.0
- Total
- 66.0
Course Out-of-Class Hours
- Lecture
- 96.0
- Laboratory
- 0.0
- NA
- 0.0
- Total
- 96.0
Prerequisite(s)
Corequisite(s)
Advisory(ies)
ESL D261. and ESL D265., or ESL D461. and ESL D465., or eligibility for EWRT D001A or EWRT D01AH or ESL D005.
CIS D108.
Limitation(s) on Enrollment
Entrance Skill(s)
General Course Statement(s)
Methods of Instruction
Lecture and visual aids
Discussion of assigned reading
Discussion and problem solving performed in class
Quiz and examination review performed in class
Homework and extended projects
Assignments
- Reading assignments
- Complete assigned homework review questions
- View assigned security videos/articles
Methods of Evaluation
- Final exam and quizzes to evaluate comprehension and mastery of key terms and concepts as well as application skills related to analysis and synthesis of computer concepts.
- Participation in lab skills exercises that demonstrate the ability to critically evaluate the proper use of appropriate computer security software to complete a given set of computer-related tasks.
Essential Student Materials/Essential College Facilities
Essential Student Materials:Â
- None
- None
Examples of Primary Texts and References
Author | Title | Publisher | Date/Edition | ISBN |
---|---|---|---|---|
Chuck Easttom | Digital Forensics, Investigation, and Response | Jones and Bartlett | 2022 4th edition | 9781284226065 |
Examples of Supporting Texts and References
None.
Learning Outcomes and Objectives
Course Objectives
- Explore the forensics profession
- Analyze examples of computer crime
- Investigate forensic methods and labs
- Explore how to collect, seize, and protect evidence
- Examine techniques for hiding and scrambling information
- Explore data recovery methods
- Explore e-mail forensics
- Analyze Windows forensics
- Analyze Linux forensics
- Analyze Macintosh computer forensics
- Examine mobile forensics
- Perform network analysis
- Investigate incident and intrusion response
- Explore trends and future directions
- Explore system forensics resources
CSLOs
- Demonstrate data recovery and cybercrime forensics investigation techniques.
Outline
- Explore the forensics profession
- The definition and scope of computer forensics
- Understanding the field of digital forensics
- Knowledge needed for computer forensics analysis
- The Daubert Standard
- U.S. laws affecting digital forensics
- Federal guidelines
- Analyze examples of computer crime
- How computer crime affects forensics
- Identity theft
- Hacking
- Cyberstalking and harassment
- Fraud
- Non-access computer crimes
- Cyberterrorism
- Investigate forensic methods and labs
- Forensic methodologies
- Formal forensic approaches
- Documentation of methodologies and findings
- Evidence handling tasks
- How to set up a forensic lab
- Common forensic software programs
- Forensic certifications
- Explore how to collect, seize, and protect evidence
- Proper procedure
- Handling evidence
- Storage formats
- Forensic imaging
- RAID acquisitions
- Examine techniques for hiding and scrambling information
- Steganography
- Encryption
- Explore data recovery methods
- Undeleting data
- Recovering information from damaged media
- Explore e-mail forensics
- How e-mail works
- E-mail headers
- Tracing e-mail
- E-mail server forensics
- E-mail and the Law
- Analyze Windows forensics
- Windows details
- Volatile data
- Windows swap file
- Windows lobs
- Windows directories
- Index.dat
- The registry
- Analyze Linux forensics
- Linux basics
- Linux file systems
- Linux logs
- Linux directories
- Shell commands for forensics
- The difficulty of undeleting files in Linux
- Analyze Macintosh computer forensics
- Mac basics
- Macintosh logs
- Directories
- Macintosh forensic techniques
- Examine mobile forensics
- Cellular device concepts
- Evidence you can get from a cell phone
- Seizing evidence from a mobile device
- Perform network analysis
- Network packet analysis
- Network traffic analysis
- Router forensics
- Firewall forensics
- Investigate incident and intrusion response
- Disaster Recovery
- Preserving evidence
- Adding forensics to incident response
- Explore trends and future directions
- Technical trends
- Legal and procedural trends
- Explore system forensics resources
- Tools to use
- Resources
- Laws
Lab Topics
- Apply the Daubert Standard to forensic evidence
- Recogniz the Use of Steganography in Forensic Evidence
- Recover Deleted and Damaged Files
- Conduct an Incident Response Investigation
- Conduct Forensic Investigations on Windows Systems
- Conduct Forensic Investigations on Linux Systems
- Conduct Forensic Investigations on Email and Chat Logs
- Conduct Forensic Investigations on Mobile Devices
- Conduct Forensic Investigations on Network Infrastructure
- Conduct Forensic Investigations on System Memory