CJE 3214 - Advanced Topics in Digital Forensics
College of Public Safety Administration
Credit(s): 3
Contact Hours: 47
Contact Hours: 47
Effective Term Spring 2022 (600)
Requisites
Pre- or Co-requisite CCJ 3075 with a minimum grade of C and
Admission to Public Safety Administration (Bachelor of Applied Science) (PSA-BAS)
Admission to Public Safety Administration (Bachelor of Applied Science) (PSA-BAS)
Course Description
This course is designed to be an advanced course in digital forensics that focuses on special investigative topics. These topics include the legal and technical challenges faced by an investigator who is conducting a cloud forensic investigation. The course also discusses how to conduct an analysis of volatile data and system memory areas. The different characteristics of dark web investigations are considered as well. Finally, case studies are provided to show some examples of anti-forensic methods that may hinder an investigation of computer forensics.
Learning Outcomes and Objectives
- Students will evaluate various anti-forensic techniques by:
- summarizing the techniques used to hide data and the methods used to destroy evidence artifacts.
- describing how encryption is used to prevent confidential files or data from being accessed.
- comparing the technique of spoofing with obfuscation when used as an anti-forensic strategy.
- explaining how onion routing is used to send anonymous communications over a computer network.
- appraising the anti-forensic methods used in case studies such as the Zacharias Moussaoui case and the BTK Killer case.
- Students will identify the unique challenges presented by cloud forensic investigations by:
- describing how to identify evidential artifacts from the three different sources of cloud service models (SaaS, IaaS, and PaaS).
- summarizing the legal challenges presented in a cloud forensic investigation.
- explaining the primary technical challenges in acquiring cloud data.
- choosing the best remote access tools to be used for various cloud investigations.
- examining how evidence sources such as application logs, user authentication logs, and database logs can be used to identify artifacts within a cloud infrastructure.
- Students will analyze the investigation of memory forensics by:
- defining what volatile data is and why it is import to certain investigations.
- describing how to collect volatile data from a computer’s memory dump.
- explaining how to investigate and identify malicious behaviors that do not leave easily detectable evidence on hard drive data.
- reviewing how system memory can provide unique insights into runtime system activity, including open network connections and recently executed commands or processes.
- distinguishing between common commercial and open source tools that are designed solely for conducting memory forensics.
- Students will analyze the methods used in dark web investigations by:
- enumerating the differences between the surface web, the deep web, and the dark web.
- contrasting the differences between anonymity, confidentiality, and privacy.
- demonstrating how to access dark web marketplaces using onion routing and the Tor Browser.
- describing what cryptocurrencies are and how they work.
- comparing the features of various cryptocurrencies such as Bitcoin, Ethereum, and Litecoin.
- explaining how to collect evidential artifacts from the Tor Browser, Bitcoin wallet, and the Windows Registry.
Criteria Performance Standard
Upon successful completion of the course the student will, with a minimum of 70% accuracy, demonstrate mastery of each of the above stated objectives through classroom measures developed by individual course instructors.
History of Changes
C&I Approval: , BOT Approval: , Effective Term: Spring 2022 (600)
Related Programs
- Public Safety Administration (PSA-BAS) (655) (Active)
