Course Code: ISSC351 Course ID: 4006 Credit Hours: 3 Level: Undergraduate
The explosion in the use of the Internet and the ensuing growth in cybercrime have given rise to the field of computer forensics (also called digital forensics). Digital forensics is used to assemble digital evidence to prosecute cybercrime, analyze intrusions, mitigate risk, and for data recovery. This course examines the theory, best practices, and methodologies to conduct computer forensics investigations; it includes the ethical issues, data presentation, and chain-of-evidence procedures. It also appraises current tools and technologies to analyze, acquire, and organize digital evidence. This course maps to the general objectives of the International Association of Computer Investigative Specialists (IACIS) certification. Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility.
|Registration Dates||Course Dates||Session||Weeks|
|10/26/20 - 04/02/21||04/05/21 - 05/30/21||Spring 2021 Session B||8 Week session|
|11/30/20 - 04/30/21||05/03/21 - 06/27/21||Spring 2021 Session I||8 Week session|
|12/28/20 - 06/04/21||06/07/21 - 08/01/21||Spring 2021 Session D||8 Week session|
|01/25/21 - 07/02/21||07/05/21 - 08/29/21||Summer 2021 Session B||8 Week session|
|02/22/21 - 07/30/21||08/02/21 - 09/26/21||Summer 2021 Session I||8 Week session|
The successful student will fulfill the following learning objectives:
- Explain the principles and practices of conducting responsible and ethical computer forensics investigation.
- Extrapolate the process to prepare and conduct a computer investigation.
- Examine the file structures, formats, and technical protocols in storage subsystems encountered in gathering digital evidence.
- Analyze the processes and practices to seize and secure digital evidence at a crime scene and to collect evidence in both the private and public sectors.
- Analyze the steps and processes used to identify, secure, catalog, and store digital evidence.
- Justify the need for generating and maintaining audit trails.
- Categorize the hardware and software tools used in computer forensics.
- Prepare a portfolio of digital evidence and develop a strategy to provide effective testimony.
Submit your assignments to as instructed in the assignment. All assignments are processed through Turnitin embedded in the classroom. Please name your submitted document with your last name as the first part of the file name. For example, Lab #1 could be named, Lastname_Lab1.doc. Forum assignments only need to be posted on the Forum. It is not necessary to submit a word document containing your Forum posts. Simply submit your forum posts using the submit button and I will review them and update your assignment grade accordingly.
This course has a strong writing component. The goal is to organize, synthesize, and demonstrate your comprehension of core concepts investigated during this course by applying a combination of the terms, concepts, and details you have learned in a systematic way. As important as "the details" that you analyze and arrange in your writing, however, are the conclusions you draw from those details, and your predictions, responses to, and ultimate interpretation of those details.
Follow the instructions associated with each assignment as a Word document against originality reports.
Assignments are due by Sunday 11:55 p.m. ET of the week in which they are assigned.
If you need an extension, please contact me via email to discuss your circumstances.
Students are expected to submit classroom assignments by the posted due date and to complete the course according to the published class schedule. As adults, students, and working professionals I understand you must manage competing demands on your time. Should you need additional time to complete an assignment please contact me before the due date so we can discuss the situation and determine an acceptable resolution. Routine submission of late assignments is unacceptable and may result in points deducted from your final course grade. Assignments submitted late without prearranged extension will be subject to a 10% late penalty. No late assignments will be accepted after the last day of the course.
During the 8 weeks of this course, you will participate in a Forum activity. Each Forum activity will consist of one or more threads/topics. The assignments may involve discussion or debate. The questions are designed to allow you to apply what you have learned in the chapter to real-world scenarios or hypothetical, but realistic, situations. Post your answers to the questions in each thread prior to 11:55 p.m. ET on Wednesday. Please do not be late with this post because your classmates will be relying on you to post on time to give them a post to respond to later in the week. A discussion period will then ensue from Thursday through Sunday. Read your classmates' posts and post at least two follow-up messages to your classmates’ posts in each thread prior to 11:55 p.m. ET on Sunday. Some threads may require you to post more than two replies, so make sure you read the directions carefully. Of course, you may always post more than the required number of replies and you are encouraged to continue participating in the discussion even after you have met the minimum number of posts required. Your Forum participation will be considered at the end of the semester if your grade is on the borderline. Borderline grades will only be rounded up if you have exceeded the minimum requirements on the Forum and shown insight and critical thinking in all of your posts and replies. Your follow-up posts must contain substance and should add additional insight to your classmates’ opinions or challenge their opinions. It is never sufficient to simply say, “I agree with what you wrote” or “I really liked your post.” You must use your follow-up posts as a way to continue the discussion at a high level of discourse. Be sure to read the follow-up posts to your own posts and reply to any questions or requests for clarification, including questions posted by your professor. You will be expected to log into the classroom several times each week to participate in the class discussion. Forum postings are a large part of your grade and I will be looking for quality and depth in your postings. I will also expect you to list your references at the end of each post. References should be in APA citation format.
The Team Forum must follow the displayed directions very closely. Each team will only perform the activity instructions given to them.
You will be required to write one term paper this semester. The specifications are as follows:
- You must write a 4-6 page term paper on a computer related crime which can be solved by using computer forensics. You must detail the procedures used in discovering and investigating the evidence. Discuss the case, the investigation process, data recovery, securing the evidence and chain of custody. Remember to explain the types of software you would use to complete the case. You may use the cases noted in the book for guidance or may use one of your own.
- Your term paper outline is due at the end of Week 2.
- Your term paper is due at the end of Week 7.
- In addition to the 4-6 pages of the paper itself, you must include a title page and a reference page.
- Your title page must include the title of your paper, the date, the name of the course, your name, and your instructor’s name.
- Your reference page must be written in APA citation style, Arial or Time New Roman styles, 12-point font.
- Page margins Top, Bottom, Left Side, and Right Side = 1 inch, with reasonable accommodation being made for special situations.
- Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly. It is always better to write the information in your own words than to directly quote.
- This assignment is integrated with Turnitin report generation checking your paper with turnitin.com database of papers. As soon as you submit your paper an originality report will be generated and placed in the classroom. Review this report as soon as it is generated. Papers with an originality report of over 15% match index will result in a 0 for your paper grade. Any individual source match of 2% from a single source will result in a significant point reduction from your paper grade.
- Per the student handbook submitting a paper for more than one class constituted plagiarism.
|Forum Week 1||3.75 %|
|Forum Week 2||3.75 %|
|Forum Week 3||3.75 %|
|Forum Week 4||3.75 %|
|Forum Week 5||3.75 %|
|Forum Week 6||3.75 %|
|Forum Week 7||3.75 %|
|Forum Week 8||3.75 %|
|Assignment 1||3.75 %|
|Assignment 2||3.75 %|
|Assignment 3||3.75 %|
|Assignment 4||3.75 %|
|Assignment 5||3.75 %|
|Assignment 6||3.75 %|
|Assignment 7||3.75 %|
|Assignment 8||3.75 %|
|Term Paper Outline||2.00 %|
|Term Paper Outline||2.00 %|
|Term Paper||13.00 %|
|Term Paper||13.00 %|
|Team Forum||5.00 %|
|Team Forum||5.00 %|
|Lab 1||2.50 %|
|Lab 2||2.50 %|
|Lab 3||2.50 %|
|Lab 4||2.50 %|
|Lab 5||2.50 %|
|Lab 6||2.50 %|
|Lab 7||2.50 %|
|Lab 8||2.50 %|
|Book Title:||Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility - instructions provided inside the classroom.|
|Author:||No Author Specified|
|Book Title:||System Forensics, Investigation, and Response, 3rd ed. - the VitalSource e-book is provided inside the classroom|
|Electronic Unit Cost:||$35.00|
|Book Title:||ISSC351 virtual lab manual provided inside the classroom|
|Publication Info:||CLASS-Jones & Bartlett|
|Electronic Unit Cost:||$55.00|
Not current for future courses.