| |
May 01, 2026
|
|
|
|
|
CYS 3030 - CYBER FORENSICS credits: 3.0 When cybercrimes do happen, you need to know how to respond. This course examines the tools and techniques used to perform cyber forensics and conduct investigations into cybercrimes. By the end of the course, you’ll be able to gather and analyze important digital evidence and gain skills in analyzing cybercrime that are in demand from companies across the country. This online class has optional live sessions. Ethics: Ethical challenges often look quite different in a cybersecurity context. Students will learn and debate the ethical standards of cyber forensics and understand their importance. Crime Scenes: Students will learn how to secure a crime scene, seize evidence, and maintain chain of custody for digital evidence. Open Source Tools: Students will learn about the different operating systems and tools available to them when performing cyber-forensic activities and understand how to select the correct tool for a job. Data Acquisition: Obtaining pertinent data is critical to cybercrime investigations. Students will learn how to extract, validate, and clone relevant data during an investigation. Reconstruction and Reporting: Cybercriminals will often try to damage or destroy incriminating data. As such, the ability to restore compromised data is a critical tool of cybercrime investigation. Students will learn how to reconstruct a suspect’s storage device and report their findings and recommendations. Objectives: A) Distinguish the differences between public-sector and private-sector cyber forensics investigations; B) Explain and perform the five main steps in a cyber forensics investigation: Acquisition, Validation and Verification, Extraction, Reconstruction, and Reporting; C) Install and use open-source tools to execute a cyber forensics investigation; D) Perform data acquisition to make a copy of the original storage device for preservation as digital evidence; E) Explain the role of new and emerging technologies in cyber forensics investigations; F) Conduct validation to confirm that a cyber forensics tool is functioning as intended and verification to prove that the two sets of data collected (original vs. copy) are identical; G) Perform extraction to recover data. Reconstruct storage devices; H) Develop and generate professional electronic reports documenting the results of your cyber forensics investigation findings. Method of Evaluation: Onboarding Assignments 50 5%; Weekly Assignments 120 (12 x 10) 12%; Participation 150 (10 x 15) 15%; Quizzes 120 (6 x 20) 12%; Labs 250 (5 x 50) 25%; Final Project (Part 1: Proposal, Part 2: Draft, Part 3: Final, Presentation) 310 (50, 70, 110, 80) 31%.
Prerequisite(s): CYS 1010 and CYS 2010 .
Add to Favorites (opens a new window)
|
|