CFOR-101 Computer Forensics I
This course focuses on the emerging role of the computer forensics examiner, forensic evidence preservation and introduces students to computer forensic tools. This course provides a comparative study of information technology, evidence analysis, chain of custody, and data retrieval from computer hardware and software applications. Students will have hands-on laboratory experience using various computer forensic tools, evidence preservation techniques and documentation.
Hours Weekly
2 hours lecture, 2 hours lab weekly
Course Objectives
- 1. Define computer forensics and identify the laws related to computer forensics.
- 2. Describe processing crime and incident scene and chain of custody.
- 3. Identify the safety precautions required for working with computer equipment.
- 4. Identify PC motherboard components such as processor, memory, hard drives, zip drives and overall
computer operation.
- 5. Perform basic forensic examination using DOS operating system.
- 6. Describe various forensic tools used in computer forensics.
- 7. Compare and contrast the main features of Windows based operating systems.
- 8. Install IDE and SCSI hard drives and configure primary partition and logical partition and analyze how
data is stored. - 9. Apply computer forensic procedures for seizure, preservation and documentation of electronic evidence.
- 10. Examine the role of unallocated space, RAM slack and file slack in computer forensics.
- 11. Define privileged communications and confidentiality.
Course Objectives
- 1. Define computer forensics and identify the laws related to computer forensics.
- 2. Describe processing crime and incident scene and chain of custody.
- 3. Identify the safety precautions required for working with computer equipment.
- 4. Identify PC motherboard components such as processor, memory, hard drives, zip drives and overall
computer operation.
- 5. Perform basic forensic examination using DOS operating system.
- 6. Describe various forensic tools used in computer forensics.
- 7. Compare and contrast the main features of Windows based operating systems.
- 8. Install IDE and SCSI hard drives and configure primary partition and logical partition and analyze how
data is stored. - 9. Apply computer forensic procedures for seizure, preservation and documentation of electronic evidence.
- 10. Examine the role of unallocated space, RAM slack and file slack in computer forensics.
- 11. Define privileged communications and confidentiality.