CFOR 101 Computer Forensics I
This course focuses on the emerging role of the computer forensics examiner, forensic evidence preservation and introduces students to computer forensic tools. This course provides a comparative study of information technology, evidence analysis, chain of custody, and data retrieval from computer hardware and software applications. Students will have hands-on laboratory experience using various computer forensic tools, evidence preservation techniques and documentation.
Hours Weekly
2 hours lecture, 2 hours lab
Course Objectives
- Define computer forensics and identify the laws related to computer forensics.
- Describe processing crime and incident scene and chain of custody.
- Identify the safety precautions required for working with computer equipment.
- Identify PC motherboard components such as processor, memory, hard drives, zip drives and overall
computer operation.
- Perform basic forensic examination using DOS operating system.
- Describe various forensic tools used in computer forensics.
- Compare and contrast the main features of Windows based operating systems.
- Install IDE and SCSI hard drives and configure primary partition and logical partition and analyze how
data is stored. - Apply computer forensic procedures for seizure, preservation and documentation of electronic evidence.
- Examine the role of unallocated space, RAM slack and file slack in computer forensics.
- Define privileged communications and confidentiality.
Course Objectives
- Define computer forensics and identify the laws related to computer forensics.
- Describe processing crime and incident scene and chain of custody.
- Identify the safety precautions required for working with computer equipment.
- Identify PC motherboard components such as processor, memory, hard drives, zip drives and overall
computer operation.
- Perform basic forensic examination using DOS operating system.
- Describe various forensic tools used in computer forensics.
- Compare and contrast the main features of Windows based operating systems.
- Install IDE and SCSI hard drives and configure primary partition and logical partition and analyze how
data is stored. - Apply computer forensic procedures for seizure, preservation and documentation of electronic evidence.
- Examine the role of unallocated space, RAM slack and file slack in computer forensics.
- Define privileged communications and confidentiality.