Digital Forensics ITP 375 (3 Units)

Similar documents
Introduction to Information Technology ITP 101x (4 Units)

Enterprise Network Design ITP 499 (3 Units)

Internet Web Technologies ITP 104 (2 Units)

Database Systems: Concepts, design, and implementation ISE 382 (3 Units)

ITP489 In-Memory DBMS for Real Time Analytics

ITP454 Enterprise Resource Planning, Design, and Implementation

ITP454 Enterprise Resource Planning, Design, and Implementation

Programming Game Engines ITP 485 (4 Units)

Introduction to Programming System Design CSCI 455x (4 Units)

CSCI 201L Syllabus Principles of Software Development Spring 2018

Recommended Prior Courses: CTAN 462, Visual Effects, or CTAN 452, Introduction to 3D Computer Animation

COURSE SYLLABUS BMIS 326 INTRODUCTION TO ORACLE

Pipelines for Games and Interactives CSCI 281, (3 Units)

IOM Business Database Systems

In this course, you need to use Pearson etext. Go to "Pearson etext and Video Notes".

COLLEGE OF DUPAGE CIS 2542 Advanced C++ with Data Structure Applications Course Syllabus

In this course, you need to use Pearson etext. Go to "Pearson etext and Video Notes".

CS 0449 Intro to Systems Software Fall Term: 2181

The Linux Command Line: A Complete Introduction, 1 st ed., by William E. Shotts, Jr., No Starch Press, 2012.

OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE

Business Information System Analysis and Design Fall 2017

CISC 3130 Data Structures Fall 2018

GET 433 Course Syllabus Spring 2017

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

CISC 3130 Data Structures Spring 2018

CSCO 120 CCNA Internetworking Fundamentals Spring 2018

Computer Science Technology Department

CASPER COLLEGE COURSE SYLLABUS MSFT 1600 Managing Microsoft Exchange Server 2003 Semester/Year: Fall 2007

AE Computer Programming for Aerospace Engineers

MWF 9:00-9:50AM & 12:00-12:50PM (ET)

Trina Gregory. Background. Contact

A: 90% - 100% B: 80% - <90% C: 70% - <80% D: 60% - <70% F: < 60% Important Dates:

Rochester Institute of Technology Golisano College of Computing and Information Sciences Department of Information Sciences and Technologies

ISATI 231: Windows Client (4 credits) Spring 2018 Mon, Tue, Wed, Thu, 13:10-14:40, MTB 105

CIT110 A+ Hardware Spring 2015

CS 241 Data Organization using C

IML 300: Reading and Writing the Web

ISM 324: Information Systems Security Spring 2014

Computer Science Technology Department

CMPUT 391 Database Management Systems. Fall Semester 2006, Section A1, Dr. Jörg Sander. Introduction

COWLEY COLLEGE & Area Vocational Technical School

ESET 349 Microcontroller Architecture, Fall 2018

INFS 2150 (Section A) Fall 2018

CSCI 281 Pipelines for Games (4 units) Spring Pipelines for games, CSCI 281, 4 units EGG 108, Monday 10:00 a.m. 12:50 p.m.

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

EECE.2160: ECE Application Programming Spring 2019

CSC 111 Introduction to Computer Science (Section C)

Gerlinde Brady Phone: Office Hours: see Web at:

San José State University Computer Science CS 122 Advanced Python Programming Spring 2018

ESET 369 Embedded Systems Software, Fall 2017

MGMT 4336 Networks & Data Communication Section D10

Tuesday and Thursday 1:05 pm - 2:25 pm

Langara College Spring archived

CMSC 132: Object-Oriented Programming II. Administrivia

CSCO 121 CCNA Routing and Switching Essentials Spring 2018

3D Design and Prototyping ITP 415 (2 Units)

CONCORDIA UNIVERSITY DEPARTMENT OF CHEMISTRY AND BIOCHEMISTRY CHEM 293 SPECTROSCOPY AND STRUCTURE OF ORGANIC COMPOUNDS. SYLLABUS Winter 2018

Langara College Spring archived

Web Programming Fall 2011

Course Syllabus - CNT 4703 Design and Implementation of Computer Communication Networks Fall 2011

IS 331-Fall 2017 Database Design, Management and Applications

CS 200, Section 1, Programming I, Fall 2017 College of Arts & Sciences Syllabus

Database Security MET CS 674 On-Campus/Blended

MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015

Course Title: Computer Networking 2. Course Section: CNS (Winter 2018) FORMAT: Face to Face

CSc 2310 Principles of Programming (Java) Jyoti Islam

CoSci 440 SYLLABUS Programming in C++ INSTRUCTOR Mari Rettke cell SECTION : and 13345

I. PREREQUISITES For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

CPSC 4600 Biometrics and Cryptography Fall 2013, Section 0

ITSY Information Technology Security Course Syllabus Spring 2018

CMPS 182: Introduction to Database Management Systems. Instructor: David Martin TA: Avi Kaushik. Syllabus

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

San José State University Department of Computer Science CS049J, Programming in Java, Section 2, Fall, 2016

CSCO 220 CCNA Scaling Networks Spring 2018

Object Oriented Programming Using C++

CPS352 Database Systems Syllabus Fall 2012

Network Fundamentals and Design Fall Semester 2014

CSci 4211: Introduction to Computer Networks. Time: Monday and Wednesday 2:30 to 3:45 pm Location: Smith Hall 231 Fall 2018, 3 Credits

Instructor: Eric Rettke Phone: (every few days)

Computer Science Technology Department

DRES STUDENT ACCESS AND ACCOMMODATION SYSTEM (SAAS) INTRODUCTION AND SUPPORT STUDENT RESOURCE GUIDE FOR SAAS 2.0

Fundamentals of Computer Science CSCI 136 Syllabus Fall 2018

CSIS 331 Course Syllabus. Note:

Course Description. This course combines semesters three and four of the Cisco Networking Academy CCNA

I. PREREQUISITES For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

Oklahoma State University Oklahoma City ITD 1113: Windows Expert User Syllabus Fall, 2014

San José State University Computer Science Department CS49J, Section 3, Programming in Java, Fall 2015

USF Sarasota-Manatee - New Undergraduate Course Proposal Form

Introduction to UNIX

Division of Engineering, Computer Programming, and Technology

PELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS ADVANCED DATABASE MANAGEMENT SYSTEMS CSIT 2550

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

BOSTON UNIVERSITY Metropolitan College MET CS342 Data Structures with Java Dr. V.Shtern (Fall 2011) Course Syllabus

Syllabus: AIT Information Systems Infrastructure Lifecycle Management

Syllabus for HPE 451 Directed Study 1-3 Credit Hours Spring 2014

X

CIS 408 Internet Computing (3-0-3)

For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

MIS NETWORK ADMINISTRATION. Spring Quarter 2007 COURSE OUTLINE

Transcription:

Digital Forensics ITP 375 (3 Units) Description In 2007, the FBI reported that over 200 major companies reported a loss of over 60 million dollars due to computer crime. Computers are becoming more of a threat today than ever before. From cyber-terrorism to identity theft, the digital age has brought about a change in the way that crime is being committed. The usage of computers in crime has lead to the emerging field of computer forensics. This course is designed to give students the tools and techniques for investigating crime involving digital evidence. Objective Prerequisites/ Recommended Preparation Instructor Contacting the Instructor This course is designed as an introductory course in computer forensics. Students will first understand the need for computer forensics. Students will learn best practices for general incidence response. The course will then focus on the tools and techniques to perform a full computer forensic investigation. Upon completing this course, students will: - Understand the fundamentals of computer forensics - Understand the legal aspects of forensics - Understand the relationship between IT and forensics - Learn best practices for incidence response ITP 125 or Department Approval Joseph Greenfield joseph.greenfield@usc.edu 213-740-4604 Lecture/Lab Tuesday & Thursday, 3:30 4:50, OHE 406 Required Hacking Exposed: Computer Forensics, Second Edition. Davis, Philipp, Textbooks and Cowen ISBN: 0071626778 Web Site All course material will be on Blackboard at blackboard.usc.edu Grading Students will have structured labs throughout the semester, to be conducted during the scheduled lab time. Students will also have a few labs to be completed at home. The grade breakdown is as follows: Labs 60% Midterm 15% Final Exam 25% Total 100%

Grading Scale The following is the grading scale to be used for the final grades at the end of the semester 93% and above A 90% 93% A- 87% 90% B+ 83% 87% B 80% 83% B- 77% 80% C+ 73% - 77% C 70% 73% C- 67% 70% D+ 63% 67% D 60% 63% D- Below 60% F Policies - Projects turned in after the deadline will automatically have 5% deducted per day. Projects will not be accepted after 1 week beyond the project s deadline - No make-up exams (except for medical or family emergencies) will be offered nor will there be any changes made to the Final Exam schedule. - It is your responsibility to submit your project on or before the due date. It is not the responsibility of the lab assistant. Do not turn in anything to your lab assistant! - All projects will be digitally submitted through blackboard except where specifically specified. Always keep a backup copy of your labs Academic Integrity The use of unauthorized material, communication with fellow students during an examination, attempting to benefit from the work of another student, and similar behavior that defeats the intent of an examination or other class work is unacceptable to the University. It is often difficult to distinguish between a culpable act and inadvertent behaviour resulting from the nervous tension accompanying examinations. When the professor determines that a violation has occurred, appropriate action, as determined by the instructor, will be taken. Although working together is encouraged, all work claimed as yours must in fact be your own effort. Students who plagiarize the work of other students will receive zero points and possibly be referred to Student Judicial Affairs and Community Standards (SJACS). Students with Disabilities All students should read, understand, and abide by the University Student Conduct Code listed in SCampus, and available at: http://www.usc.edu/student-affairs/sjacs/nonacademicreview.html Any student requesting academic accommodations based on a disability is required to register with Disability Services and Programs (DSP) each - 2 -

semester. A letter of verification for approved accommodations can be obtained from DSP. Please be sure the letter is delivered to me (or to your TA) as early in the semester as possible. DSP is located in STU 301 and is open 8:30 a.m. - 5:00 p.m., Monday through Friday. The phone number for DSP is (213) 740-0776. - 3 -

Fundamentals of Computer Forensics ITP 375 (3 Units) Course Outline Week 1 Introduction to Computer Forensics - Course overview - Understanding the need for computer forensics - Defining computer forensics Reading: Chapter 1 Week 2 Computer Hardware - Understanding computer components - Digital Media - Hard disk basics Reading: Chapter 2 Week 3 The Forensic Toolkit - Forensic hardware - Hardware write/blockers - Hard drive acquisitions - Processing the scene Reading: Chapters 3 & 4 Lab 1: Hard drive acquisition Week 4 Files and File Systems - Windows file systems - FAT32 - NTFS - Forensic file images Reading: Chapter 6 Lab 2: Preparing the case Week 5 Forensic software - Overview of different software packages - EnCase - Autopsy Lab 3: EnCase introduction - 4 -

Week 6 Bookmarking and Searching - Creating basic search queries - Hex, Decimal, and Binary - ASCII - Unicode Lab 4: Searching evidence for common keywords Week 7 GREP Week 8 Forensic Reports Week 9 MIDTERM Week 10 E-mail Analysis - Understanding GREP - Building Regular Expressions - Creating GREP keywords - Viewing and managing keywords and cases Lab 5: GREP lab - Creating a forensic report - Proper report writing - Explaining forensics to the uneducated - Viewing e-mail - Webmail - POP - IMAP Reading: Chapter 11 Lab 6: E-mail analysis lab Week 11 File Signature Analysis - File signatures - File extensions - Differences between - Identifying differences Lab 7: Detecting File Manipulation - 5 -

Week 12 Hash Analysis - Understanding hash algorithms - Hashing files - Hash libraries Reading: Instructor notes Lab 8: Hash analysis lab Week 13 Other Windows Artifacts - Common windows artifacts - Recycle bin - My Documents - Recent files - Installed programs Reading: Chapter 12 Lab 9: Basic Computer Forensics Lab Week 14 A real forensic case Week 15 Conclusion - Processing a complete forensic case - Preparing a forensic report Reading: Chapter 14 - Review for the final exam - Conclusion to the course - 6 -