Learning Outcome
At the end of this course, students should be able to:
1. explain basic knowledge on digital forensic and digital evidence;
2. establish awareness of digital evidence challenges aspects of digital evidence;
3. learn the cyber trail, challenging aspects of the cyber trail, and brief history of computer
crime investigation;
4. trace the evolution of investigative tools and try to understand the language of computer
crime investigation;
5. survey the role of computers in crime, technology and law: jurisdiction, pornography and
obscenity, child pornography, privacy, copyrights and the “theft” of digital intellectual
property, the investigative process, investigative reconstruction, with digital evidence;
6. examine techniques and tools used by computer forensics investigations such as
acquisition, preservation, recovery, and analysis of evidence obtained from portable and
stationary computer storage devices, personal digital assistants (PDAs), and cell phones;
7. acquire best practices in securing, processing, acquiring, examining and reporting on
digital evidence; and
8. exposed to current technologies and methods as well as leading edge techniques with
practical based projects and research opportunities.
Course Contents
Introduction to digital forensics, digital evidence, increasing awareness of digital evidence,
challenging aspects of digital evidence. best practices in securing, processing, acquiring,
examining and reporting on digital evidence. cyber trail, challenging aspects of the cyber trail,
brief history of computer crime and cybercrime investigation, evolution of investigative tools,
language of computer crime investigation, the role of computers in crime, technology and law:
jurisdiction, pornography and obscenity, child pornography, privacy, copyrights and the “theft”
of digital intellectual property, the investigative process, investigative reconstruction, with
digital evidence. Examine techniques and tools used by computer forensics investigations such
as acquisition, preservation, recovery, and analysis of evidence obtained from portable and
stationary computer storage devices, personal digital assistants (PDAs), and cell phones.
Students will be exposed to current technologies and methods as well as leading edge
techniques with practical based projects and research opportunities.
Lab work:
Practical exercises on how to make use of various techniques and tools for
computer forensics investigations and cyber trail during cybercrime investigations. Practice
cyber auditing skills. Work on applying the best practices in securing, processing, acquiring,
examining and reporting on digital evidence with current technologies and methods in
forensics investigation.