Prerequisites: COSC 110 or equivalent programming course, junior standing, or permission of instructor.
Takes a detailed hands-on approach to the use of computer technology in investigating computer crime. From network security breaches to child pornography, the common bridge is the demonstration that particular electronic media contains incriminating evidence.
Using modern forensics tools and techniques, students learn how to conduct a structured investigation process to determine exactly what happened and who was responsible and to perform this investigation in such a way that the results are useful in criminal proceedings. Real world case studies will be used to provide a better understanding of security issues. Unique forensics issues associated with various operating systems including Linux/Windows operating systems and associated applications are covered.
Upon completion of this course, students will be able to:
First Exam (1 hr)
1. Live response 2. Response data analysis
Second Exam (1 hr)
Total: 42 hours
The final grade will be determined by:
Three Exams: 45%
Group Project including final presentation: 40%
Laboratory Projects: 15%
A: >90 %
The attendance policy will follow the guidelines as is given in the IUP Handbook.
Nelson B, Phillips A, Enfinger F, Steuart C, Guide to Computer Forensics and Investigations, 4thedition, Course Technology, 2010.
Fraud, Waste, and Abuse Hotline
© 2007–17 Indiana University of Pennsylvania
1011 South Drive, Indiana, Pa. 15705 | 724-357-2100