Sunday, September 11, 2016

Join me for another Semester


At the end of this course, students should be able to:

  •  Identify the basic principles and tools used in computer forensics. 
  • Understand the main techniques used in data acquisition and analysis and in recovering image files. 
  • Critically evaluate the procedures in processing crime and incident scenes, especially on digital evidence controls, and in presenting digital evidence in court. 
  • Analyze the specific forensic techniques for Windows, Mac, Unix, and cell phone operating systems. 
  • Discuss the main issues and techniques associated with network forensics and malware investigation. 
  • Explain the issues, procedures and techniques used in contingency planning, cyber attack recovery, and business continuity planning and execution.
There are no textbooks in this course. Only Open Educational Resources (OERs) are being used.
Class starts tomorrow, so my posts here should start around the following Wednesday.

Time to learn Cyber Crime Investigation and Digital Forensics

No comments:

Post a Comment