Module Descriptors
FORENSIC INVESTIGATION PROJECT
COCS70308
Key Facts
Faculty of Computing, Engineering and Sciences
Level 7
15 credits
Contact
Leader: Stilianos Vidalis
Hours of Study
Scheduled Learning and Teaching Activities: 8
Independent Study Hours: 142
Total Learning Hours: 150
Assessment
  • REPORT weighted at 100%
Module Details
Module Texts
Computer Forensics: Incident Response Essentials, Kruse, W. G., Heiser, J. G (2001), Paperback Editions, ISBN: 0201707195

Commercially available information and standard textbooks appropriate to the area of study.
Module Special Admissions Requirements
Student must be enrolled on the PgD of the MSc Forensic Computing award.
Module Resources
Software and hardware appropriate to the chosen project together with standard computing facilities.
Access to the Internet.
Library.
Module Learning Strategies
Identify a topic area and develop this into the project in negotiation with a university supervisor.
Develop a plan including project milestones, deliverables and development schedule for the project.
Identify required resources.
Following this the project needs to be carried out and this should be based on the techniques and knowledge gleaned from taught modules, together with advice from the appointed project supervisor (in a weekly meeting). Finally the project report should be produced to describe achievements, approaches used and conclusions.
All students will receive two hours of taught introductory lectures at the start of the project. Remaining contact hours will then be via weekly supervision meetings.
Module Additional Assessment Details
Report (100%) (Learning outcomes 1-4)
Module Indicative Content
This is an individual case study / investigation carried out in an area of forensic computing relevant to the student's interests. The aim of the study is to complete a full methodological investigation into a real or simulated example of computer systems misuse. The types of project will vary related to the students own forensic computing interests, for example it could be based on copyright, fraud, or spoofing. Part of the students study will build up an awareness of procedures and presentation in a courtroom setting.