LEARNING OUTCOMES
1. DEMONSTRATE CRITICAL UNDERSTANDING OF METHODS AND PROCEDURES USED WITHIN A DIGITAL FORENSIC EXAMINATION
Knowledge & Understanding
Learning
2. EXPLAIN AND CRITICALLY EXAMINE OPERATING SYSTEMS INCLUDING WINDOWS, AND LINUX.
Analysis
Problem solving
3. CRITICALLY EXAMINE AND ANALYSE A RANGE OF FILE SYSTEMS.
Problem Solving
Knowledge & understanding
4. IDENTIFY AND PRESENT THE LOCATIONS OF FORENSICALLY SIGNIFICANT DATA AND THE MEANS TO RECOVER IT USING A VARIETY OF FORENSICALLY SOUND TOOLS.
Reflection, Communication
ADDITIONAL ASSESSMENT DETAILS
WRITTEN: A portfolio of work produced reporting the use of a digital investigation tool, that also reviews and critiques a minimum of two separate forensic tools.
INDICATIVE CONTENT
- PC and network fundamentals and component handling for data recovery and evidence gathering:
- Operating Systems, File Systems, File attributes and their forensic significance
- Data hiding, Steganography, Free Space, Slack Space
- Legal and ethical implications of data recovery
- Responsibilities and duties of care of the investigator, Stages of an e-Investigation,
- Conducting a formal search.
- Knowledge and understanding of the use of forensic computing tools
- Use of Windows based investigation tools
- Use of Unix/Linux based investigation tools
- Identification of likely areas for evidence recovery
- Introduction to standards of evidence handling
- Presentation of evidence, Evidence reporting
- Computer Hardware Components
- Windows OS & Linux Artefacts
WEB DESCRIPTOR
A digital forensic investigation is a special case of a forensic investigation where the procedures and techniques are used to make the use of target digital artefacts while allowing the findings to be presented in a Court of Law. The analysis of digital evidence is a very structured and formal process. The module will allow students to develop knowledge and understanding of digital forensics, focusing on different platforms (including computers, mobile phones, and smartphones/tablets).
LEARNING STRATEGIES
Lectures will introduce key topics and concepts with tutor-assisted practical sessions. In the practical sessions you will get hands-on experience of the principles and under-pinning knowledge taught in the lectures. Formative, self-directed exercises to support transfer of knowledge and understanding will be undertaken weekly. Self-directed learning using on-line material will also be used to help develop your research and analytical skills. There will be a weekly one-hour lecture to supplement on-line material.
REFERENCE TEXTS
Anson, A (2020) Applied Incident Response, Wiley, ISBN-13 : 978-1119560265
Oettinger, W (2020) Learn Computer Forensics: A beginner's guide to searching, analyzing, and securing digital evidence, Packt Publishing, ISBN-13 : 978-1838648176
Widup, S (2014) Computer Forensics and Digital Investigation with EnCase Forensic v7, McGraw-Hill Education, 2ISBN-13 : 978-0071807913
Phillips, A (2015), Guide to Computer Forensics and Investigations, Course Technology (5th edition), ISBN 9781285060033
An annually updated keylinks online resource bank will be made available
RESOURCES
Specialist Cyber Security and Digital Forensic laboratory
Module Resources Isolated Forensic Analysis Lab
Forensic tool sets e.g. EnCase, FTK, XRY, Autopsy and many other open-source tools