ITN 276 Outline&Syllabus
ITN 276 Outline&Syllabus
Computer Forensics I
INSTRUCTOR:
OFFICE HONE:
E-M AIL:
TEXTBOOK: Guide to Computer Forensics and Investigations 5th Edition – ISBN: 978-1285060033
Course Objectives:
• At the completion of this course the student will be able to understand the basics of computer forensics, evidence
collection, and processing and analysis of digital cases
• At the completion of this course the student will be able to understand the requirements for creating a forensic lab
and safely processing and storing digital evidence
• At the completion of this course the student will be able to understand the different type of digital and computer
forensic investigations
• At the completion of this course the student will be able to understand the Legal, Privacy and Ethical Issues
associated with computer forensic investigations
• At the completion of this course the student will be able to understand basic data analysis, scripting, cryptography
and steganography in relation to the processing of digital evidence
• At the completion of this course the student will be able to understand basic digital forensic tool usage to include
AccessData Forensic ToolKit and ProDiscover Basic
EVALUATION: Factors involved in evaluation will be tests and an examination. There will be approximately four (4) tests
including an examination during the course. Tests and examination will be weighted equally in calculating and average.
GRADING SCALE:
90-100 A
80-89 B
70-79 C
60-69 D
59 or below F
MAKEUP TESTS: Makeup tests are not given. If a test is missed, the lowest test or examination grade will be used as
the grade for the missed test. If more than one test is missed, the lowest test grade is zero. There is no option for
dropping lowest test grade in this course.
"Any student who feels that he or she may need an accommodation because of a disability (learning disability, attention
deficit disorder, psychological, physical, etc.) please make an appointment to see me during office hours. Please contact
Ms. Cindi Fisher at 797-8441 if you need to pick up your classroom accommodation forms or register with Disability
Services."
"If you need adaptations or accommodations because of a disability (learning disability, attention deficit disorder,
psychological, physical, etc.), if you have emergency medical information to share with me, or if you need special
arrangements in case the building must be evacuated, please make an appointment with me as soon as possible. My
office location and hours are .... Please contact Ms. Cindi Fisher at 797-8441 if you need to pick up your classroom
accommodation forms or register with Disability Services."
Honor Code: By accepting admission to Danville Community College, each student makes a commitment to understand,
support, and abide by the College Academic Honesty Policy without compromise or exception. Violations of academic
integrity will not be tolerated. Consequences are at the discretion of this professor. This class will be conducted in strict
observance of the Academic Honesty Policy as listed in the Student Handbook.
Plagiarism and Academic Dishonesty: Students will be expected to maintain complete honesty and integrity in their
academic work in this class. Acts of academic dishonesty, such as cheating, plagiarism, or inappropriately using the work
of others to satisfy course requirements, will not be tolerated and may result in failure of the affected assignments and/or
failure of this class.
CREDIT HOURS: 3-4 HOURS/WK Lecture: 3-4 HOURS/WK Lab: 0 LEC/LAB COMB: 3-4
I. CATALOG DESCRIPTION: ITN 276 - Teaches computer forensic investigation techniques for collecting
computer-related evidence at the physical layer from a variety of digital media (hard drives, compact flash and
PDAs) and performing analysis at the file system layer.
Module 3:
Students will use Registry Viewer or Registry
Decoder in order to view the registry files within the
Windows operating system. This will allow the
student the opportunity to learn how the Windows
registry hive structure functions as well as where to
locate high value items. Students will create
reports that contains items such as the SAM,
SYSTEM and NTUSER.dat files.
In this module, students will also start to work with
Forensic ToolKit (FTK). Students will use a
forensically sound digital image to create a new
forensic case. Students will use and learn all of the
options available in FTK including the Tabs,
Quickpicks, File Content Options and the
Bookmark Tab. Students will also add newly
discovered evidence to the forensic case that was
created.
Module 4:
Students will continue to use FTK for labs in this
module. Students will create and add bookmarks
for “important” evidence items that will be used in
their case. Students will examine metadata to
further investigate items within the case. In this
module, the students will begin to investigate
images, graphics, videos and audio files that are
found within the case. Students will learn how to
discover hidden or deleted files. Cryptography will
start to be covered in this module as students dive
further into the labs. Encrypted files are present
within the case and will need to be decrypted by
the student. The students will also conduct labs on
automatic and manual data carving.