The page uses Browser Access Keys to help with keyboard navigation. Click to learn moreSkip to Navigation

Different browsers use different keystrokes to activate accesskey shortcuts. Please reference the following list to use access keys on your system.

Alt and the accesskey, for Internet Explorer on Windows
Shift and Alt and the accesskey, for Firefox on Windows
Shift and Esc and the accesskey, for Windows or Mac
Ctrl and the accesskey, for the following browsers on a Mac: Internet Explorer 5.2, Safari 1.2, Firefox, Mozilla, Netscape 6+.

We use the following access keys on our gateway

n Skip to Navigation
k Accesskeys description
h Help
Northern Wyoming Community College District    
NWCCD 2017-18 Catalog 
  Dec 18, 2017
NWCCD 2017-18 Catalog
[Add to Portfolio]

CSEC 1530 - Computer Forensics

This course is designed to train “digital investigators” to properly conduct a computer forensics examination and give them an understanding of the process of electronic discovery. Students learn the skills and techniques necessary to conduct a thorough examination. The course develops the foundation needed as the first step in the journey to achieve a Computer Forensics certification such as GIAC Certified Forensic Analyst (GCFA), ISFCE Certified Computer Examiner CCE or IACRB Certified Computer Forensics Examiner (CCFE).

Successful completion of CSEC 1500 Computer Network Security + and MSFT 1745 A+ Computer Maintenance, or instructor consent.

Minimum Student Competencies
Upon completion of CSEC 1530 Computer Forensics, the student will:

  1. discuss legal and ethical issues surrounding computer forensics.
  2. demonstrate an understanding of digital forensics fundamentals.
  3. assess evidence acquisition opportunities in common computer technology to include but not limited to: browsers, networks, computer systems, operating systems, email, and mobile devices.
  4. apply a forensically sound approach to evidence acquisition, preparation and preservation to various types of computer systems, file types, logs, communication, social media and common digital media employed throughout.
  5. determine data-hiding techniques.
  6. identify commonly used forensic software utilities and their purpose.
  7. identify commonly used forensic hardware tools and their purpose.
  8. detail the design of a digital forensics laboratory.
  9. discover the process of casework and report development.

Credits: 3

Instructional Method Lecture

Contact Hours: 3 hours/week

[Add to Portfolio]