BSc level basics in operating systems, data communication and network security.
Expected learning outcomes
Students are able to explain the fundamental principles of digital forensics. The students are able to survey a digital crime scene and to acquire, analyze and present digital evidence in a forensically sound manner. The students are further expected to be able to scientifically document theoretical and experimental results related to forensic investigations, and to evaluate the validity of evidence presented by another party. After completion of the course, the student shall demonstrate the following competency:
Digital Forensics methodology with a solid understanding of requirements for handling digital evidence, with an emphasis on evidence integrity and chain of custody
-Forensic acquisition of digital evidence from computer and network media
-Live system forensics and evaluation of order of volatility
-Evidence analysis with timeline analysis and forensic reconstruction
-Scientific documentation of forensic acquisition and analysis
-Legal aspects of cyber crime and cyber crime investigations
-The role of expert witnesses and digital evidence in the context of legal proceedings
- Digital investigations and evidence
- Chain of custody and forensic soundness
- Timeline analysis
- Live system forensics
- File system forensics
-Internet and network forensics
-Advanced topics if time permits
Teaching Methods (additional text)
The course will be made accessible for both campus and remote students. Every student is free to choose the pedagogic arrangement form that is best fitted for her/his own requirement. The lectures in the course will be given on campus and are open for both categories of students. All the lectures will also be available on Internet through GUC’s learning management system (ClassFronter).
Form(s) of Assessment
Written exam, 3 hours
Evaluation of Project(s)
Form(s) of Assessment (additional text)
An overall evaluation based on a 100 point scale, where project work counts 40 points, oral presentation counts 20%, and final exam (3 hours) counts 40 points. Conversion from 100 point scale to A-F scale according to recommended conversion table. In specific circumstances, emneansvarlig can slightly adjust the limits in the conversion table to enforce compatibility with the qualitative descriptions on the A-F scale.
Alphabetical Scale, A(best) – F (fail)
Evaluated by internal examiner, external examiner is used periodically (every four years, next time in 2015/2016)
For the final exam: Ordinary re-sit examination.
Announced at course start
Textbook will be announced at course start
Presentation material and 8 selected papers
Knowledge of Linux is an advantage. The course will be held in English.
In case there will be less than 5 students that will apply for the course, it will be at the discretion of the head of the study program whether the course will be offered or not an if yes, in which form.
Students that have already taken course IMT3551 Digital Forensics at the bachelor level cannot apply to be exempted from taking IMT4012 (Digital Forensics 1) when studying Master in Information Security, because expected learning outcomes and the methods of evaluation in both courses are different.