
| Course Rubric-Number-Section: | ITSY-2343-20P1 |
| Credit: | 3 |
| Contact Hours: |
|
| CIP Code: | 11.1003 |
| Course Title: | Computer System Forensics |
| Course Description: | In-depth study of system forensics including methodologies used for analysis of computer security breaches. Gather and evaluate evidence to perform postmortem analysis of a security breach. |
| Prerequisites: | Take ITDF-1300 Minimum grade C or Credit,P |
| Co-requisites: | None |
| Course Meets: | Online CBL: Monday,Tuesday,Wednesday,Thursday,Friday to Building: 200S room S143 |
| Instructor: | Yahya (John) Labanieh |
| Office Phone Number: | 956 364 4804 |
| Email Address: | ylabanieh@tstc.edu |
| Office Fax Number: | |
| Building & Office Room Number: | George F Young "S" 143 |
| Office Hours: | Tuesday: 10-12, 3-5; Thursday: 10-12; Friday: 8-12 |
| Approved by: | Norma Colunga-Hernandez | Date: | 2023-04-18 |
|---|
| Course Outcomes | |
|---|---|
| CO1: | Identify computer investigation issues |
| CO2: | Identify legal issues associated with computer investigations |
| CO3: | Collect and document evidence |
| CO4: | Evaluate network traffic |
| CO5: | Evaluate recovered remnant or residual data |
Emergency Assistance Available As a student you may experience a range of issues that can cause barriers to learning, such as food insecurity, housing, transportation, and childcare concerns, or you may be unable to pay your bills. These stressful events may lead to diminished academic performance or reduce your ability to participate in daily activities. TSTC offers emergency aid and services to assist you with addressing these and other concerns you may be experiencing. Please contact the TSTC Advocacy & Resource Center.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Title IX Texas State Technical College (TSTC) seeks to provide an environment that promotes equal opportunity free from discrimination and harassment. If you have been a victim of sexual harassment, sexual harassment, sexual assault, or any other form of protected class discrimination, we encourage you to make a report. If you report to a faculty member, she or he must notify TSTC’s Title IX Coordinator about the incident. You may also make a confidential report to TSTC’s Counselors. All students (including pregnant and parent students), regardless of their legal status are entitled to protections under TSTC’s policy. For more information about Title IX or sexual misconduct, as well as your options, please visit TSTCs Title IX website For information about equal opportunity and civil rights policies, visit TSTC's Website
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Student Uniforms Requirement Fully Online Students Texas State Technical College requires all students to wear a program-specific uniform while attending functions on and off campus. This uniform is available for purchase at the campus bookstore. As a student in a fully online program you are required to purchase at least two program-specific uniforms in the event you attend any in person or off campus learning opportunities or events (i.e. Job Fairs, Resume & Interview workshops, and media interviews). Hybrid & F2F Students Texas State Technical College requires all students to wear a program-specific uniform while attending functions and labs on and off campus. This uniform is available for purchase at the campus bookstore. As a student in a hybrid program you are required to purchase at least two program-specific uniforms to wear to in person labs and other learning opportunities or events held on or off campus (i.e. Job Fairs, Resume & Interview workshops, and media interviews). | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
See College Catalog for complete descriptions. NOTE: Course prerequisite/corequisite
When a course is a prerequisite or corequisite and the student is a PBE student, the PBE grading scheme is applicable. If the prerequisite was completed prior to the PBE start term for the student, the traditional grade may be acceptable. The student should review prior grades with the Enrollment Coach.Performance Based Education (PBE) Program Competencies and Traditional Program Instruction (Non-PBE) Curriculum Revisions Each Program of Study, at least once a year, reviews its degree plans, courses, lesson plans, course objectives, course outcomes and/or competencies. They do this to ensure that each degree plan contains the most current curriculum and that it meets industry standards and requirements. Students who successfully complete courses by meeting the minimum standards set for the course will complete the course outcomes and/or PBE competencies and assessments set at the time of enrollment. Course outcomes, competencies, and assessments can be updated at any time, especially from one academic year to another. If a student needs to repeat a course they may need to complete different lesson plans, course objectives, assessments and/or course competencies. Example: A student drops or fails a course in the Spring semester. When the student registers to retake a course, some or all of the course lesson plans and/or competencies and assessments may be different. Therefore, the student will need to successfully complete the newest assessment requirements for the course. Campus Standard Policies
The Student Handbook contains valuable information on campus policies and procedures.
Access and Learning Accommodations (formerly Disability Services) In compliance with the Americans with Disabilities Act Amendments Act of 2008, Americans with Disabilities Act of 1990 and Section 504 of the Rehabilitation Act, Texas State Technical College is committed to ensuring educational access to its students and promotes full participation in it’s programs, services, and course requirements. Qualified students with disabilities are encouraged to access these services by contacting the Access and Learning Accommodations office to discuss their needs for accommodations. Students reserve the right to request services at any time during the semester, however, instructors are not allowed to provide classroom accommodations to a student until appropriate verification from the Access and Learning Accommodations office has been provided. For information, please contact the Access and Learning Accommodations office in a timely manner. Statewide contact information:
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Tutoring Statement The Supplemental Instruction & Tutoring Program at TSTC offers free tutoring and academic support services to help you achieve your academic and career goals. You can access the Tutoring Schedule, as well as MyTSTC Video Tutor Library, by visiting: https://portal.tstc.edu/student/Student_Learning/Pages/Tutoring.aspx (shortened link: goo.gl/Z9vJvY ). For more information, please contact Norma A. Salazar@ 956-364-4557. Learning Resource Center The Learning Resource Center provides online and in person library resources and services. Go to tstc.libguides.com to find help with your assignments, projects, and papers. Clicking the Student tab will allow you to find resources, homework help, tutorials, and real time chat to answer your questions.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
____________________________________________________________________________________________ GENERAL STATEMENT OF POLICY Performance Based Education (PBE) is the name of TSTC’s course-based Competency-Based Education (CBE) initiative. This will help you to focus on mastery of specified industry skills or competencies. In the PBE self-guided environment, students complete coursework at their own pace within the scheduled course timeframe. In the PBE Hybrid environment, online education and traditional face-to-face learning is combined. Students attend/review lecture content online, and perform lab activities in a physical on-campus classroom/lab environment. Course content and activities will be delivered via the TSTC Learning Management System (LMS). The LMS can be accessed using TSTC user login credentials. Access to a computer that meets the department technology standard and a reliable Internet connection is required for course participation. Expect the same variety of work and time required for self-guided online and hybrid activities as a face-to-face course. In all cases, students are expected to: (1) Communicate regularly with course Instructor; (2) Perform course work in a timely manner to ensure course completion; (3) Be an active course participant; (4) Be equipped with required technologies and tools. COURSE RECORDING REQUIRED TECHNOLOGY – CYBERSECURITY PROGRAM COURSES It is important to understand that the right tools/equipment/software is available for successful execution of course labs/assignments. The following Technical Specifications apply to all Cybersecurity program courses:
[1] Provided for on-site [hybrid] courses ATTENDANCE/PARTICIPATION Federal regulations require that students enrolled in a course establish attendance/ participation each term to be eligible for federal financial aid. Failure to engage in academically related activities prior to the census date will require a submission of a “No Show” status. This will result in student federal financial aid eligibility adjustments or revocation. To maintain active participation, students must submit weekly assignments, may interact in class discussions/forums/group work, and participate in other course related activities, as specified by the Instructor. Excessive missing/failing assignments or lack of course participation will result in a notification to the Progress Pathways (Early Alert) System. The early alert system is a college-wide collaborative effort to engage in outreach and intervention with students who are at risk of failing a course due to academic difficulties or personal hardships. PROFESSIONALISM This institution is training future employees. Instructor expectations, like that of an Employer, are simple - Students are expected to: (1) Participate in all required activities; (2) Complete work that needs to be accomplished in a timely manner, and/or within the allotted time window; (3) Communicate regularly with the course Instructor for questions/clarification of course content/assignments, assistance in resolving issues as they arise, or for progress status updates [Check-in periodically via email/message/chat session with Instructor like you would your Employer]; (4) When communicating Instructor(s) or other course participants, students are expected to behave in a professional manner at all times. Positive contributions to the learning environment and participation in classroom/online learning activities are expected. Students who are discourteous, use course/offensive language, or behave in a disruptive manner may be asked to leave the classroom/session. ACADEMIC INTEGRITY/STUDENT CODE OF CONDUCT Students are responsible for reading and adhering to TSTC's student code of conduct. This includes Acts of Academic Dishonesty, and Acts Affecting Computer Resources or Techology. To review TSTC's code of conduct regarding academic integrity and the process for handling academic dishonesty, please refer to the Texas State Technical College (TSTC) Code of Conduct, located on the TSTC website: https://www.tstc.edu/student-life/student-policies/student-code-of-conduct/ LATE/MAKE-UP WORK Students are expected to log into the course on a regular basis and keep up with assignments in the course. Required or recommended/target due dates for assignments will be provided by the instructor and posted on the course Learning Management System (LMS). For non-performance-based (PBE) courses, specific due dates are provided, assignments will not be accepted after the due date, and a grade of zero (0) will result - unless prior arrangements have been made, at the instructor's discretion. COMMUNICATING WITH INSTRUCTOR When communicating with instructors and/or employees of the college, students are required to use the official student email system (mymail). Since email is the primary way of communicating at TSTC, check email daily for class and campus announcements. When communicating with the course Instructor, use the email address posted in syllabus, LMS, or Course Link (Web conferencing, chat links) provided by the Instructor.
CHANGES TO SYLLABUS Any changes to this syllabus will be provided in writing to the student, updated/reposted (HB 2504) on TSTC website, and updated in the course LMS site, building offices, etc., as required. ENROLLMENT COACH INFORMATION TSTC is here to help you succeed and to aid you through your journey with us. An Enrollment Coach will be assigned to you to assist with scheduling classes, guidance towards completing classes on time, and to let you know about all the services TSTC has to offer. In order to help you stay on track to your great paying job, we ask that you meet with your enrollment coach weekly, whether in person, on the computer, or through a phone call. These meetings won’t take long and we want to make sure you know how you are doing and how to get where you are going! To schedule a meeting with your enrollment coach you can click on this link: http://tstc.edu/meetwithcoach. PERFORMANCE BASED EDUCATION [PBE] COURSE INFORMATION/OVERVIEW
Mastery assessments have been built to align with industry reviewed course competencies and you will have multiple attempts to reach this mastery level as outlined in the Departmental Multiple Mastery Attempt Policy below : In Performance Based Education (PBE) courses, you are required to show mastery of course competencies through assessments. At TSTC, mastery assessments in technical courses have the mastery level set at 80% or better. You will need to complete ALL Mastery Assessments with at or above the required mastery level in order to complete the course. The benefit of PBE is that in the event you do not finish the course, Mastery Assessment scores will carry over to the next semester and you can pick up where you left off in the course. Before Your First Mastery Assessment Attempt. Students may attempt the Mastery Assessment once without completing any of the module lessons, with Instructor approval. Failure to successfully show mastery will require the student to complete all module lessons and activities and require Instructor approval for a second attempt. Before attempting a Mastery Assessment, complete formative assessments (typically labeled “Practice and Apply” or “Activity” or “Lab”) included in the module. These formative assessments are designed to help gauge your understanding of the content and help you prepare for the Mastery Assessment. You MUST also complete Check for Understanding activities in the Module. The Check for Understandings are usually automatically graded and designed to make sure you are ready BEFORE you move on to the mastery assessment. For Cybersecurity, you must score at least 80% before you will be able to move on to the Mastery Assessment. You may attempt each Check for Understanding multiple times, but it is strongly suggested that if you are not successful on the Check for Understanding, you return to the module and review all content before attempting it again. After Your First Mastery Assessment Attempt. Instructors will grade your Mastery Assessment within 2 business days. While waiting for feedback on the assessment, continue working on your other course(s).In the event that you do not meet the predetermined score to indicate mastery of the content, you will be given another assessment opportunity. If your first attempt score is between 70 and 79% on a technical course Mastery Assessment, you can self-direct your module review or meet with an instructor to close the gaps in your knowledge, skills, or abilities. If you scored below 70% on a technical course Mastery Assessment, you will need to return to the corresponding module(s), review all instructional materials, and attempt/reattempt all formative assessments. After Your Second Mastery Assessment Attempt. If you fail to demonstrate mastery on the second or any subsequent Mastery Assessment attempt, you MUST schedule a time to meet with your instructor to review the first two attempts. The instructor may assign mandatory tasks for you to complete before the next attempt. Mastery Assessments in the Gradebook. The highest score from all attempts will be recorded for each Mastery Assessment. If you desire an additional attempt to raise your score, you must complete all Mastery Assessments in the course first and then contact your instructor for directions. Note: You cannot request an attempt to raise a score after the semester has ended. It is your responsibility to plan your coursework so that adequate time remains at the end of the semester to administer any additional assessment(s). Mastery Assessment Grade Carry Over. If you do not master an assessment before the end of the semester, you will pick up with that assessment the next semester. Any attempts on that assessment from the previous semester will reset and start over with the first attempt in the new semester. (Note: Failure to complete all Mastery Assessments in a course with the required score will result in an ‘F’ in the course. You will need to register and pay for the course again to continue.) Mastery Assessment scores are good for one calendar year. In other words, you have three semesters after the initial semester ends to complete the course. For example, if a student masters assessments for modules 1 and 2 in a course but not the third module in Fall 2022 semester, they will need to finish the course the next Spring 2023, Summer 2023 or Fall 2023 semester to carry over the scores for Mastery Assessments 1 and 2. The student will need to repeat the entire course if they wait until the Spring 2024 semester. |
| Resources |
|---|
| Textbooks & Publications: | |||||
|---|---|---|---|---|---|
| Item | Title | Author | Publisher | Edition | ISBN |
| 1 | Guide to Computer Forensics and Investigations | Bill Nelson, Amelia Phillips, Chris Steuart | Cengage | 6th | 978-1-337-56894-4 |
| Grade Scheme | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| Category Description | Category Value | ||||||||||
| Mastery Assessments | 100% | ||||||||||
| Assessment Label: | Assessment Description | Assessment Value | |||||||||
| Module 1 Mastery Assessment (Exam): | Module 1 Mastery Assessment (Exam) | 10.00% | |||||||||
| Module 1 Mastery Assessment (Lab): | Module 1 Mastery Assessment (Lab) | 10.00% | |||||||||
| Module 2 Mastery Assessment (Exam): | Module 2 Mastery Assessment (Exam) | 10.00% | |||||||||
| Module 2 Mastery Assessment (Lab): | Module 2 Mastery Assessment (Lab) | 10.00% | |||||||||
| Module 3 Mastery Assessment (Exam): | Module 3 Mastery Assessment (Exam) | 10.00% | |||||||||
| Module 3 Mastery Assessment (Lab): | Module 3 Mastery Assessment (Lab) | 10.00% | |||||||||
| Module 4 Mastery Assessment (Exam): | Module 4 Mastery Assessment (Exam) | 10.00% | |||||||||
| Module 4 Mastery Assessment (Lab): | Module 4 Mastery Assessment (Lab) | 10.00% | |||||||||
| Module 5 Mastery Assessment (Exam): | Module 5 Mastery Assessment (Exam) | 10.00% | |||||||||
| Module 5 Mastery Assessment (Lab): | Module 5 Mastery Assessment (Lab) | 10.00% | |||||||||
| Category Description | Category Value | ||||||||||
| Skill and Knowledge Building Activities | 0% | ||||||||||
| Assessment Label: | Assessment Description | Assessment Value | |||||||||
| ITSY 2343 Lab 1.1.1a Enron Emails: | ITSY 2343 Lab 1.1.1a Enron Emails | 0.00% | |||||||||
| ITSY 2343 Lab 1.1.1b Lay's Ways: | ITSY 2343 Lab 1.1.1b Lay's Ways | 0.00% | |||||||||
| ITSY 2343 Lab 1.1.2 Analyze your digital footprint: | ITSY 2343 Lab 1.1.2 Analyze your digital footprint | 0.00% | |||||||||
| Lab 2.1.1 Using Autopsy to Locate and Extract JPEG Files with Altered Extensions: | Lab 2.1.1 Using Autopsy to Locate and Extract JPEG Files with Altered Extensions | 0.00% | |||||||||
| Lab 2.1.2 Hiding data in a picture and a media file: | Lab 2.1.2 Hiding data in a picture and a media file | 0.00% | |||||||||
| ITSY 2343 Lab 3.1.1 Validating Data with a Hexadecimal Editor: | ITSY 2343 Lab 3.1.1 Validating Data with a Hexadecimal Editor | 0.00% | |||||||||
| ITSY 2343 Lab 3.1.2 Performing Bit-Shifting on a File: | ITSY 2343 Lab 3.1.2 Performing Bit-Shifting on a File | 0.00% | |||||||||
| Lab 4.1.1a Using Autopsy to open a Virtual Machine File: | Lab 4.1.1a Using Autopsy to open a Virtual Machine File | 0.00% | |||||||||
| Lab 4.1.1b Explore SANS-SIFT: | Lab 4.1.1b Explore SANS-SIFT | 0.00% | |||||||||
| Lab 4.1.1c Nested Virtualization: | Lab 4.1.1c Nested Virtualization | 0.00% | |||||||||
| ITSY 2343 Lab 4.1.2a Examining a Firewall Log: | ITSY 2343 Lab 4.1.2a Examining a Firewall Log | 0.00% | |||||||||
| ITSY 2343 Lab 4.1.2b Examining a Denial of Service Attack: | ITSY 2343 Lab 4.1.2b Examining a Denial of Service Attack | 0.00% | |||||||||
| ITSY 2343 Lab 5.1.1 SIM Card Secrets: | ITSY 2343 Lab 5.1.1 SIM Card Secrets | 0.00% | |||||||||
| Lesson 5.1.1 Quiz: | Lesson 5.1.1 Quiz | 0.00% | |||||||||
| Lesson 5.1.2 Quiz: | Lesson 5.1.2 Quiz | 0.00% | |||||||||
| Lab 5.1.2a Examine a Mobile Phone: | Lab 5.1.2a Examine a Mobile Phone | 0.00% | |||||||||
| Lab 5.1.2b EXIF Information Extraction: | Lab 5.1.2b EXIF Information Extraction | 0.00% | |||||||||
| Lesson 5.1.3 Quiz: | Lesson 5.1.3 Quiz | 0.00% | |||||||||
| ITSY 2343 Lab 5.1.4a Examining a Prefetch File: | ITSY 2343 Lab 5.1.4a Examining a Prefetch File | 0.00% | |||||||||
| ITSY 2343 Lab 5.1.4b Examining Cloud Services: | ITSY 2343 Lab 5.1.4b Examining Cloud Services | 0.00% | |||||||||
| Lesson 5.1.4 Quiz: | Lesson 5.1.4 Quiz | 0.00% | |||||||||
| |||||||||||
| Description of Graded Elements of the Course | |||
|---|---|---|---|
| Assessment Label | Assessment Description/Course outcomes met | Assessment Value in Percent |
% of Final Grade |
| ITSY 2343 Lab 1.1.1a Enron Emails | ITSY 2343 Lab 1.1.1a Enron Emails Course outcomes met: CO5 | 0.00 | 0.00% |
| ITSY 2343 Lab 1.1.1b Lay's Ways | ITSY 2343 Lab 1.1.1b Lay's Ways Course outcomes met: CO5 | 0.00 | 0.00% |
| ITSY 2343 Lab 1.1.2 Analyze your digital footprint | ITSY 2343 Lab 1.1.2 Analyze your digital footprint Course outcomes met: CO5 | 0.00 | 0.00% |
| Module 1 Mastery Assessment (Exam) | Module 1 Mastery Assessment (Exam) Course outcomes met: CO2, CO5 | 10.00 | 10.00% |
| Module 1 Mastery Assessment (Lab) | Module 1 Mastery Assessment (Lab) Course outcomes met: CO5 | 10.00 | 10.00% |
| Lab 2.1.1 Using Autopsy to Locate and Extract JPEG Files with Altered Extensions | Lab 2.1.1 Using Autopsy to Locate and Extract JPEG Files with Altered Extensions Course outcomes met: CO5 | 0.00 | 0.00% |
| Lab 2.1.2 Hiding data in a picture and a media file | Lab 2.1.2 Hiding data in a picture and a media file Course outcomes met: CO5 | 0.00 | 0.00% |
| Module 2 Mastery Assessment (Exam) | Module 2 Mastery Assessment (Exam) Course outcomes met: CO5 | 10.00 | 10.00% |
| Module 2 Mastery Assessment (Lab) | Module 2 Mastery Assessment (Lab) Course outcomes met: CO5 | 10.00 | 10.00% |
| ITSY 2343 Lab 3.1.1 Validating Data with a Hexadecimal Editor | ITSY 2343 Lab 3.1.1 Validating Data with a Hexadecimal Editor Course outcomes met: CO2, CO1 | 0.00 | 0.00% |
| ITSY 2343 Lab 3.1.2 Performing Bit-Shifting on a File | ITSY 2343 Lab 3.1.2 Performing Bit-Shifting on a File Course outcomes met: CO2, CO1 | 0.00 | 0.00% |
| Module 3 Mastery Assessment (Exam) | Module 3 Mastery Assessment (Exam) Course outcomes met: CO1, CO2 | 10.00 | 10.00% |
| Module 3 Mastery Assessment (Lab) | Module 3 Mastery Assessment (Lab) Course outcomes met: CO1, CO2 | 10.00 | 10.00% |
| Lab 4.1.1a Using Autopsy to open a Virtual Machine File | Lab 4.1.1a Using Autopsy to open a Virtual Machine File Course outcomes met: CO4 | 0.00 | 0.00% |
| Lab 4.1.1b Explore SANS-SIFT | Lab 4.1.1b Explore SANS-SIFT Course outcomes met: CO4 | 0.00 | 0.00% |
| Lab 4.1.1c Nested Virtualization | Lab 4.1.1c Nested Virtualization Course outcomes met: CO4 | 0.00 | 0.00% |
| ITSY 2343 Lab 4.1.2a Examining a Firewall Log | ITSY 2343 Lab 4.1.2a Examining a Firewall Log Course outcomes met: CO4 | 0.00 | 0.00% |
| ITSY 2343 Lab 4.1.2b Examining a Denial of Service Attack | ITSY 2343 Lab 4.1.2b Examining a Denial of Service Attack Course outcomes met: CO4 | 0.00 | 0.00% |
| Module 4 Mastery Assessment (Exam) | Module 4 Mastery Assessment (Exam) Course outcomes met: CO4 | 10.00 | 10.00% |
| Module 4 Mastery Assessment (Lab) | Module 4 Mastery Assessment (Lab) Course outcomes met: CO4 | 10.00 | 10.00% |
| ITSY 2343 Lab 5.1.1 SIM Card Secrets | ITSY 2343 Lab 5.1.1 SIM Card Secrets Course outcomes met: CO3 | 0.00 | 0.00% |
| Lesson 5.1.1 Quiz | Lesson 5.1.1 Quiz Course outcomes met: CO3, CO2 | 0.00 | 0.00% |
| Lab 5.1.2a Examine a Mobile Phone | Lab 5.1.2a Examine a Mobile Phone Course outcomes met: CO3 | 0.00 | 0.00% |
| Lab 5.1.2b EXIF Information Extraction | Lab 5.1.2b EXIF Information Extraction Course outcomes met: CO3 | 0.00 | 0.00% |
| Lesson 5.1.2 Quiz | Lesson 5.1.2 Quiz Course outcomes met: CO3 | 0.00 | 0.00% |
| Lesson 5.1.3 Quiz | Lesson 5.1.3 Quiz Course outcomes met: CO3, CO2 | 0.00 | 0.00% |
| ITSY 2343 Lab 5.1.4a Examining a Prefetch File | ITSY 2343 Lab 5.1.4a Examining a Prefetch File Course outcomes met: CO3 | 0.00 | 0.00% |
| ITSY 2343 Lab 5.1.4b Examining Cloud Services | ITSY 2343 Lab 5.1.4b Examining Cloud Services Course outcomes met: CO3 | 0.00 | 0.00% |
| Lesson 5.1.4 Quiz | Lesson 5.1.4 Quiz Course outcomes met: CO3 | 0.00 | 0.00% |
| Module 5 Mastery Assessment (Exam) | Module 5 Mastery Assessment (Exam) Course outcomes met: CO3, CO2 | 10.00 | 10.00% |
| Module 5 Mastery Assessment (Lab) | Module 5 Mastery Assessment (Lab) Course outcomes met: CO3 | 10.00 | 10.00% |
| 100.00 | 100.00% | ||
| Course Schedule | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Unit/ Week |
Unit Description/Objectives | Assessment Label:Description Due Date | ||||||||||||||||||||||
| 1 | CC1.1 Extract information from email and social media communications | |||||||||||||||||||||||
|
| |||||||||||||||||||||||
| 2 | CC2.1 Recover graphic evidence | |||||||||||||||||||||||
|
| |||||||||||||||||||||||
| 3 | CC3.1 Determine the scope of a digital forensics investigation | |||||||||||||||||||||||
|
| |||||||||||||||||||||||
| 4 | CC4.1 Implement standard procedures for virtual machine and network forensics | |||||||||||||||||||||||
|
| |||||||||||||||||||||||
| 5 | CC5.1 Describe standard procedures for mobile device and cloud forensics | |||||||||||||||||||||||
|
| |||||||||||||||||||||||