Computer Information Science American River College
Courses

CISS 360: Computer Forensics and Investigation

Units: 3.00
Prerequisite: None.
Advisory: CISC 324 (Intermediate Linux Operating System), CISS 310 (Network Security Fundamentals), and CISS 350 (Disaster Recovery)
Hours: 45 hours lecture, 27 hours laboratory
Description: This course introduces the methods used to conduct a computer forensics investigation. Topics include an overview of computer forensics as a profession, the computer investigation process, operating systems' boot processes and disk structures, data acquisition and analysis, ethics, and a review of standard computer forensic tools. The course topics map to the objectives of the International Association of Computer Investigative Specialists (IACIS) certification.

Section 3: Learning Outcomes and Objectives

Upon completion of this course, the student will be able to:

  • Define computer forensics concepts as a profession.
  • Plan and prioritize computing investigation and forensic analysis procedures to be employed.
  • Describe Microsoft operating systems' boot procedures and disk structures.
  • Differentiate common operating systems' boot procedures and disk structures.
  • Assess and compare computer forensic tools used in investigations.
  • Construct and employ digital evidence controls to safeguard the results of the forensic investigation.
  • Create and prepare detailed procedures for crime scene incident processing.
  • Demonstrate forensic investigation data acquisition procedures.
  • Critique a forensic analysis and prepare reports for law enforcement and management.
  • Prepare and describe E-mail investigation methods for a forensic analysis.
  • Describe and compare graphic image recovery methods.
  • Compose forensic analysis reports using technical jargon and non-technical terms.
Certificates requiring this course: