Teaching Responsibility

LJMU Schools involved in Delivery:

LJMU Partner Taught

Learning Methods

Lecture
Practical

Module Offerings

4705YCOM-SEP-PAR

Aims

To develop students’ problem-solving skills in computing and apply them using associated tools and techniques used by practitioners in computer digital forensics and computer security.

Learning Outcomes

1.
Identify suitable methods and tools for recovering and analysing data in computer forensic investigations.
2.
Apply computer forensic methods and tools to undertake an investigation.
3.
Apply knowledge of a range of topics in computer security.
4.
Analyse given scenarios to determine potential security issues and respective solutions.

Module Content

Outline Syllabus:Computer Forensics: -Identify the types of crime that may be committed on a digital device. -Explain that evidence may be contained on a number of devices such as PC's, tablets, mobile phones, IoT devices, etc. -Demonstrate the three phases of an investigation from seizure to analysis and finally presentation of results. -Explain the chain of evidence required to ensure any evidence recovered is admissible in court. -Look at the storage on digital devices and recover any data that may exist on them. This data may then be analysed to then be used as evidence in an investigation. Computer Security: - Security theory and key terminology: threat, vulnerability, attacks, privacy, trust, etc. - Security goals (e.g. CIA model) - Common attack techniques and threat sources - Common defence elements and strategies - Introduction to cryptography - Threat intelligence and future security issues
Additional Information:This module provides the student with the basic concepts, methods, techniques and experience of computer forensics and security. Students apply their knowledge and develop practical skills in the assessments by undertaking a digital forensic investigation and a security analysis of a case study.

Assessments

Report
Report