Teaching Responsibility
LJMU Schools involved in Delivery:
Computer Science and Mathematics
Learning Methods
Lecture
Practical
Module Offerings
5105COMP-JAN-CTY
Aims
To develop an understanding of the role of computer forensics analyst through the use of existing applications and investigative techniques.
Learning Outcomes
1.
Explain the structure of files and the metadata contained within them.
2.
Apply practical knowledge of a number of computer forensic tools as used by practitioners in the field.
3.
Compare a range of appropriate methodologies used during an investigation and present the results of the investigation.
4.
Interpret the theoretical underpinnings of computer forensics.
Module Content
Outline Syllabus:The module will cover the three phases of a computing forensics investigation:
Search Phase:
Search preparation, processing the crime or incident scene, securing evidence from the computer, data acquisition and identification of digital evidence sources. Need to ensure that the ACPO guidelines on Computer Forensics investigations are followed correctly.
Analysis Phase:
Preparing for a computer investigation, the structure and tools required in an investigator's environment, computer forensics software needs, current computer forensics software and hardware, the impact of file and operating systems on the investigation, computer forensics analysis, recovery and investigation of digital image (picture) files and investigating e-mail.
Presentation Phase:
Presenting and reporting the results of a Computer Forensics investigation.
Module Overview:
To develop an understanding of the role of computer forensics analyst through the use of existing applications and investigative techniques. This module is intended to build on first year modules to introduce the students to the practicalities of conducting computer forensics investigations.
To develop an understanding of the role of computer forensics analyst through the use of existing applications and investigative techniques. This module is intended to build on first year modules to introduce the students to the practicalities of conducting computer forensics investigations.
Additional Information:This module is intended to build on first year modules to introduce the students to the practicalities of conducting computer forensics investigations.