Teaching Responsibility
LJMU Schools involved in Delivery:
Computer Science and Mathematics
Learning Methods
Lecture
Practical
Module Offerings
6204COMP-SEP-CTY
Aims
To develop an advanced knowledge of mobile device forensics.
To gain experience of conducting forensic investigations on a range of mobile devices.
To understand the organisation and operation of Cloud Computing systems.
To critically assess the opportunities and challenges of cloud forensics.
Learning Outcomes
1.
Critically evaluate the forensic investigation of mobile devices
2.
Apply advanced knowledge of mobile device forensics
3.
Critically evaluate forensic implications of an investigation involving cloud computing
4.
Develop a plan for performing complex cloud computing forensics
Module Content
Outline Syllabus:Mobile Device Forensics: introduction to mobile network, SIM cards and mobile devices. SIM card forensics and 'Feature' handset forensics. Location data and common challenges. Smartphone forensics. Android, iOS and introduction to Internet of Things (IoT) forensics.
Cloud Computing Forensics: Introduction to cloud Computing, cloud deployment and service models. Cloud computing services and data storage. Cloud security and attack patterns. Cloud forensics and challenges.
Module Overview:
With the rise of smartphones and the explosion of apps running on them that are supported by extensive back-end services, two of the most significant new areas of computing are mobile devices and cloud computing. With this massive rise in usage, new areas of digital forensics are now emerging to cater for the investigation of those user devices and the backend infrastructure respectively. This module enables you to examine how forensic investigations can be conducted in this area and identify the key similarities and differences involved.
With the rise of smartphones and the explosion of apps running on them that are supported by extensive back-end services, two of the most significant new areas of computing are mobile devices and cloud computing. With this massive rise in usage, new areas of digital forensics are now emerging to cater for the investigation of those user devices and the backend infrastructure respectively. This module enables you to examine how forensic investigations can be conducted in this area and identify the key similarities and differences involved.
Additional Information:With the rise of smartphones and the explosion of apps running on them that are supported by extensive back-end services, two of the most significant new areas of computing are mobile devices and cloud computing. With this massive rise in usage, new areas of digital forensics are now emerging to cater for the investigation of those user devices and the backend infrastructure respectively. This module will examine how forensic investigations can be conducted in this area and identify the key similarities and differences involved.