Teaching Responsibility

LJMU Schools involved in Delivery:

Computer Science and Mathematics

Learning Methods

Lecture

Practical

Module Offerings

6104COMP-SEP-CTY

Aims

To develop an advanced knowledge of mobile device forensics. To gain experience of conducting forensic investigations on a range of mobile devices. To understand the organisation and operation of Cloud Computing systems. To critically assess the opportunities and restrictions of conducting cloud computing forensics.

Learning Outcomes

1.
Critically evaluate the forensic investigation of mobile devices.
2.
Demonstrate advanced knowledge of conducting mobile device forensics.
3.
Compare and contrast cloud computing systems and the forensic implications of conducting an investigation.
4.
Compose and plan key steps in performing cloud computing forensics in a range of scenarios.

Module Content

Outline Syllabus:Mobile Device Forensics: introduction to mobile network, SIM cards and mobile devices. SIM card forensics and ‘Feature’ handset forensics. Location data and common challenges. Smartphone forensics. Android, iDevice, Windows and Blackberry forensics introduction. Cloud Computing Forensics: Introduction to cloud Computing, cloud deployment and service models. Cloud computing services and data storage. Cloud security and attack patterns. Cloud forensics and challenges.
Module Overview:
To develop an advanced knowledge of mobile device forensics. To gain experience of conducting forensic investigations on a range of mobile devices. To understand the organisation and operation of Cloud Computing systems. To critically assess the opportunities and restrictions of conducting cloud computing forensics. With the rise of smartphones and the explosion of apps running on them that are supported by extensive back-end services, two of the most significant new areas of computing are mobile devices and cloud computing. With this massive rise in usage, new areas of digital forensics are now emerging to cater for the investigation of those user devices and the backend infrastructure respectively. This module will examine how forensic investigations can be conducted in this area and identify the key similarities and differences involved.
Additional Information:With the rise of smartphones and the explosion of apps running on them that are supported by extensive back-end services, two of the most significant new areas of computing are mobile devices and cloud computing. With this massive rise in usage, new areas of digital forensics are now emerging to cater for the investigation of those user devices and the backend infrastructure respectively. This module will examine how forensic investigations can be conducted in this area and identify the key similarities and differences involved.

Assessments

Practice

Centralised Exam