CET2880C Digital Forensics
CET2880C Digital Forensics
Course Competencies
Competency 1: The student will demonstrate an understanding of methods of data acquisition and preservation
by:
1. Identifying the aspects of digital systems that are volatile versus nonvolatile.
2. Prioritizing relevant digital storage in terms of volatility.
3. Enumerating the different locations valuable data may be stored (e.g. memory, processes, hard drives,
cloud storage, etc).
4. Using appropriate tools to capture and store memory images (e.g. WinDD, DD, etc).
5. Identifying and using appropriate file formats for preserving disk images (e.g. dd, EWF, ISO, etc).
6. Demonstrating basic proficiency using Windows and Linux based operating systems.
Competency 2: The student will demonstrate an understanding of recovering deleted, hidden, and lost files by:
1. Demonstrating a basic understanding of common file system types (e.g. FAT31, NTFS, EXT4, etc.).
2. Describing and acquiring various forms of meta- data from files (e.g. owner, permissions, file size,
modification date, etc).
3. Explaining the purpose and role of slack space in file systems
4. Demonstrating an understanding of unallocated space and information that may be hidden in such
regions.
5. Using common tools to sift through large numbers of files looking for specific information (e.g., grep
and String).
6. Using common tools to perform recovery of deleted files.
Competency 3: The student will demonstrate a basic understanding of file and Document Analysis by:
1. Enumerating basic file types and their common extensions.
2. Explaining why the file extension alone is not enough to identify the file type with certainty.
3. Exploring the basic structure of several different file types (e.g. bmp, txt, exe, etc).
4. Identifying files located within the temporary directory.
5. Finding data and metadata within the Windows registry system.
6. Using common steganography tools to hide and recover data within images.
7. Opening a file within a hex editor
Course Competency 7: The student will demonstrate an understanding of device forensics by:
1. Describing methods for the acquisition/analysis of widespread, non-PC devices (e.g. embedded devices,
IoT).
2. Describing the basic operation of cell phones and cellular networks (e.g. CMDA, GSM, etc).
3. Describing the process of triangulation using cell phone towers to determine the location of an active
cellular signal.
4. Identifying the SIM card, and additional hardware identifiers used to identify the user on the cellular
network (e.g. IMEI, SIM, ESN, ICCID, etc).
5. Locating data stored in various locations on the cellular device (e.g. SIM Card, SD Cards, Internal Storage,
Cache, etc).
6. Using tools such as screen capture to log the forensics investigation process.
7. Explaining the legal issues related to non-PC device forensic activities.
Competency 8: The student will demonstrate an ability to circumvent common anti-forensics techniques by:
1. Identifying the four categories of anti-forensics behavior (i.e. artifact destruction, data hiding, trail
obfuscation, and attacks against forensic tools).
2. Locating lost files by extracting history from the
3. Windows Registry.
4. Locating the metadata contained within the Device Configuration Overload (DCO) and the Host Protected
Area (HPA).
5. Locating previously deleted files using the logs of the master file table.
6. Examining the temporary files on the system for relevant data.
7. Implementing and using basic methods of covert channels.
8. Locating data stored in obscure/hidden locations (e.g. slack, bad clusters, hidden partitions,
etc).
Competency 9: The student will demonstrate understanding of tasks related to the casework process by:
1. Describing methods and approaches for forensic analysis and examination on specified media.
Learning Outcomes:
1. Critical Thinking
2. Computer / Technology Usage
3. Information Literacy
4. Environmental Responsibility