Graduate Course Proposal Form Submission Detail - CJE6626
Edit function not enabled for this course.
Approved by SCNS
Submission Type: New
Course Change Information (for course changes only):
Comments: required for Cybercrime Cert. To GC. Apprd 12/10/13; To USF Sys 2/4/14, to SCNS 2/12/14; Approved effective 4/1/14
- Department and Contact Information
Tracking Number Date & Time Submitted 4817 2013-09-11 Department College Budget Account Number Criminology BC 122100000 Contact Person Phone LeGrande Gardner 8636677822 firstname.lastname@example.org
- Course Information
Prefix Number Full Title CJE 6626 Digital Forensic Criminal Investigations Is the course title variable? N Is a permit required for registration? N Are the credit hours variable? N Is this course repeatable? N If repeatable, how many times? 0 Credit Hours Section Type Grading Option 3 C - Class Lecture (Primarily) R - Regular Abbreviated Title (30 characters maximum) Course Online? Percentage Online O - Online (100% online) 0
This course will introduce students to digital forensics as practiced by local, state, and federal law enforcement. Students will gain hands on experience with several digital forensic tools in this laboratory-based course.
A. Please briefly explain why it is necessary and/or desirable to add this course.
Needed for new program/concentration/certificate
B. What is the need or demand for this course? (Indicate if this course is part of a required sequence in the major.) What other programs would this course service?
This course will become an integral part of the Cybersecurity Certificate program and is one of five courses in the sequence.
C. Has this course been offered as Selected Topics/Experimental Topics course? If yes, how many times?
D. What qualifications for training and/or experience are necessary to teach this course? (List minimum qualifications for the instructor.)
MA with either 18 hrs in discipline or equivalent expertise in area of study.
- Other Course Information
Upon the successful completion of this course, the student will have an
understanding of the use of forensic software in the identification, preservation, and extraction of digital evidence as they relate to criminal investigations. Upon successful completion of this course of study, students will have experience with and be able to discuss in a knowledgeable manner:
Computing processes and how they relate to digital evidence.
Basics of filing systems and data structures as related to digital evidence
The creation of digital images used in forensic analysis.
Key forms of digital evidence and where to locate them.
Procedures for the collection and preservation of digital evidence.
Principles and application of password recovery software.
B. Learning Outcomes
At the end of this course, students will be able to:
1. Demonstrate successful preservation and collection techniques of digital
2. Use forensic software to preview digital images, recover passwords, and
locate hidden evidential artifacts.
3. Distinguish among different filing systems and identify the appropriate
software tools needed to conduct a forensic examination for each.
4. Design and organize an investigative strategy for examining digital artifacts
that is compliant with contemporary evidence-handling protocols.
C. Major Topics
Students will work through several exercises in which they will conduct a forensic examination of digital images, search for evidence, and bookmark files and items of evidential value to the investigation. Students taking this course will become familiar with the emerging responsibilities of cyber crime investigators as well as developing a hands-on working knowledge of the various software commonly used at many law enforcement agencies.
Altheide, Cory (2011) Digital Forensics with Open Source Tools, Syngress;. ISBN- 10: 1597495867; ISBN-13: 978-1597495868
Carvey, Harlan (2012). Windows Forensic Analysis Toolkit, Third Edition: Advanced Analysis Techniques. ISBN-10: 1597497274 | ISBN-13: 978-1597497275
Carvey, H. (2011). Windows Registry Forensics: Advanced Digital Forensic
Analysis of the Windows Registry. Syngress; ISBN-10: 1597495808; ISBN-13: 978-1597495806
AccessData Forensics Training Manual: Academic Edition (current edition/release). AccessData, Lindon UT.
E. Course Readings, Online Resources, and Other Purchases
F. Student Expectations/Requirements and Grading Policy
Grades are based on a 1:1 ratio of points to percentage; 1 point = 1%
Midterm Exam = 15 points/percent total weight
Final Exam = 15 points/percent total weight
Ten (10) graded practical exercises (5 points each) = 50 points/percent
Term Paper = 20 points/percent total weight (over 4 parts)
G. Assignments, Exams and Tests
EVALUATION CRITERIA FOR ALL WRITTEN ASSIGNMENTS:
Content - The paper addresses all parts of assignment in sufficient depth;
main points are thoroughly supported with examples, illustrations, and
Structure The papers length is sufficient to adequately address the topic;the discussion is appropriate to the topic; the paper is well organized;
conclusions are clearly identifiable and well developed; and the sequence of
thought is logical and ideas are unified.
Spelling, punctuation, and grammar The paper contains no major errors
in these areas.
Readability and style The paper contains clear words/phrases in logical
sequence; avoids redundancies; sentence structure is varied; uses
transitions; paper is reader-friendly and can be easily understood at first
Format - The paper is formatted and all sources are cited in the text and onthe reference page according to APA or other approved style.
All factual material must be documented properly. When using a string of words ormore from a text, you must use quotation marks. You are required to provide in-text citations and references for all written submissions.
H. Attendance Policy
Course Attendance at First Class Meeting Policy for Graduate Students: For structured courses, 6000 and above, the College/Campus Dean will set the first-day class attendance requirement. Check with the College for specific information. This policy is not applicable to courses in the following categories: Educational Outreach, Open University (TV), FEEDS Program, Community Experiential Learning (CEL), Cooperative Education Training, and courses that do not have regularly scheduled meeting days/times (such as, directed reading/research or study, individual research, thesis, dissertation, internship, practica, etc.). Students are responsible for dropping undesired courses in these categories by the 5th day of classes to avoid fee liability and academic penalty. (See USF Regulation Registration - 4.0101,
Attendance Policy for the Observance of Religious Days by Students: In accordance with Sections 1006.53 and 1001.74(10)(g) Florida Statutes and Board of Governors Regulation 6C-6.0115, the University of South Florida (University/USF) has established the following policy regarding religious observances: (http://usfweb2.usf.edu/usfgc/gc_pp/acadaf/gc10-045.htm)
In the event of an emergency, it may be necessary for USF to suspend normal operations. During this time, USF may opt to continue delivery of instruction through methods that include but are not limited to: Blackboard, Elluminate, Skype, and email messaging and/or an alternate schedule. Its the responsibility of the student to monitor Blackboard site for each class for course specific communication, and the main USF, College, and department websites, emails, and MoBull messages for important general information.
I. Policy on Make-up Work
I DO NOT ACCEPT LATE WORK
There is no make-up work. The failure to complete and submit an assignment when due (without prior notice) will result in an automatic grade of "zero" on that assignment.
J. Program This Course Supports
- Course Concurrence Information