Dec 26, 2024  
2022 Undergraduate Bulletin 
    
2022 Undergraduate Bulletin [ARCHIVED CATALOG]

ITS 425 - Computer Forensics


(3)

Role of computer forensics examiner, forensic evidence preservation and computer forensic tools; evidence analysis, chain of custody, and data retrieval from computer hardware and software applications; development of investigative thinking and awareness; study of data hiding techniques, encryption and password recovery; evidence gathering and documentation techniques; imaging digital media, hiding and discovering potential evidence, applying steganography techniques, manipulating alternate data streams, discovering information in mangled files, conducting e-mail investigations, reconstructing browser and Web server activity, establishing covert surveillance with key stroke loggers and remote access, configuring tools to detect a rootkit. Prerequisite(s): ITS 300.