CISW 245 Data Security & Forensics*
In modern computing, data security is of paramount importance. This course will discuss techniques for maintaining and securing data, as well as the collection and analysis of evidentiary data.
CISW 245Data Security & Forensics*
Please note: This is not a course syllabus. A course syllabus is unique to a particular section of a course by instructor. This curriculum guide provides general information about a course.
I. General Information
Department
Business Technical
II. Course Specification
Course Type
{D7A8FC71-978F-4003-9933-512C476323B2}
Credit Hours Narrative
3 hours
Semester Contact Hours Lecture
45
Semester Contact Hours Lab
0
Prerequisite Narrative
CISW 240
III. Catalog Course Description
In modern computing, data security is of paramount importance. This course will discuss techniques for maintaining and securing data, as well as the collection and analysis of evidentiary data.
IV. Student Learning Outcomes
Upon completion of this course, a student will be able to:
- Catalog an organization's volatile data, and create an appropriate backup strategy.
- Understand the rules of gathering and processing evidence.
- Set up a statin for secure forensic analysis.
- Use appropriate tools to obtain and store data.
- Provide conclusive reports based on data discovered.
V. Topical Outline (Course Content)
A. Introduction
B. Data Security
-Risk Analysis
-Cataloging data
-Backup best practices
C. Setting up a Forensic Workstation
-Choosing & Installing Tools
-Rules of gathering evidence
-Access Control
D. Getting and Documenting
-Getting Data
-Documenting your process
-Storing data securely
E. PC Forensics
F. Mobile Forensics
G. Local Network Forensics
H. Internet/Cloud Forensics
I. Summarizing Your Findings
J. Final Lab
VI. Delivery Methodologies