You are here: Home instructional_framework official_framework Trade & Industrial Education Digital Forensics
Log in

Need a new SSL certificate?

View Career Major Course

Course Information
Trade & Industrial Education
Digital Forensics
This course will introduce students to digital forensics and teach them how to obtain digital evidence for use in an investigation. Students are introduced to basic computer and networking concepts, the internet, and computer crimes. In addition, students will learn how to manage evidence and the industry best-practices for examining computers that might contain crime-related information.
Darren Gibson
- Identify what constitutes a crime and identify categories of crime.

- Explain law enforcement's authority to investigate information warfare and terrorist threats to national security.

- Explain the different types of evidence.

- Identify what affects the admissibility of evidence.

- Identify how electronic evidence differs from physical evidence.

- Identify what computer forensics tools and techniques can reveal.

- Explain the process of discovery and electronic discovery.

- Recognize the role e-evidence plays in physical or violent and computer crimes.

- Describe the basic steps in a computer forensics investigation.

- Identify the types of challenges to the admissibility of e-evidence.

- Understand how criminals' motives can help in crime detection and investigation.

- Explain chain of custody.

- Explain why acceptable methods for computer forensics investigations and e-discovery are still emerging.

- Explain how to manage e-evidence throughout the life-cycle of a case.

- Identify the requirements for acquiring and authenticating evidence.

- Describe acceptable methods for searching and analyzing evidence.

- Explain investigative environments and analysis modes.

- Explain the functions and features of forensics tools and tool kits.

- Describe the types of equipment a forensics lab should have available.

- Describe types of certification programs and credentials available for a computer forensics investigator.

- Explain the reasons for policies and procedures.

- Formulate polices and procedures.

- Identify the steps in a forensic examination.

- Conduct and investigation.

- Report the results of an investigation.

- Recognize and identify types of drives and media storage devices.

- Describe PDA and cellular phone technologies.

- Explain techniques for acquiring and analyzing data from hard drives and other storage media.

- Describe techniques for acquiring and analyzing data from PDAs cellular phones.

- List and describe tools that can be used to analyze disk images, PDA data, and cellular phone data.

- Define and recognize an operating system.

- Identify the different types of operating systems interfaces.

- Identify the different components of an operating system.

- Identify the different file systems.

- Explain the OSI and TCP models.

- Explain the basics of how data is transmitted on networks.

- Conduct efficient and effective investigations of Windows systems.

- Find user data and profiles in Window folders.

- Locate system artifacts in Windows systems.

- Examine the content of Linux folders.

- Identify graphic files by file extensions and file signatures.

- Identify what computer forensics graphic tools and techniques can reveal and recover.

- Identify federal rules of evidence and other principles of due process of the law.

- Explain the legal foundation and reasons for pretrial motions regarding evidence.

- Identify the limitations on expectations of privacy.

- Explain the major anti-crime laws and amendments impacting discovery and use of e-evidence.

Computer Forensics: Principles and Practices by Linda Volonino, Reynaldo Anzaldua and Jana Godwin (Pearson Prentice-Hall, 2007)

Career Majors That Sequence This Course
Career Cluster Pathway Career Major
Law, Public Safety, Corrections & Security Law Enforcement Services Criminal Forensics