CRMJ 2160 - Computer Forensics Academic Division: Liberal Arts Academic Discipline: Criminal Justice Assistant Dean: Steve Haynes PhD 3 Credit(s) This course introduces the student to the technology that is used to investigate and establish facts of interest, involving the preservation, identification, extraction and documentation of computer evidence. The course focuses on how to perform an autopsy of a computer hard drive, utilizing the specialized software tools and techniques required to analyze the various levels at which computers store data. UG 3 Lab Hour(s) 2 Lecture Hour(s); College Wide Outcomes
College-Wide Learning Outcomes |
Assessments - - How it is met & When it is met |
Communication – Written |
|
Communication – Speech |
|
Intercultural Knowledge and Competence |
|
Critical Thinking |
|
Information Literacy |
|
Quantitative Literacy |
|
Student Learning Outcomes for Course
Outcomes |
Assessments – How it is met & When it is met |
1. The student will demonstrate an understanding of the many techniques used in computer forensics.
|
In-class discussion, lab practices, practical exams, written exams, quizzes, self-test. By the 13th week. |
2. The student will list techniques used in computer forensics, which are also of interest to businesses, wanting to know how employees have been utilizing equipment.
|
In-class discussion, exams, quizzes, self-test. By week 6. |
3. The student will understand and be able to discuss the two topic areas involved in computer forensics.
|
The theory area will be addressed predominantly through lecture, power point presentations and discussion. The area of application will be addressed with labs, workbook assignments and practical quizzes throughout the semester. |
4. The student will recognize, explain and demonstrate aspects of the Technical Process of forensic investigation, as it applies to computer forensics.
|
Exam, in-class discussion, lab projects, quizzes, self-test. By week 7. |
5. The student will recognize, explain and demonstrate aspects of the Evidence Protection Process of forensic investigation, as it applies to computer forensics.
|
Subject matter review, in class discussion, lab projects, exam, quizzes, self-test. By week 8. |
6. The student will illustrate specific procedures needed to explain computer usage, like recovering erased data, tracing past internet usage and finding hidden files.
|
In-class discussion, lab practices and practical exams, written exams, quizzes, self-test. Assessed throughout the entire semester. |
Standard Grading Scale 93-100 A
90 - 92 A-
87- 89 B+
83 - 86 B
80 -82 B-
77- 79 C+
73 - 76 C
70 -72 C-
67- 69 D+
63 - 66 D
60 -62 D-
00- 59 F
Statement on Diversity North Central State College believes that every student is a valued and equal member of the community.* Every student brings different experiences to the College, and all are important in enriching academic life and developing greater understanding and appreciation of one another. Therefore, NC State College creates an inclusive culture in which students feel comfortable sharing their experiences. Discrimination and prejudice have no place on the campus, and the College takes any complaint in this regard seriously. Students encountering aspects of the instruction that result in barriers to their sense of being included and respected should contact the instructor, assistant dean, or dean without fear of reprisal.
*Inclusive of race, color, religion, gender, gender identity or expression, national origin (ancestry), military status (past, present or future), disability, age (40 years or older), status as a parent during pregnancy and immediately after the birth of a child, status as a parent of a young child, status as a foster parent, genetic information, or sexual orientation, Standard NCSC Course Policies Important information regarding College Procedures and Policies can be found on the syllabus supplement located at this link
Add to Portfolio (opens a new window)
|