Computer and Cyber Forensics – CJUS 363
CG • Section 8WK • 11/08/2019 to 04/16/2020 • Modified 07/28/2020
The course will focus on the role of computer forensics and the methods used in the investigation of computer crimes. The course explains the need for proper investigation and illustrates the process of locating, handling, and processing computer evidence.
CJUS 200 and CJUS 230
This course is an introduction designed to familiarize the student with current approaches to computer, digital and cyber related forensics techniques and reinforce the appropriate procedures for evidence collection and processing. This course augments the core curriculum for criminal justice with a special emphasis in the challenging field of computer sciences. As electronic information increases in its importance and use in the court of law, future investigators need to understand the methods and processes available to them, or to their coworkers to collect, process, analyze and use information evidence supporting investigations and judicial proceedings.
Measurable Learning Outcomes
Upon successful completion of this course, the student will be able to:
Describe digital forensic sciences as a profession.
- Explain basic tools and techniques used in the field of computer forensics sciences.
- Evaluate an emerging issue in computer and cyber forensics.
- Participate in a cyber crime investigation.
- Articulate a biblical worldview of computer sciences, and the legal profession.
Textbook readings and lecture presentations
Course Requirements Checklist
After reading the Syllabus and Student Expectations, the student will complete the related checklist found in Module/Week 1.
Discussion Board Forums (3)
Discussion boards are collaborative learning experiences. Therefore, the student will participate in 3 Discussion Board forums. Threads must be at least 400 words. The initial thread must contain two scholarly sources. In addition to the thread, the student must post replies of at least 200 words to 3 classmates’ threads and cite one source.
Deleted Files Forensics Paper
The student will submit a 2–3-page paper outlining the options for retrieving the deleted files and explain their capabilities by outlining what hardware and software was needed.
The student will submit a 10-12 page Term Paper topic specific to computer crime or computer forensics that represents his/her original work. This assignment will be submitted in 4 parts: Topic Submission, Outline, Bibliography, and Final Submission. The paper must be in current APA format and have a minimum of 5 scholarly sources.
Hashing Files Project
The student will compose a 1–2-page paper explaining what a hash value is and why it is important in computer forensics. The student must include detailed documentation of the activities that he/she conducted using the hashing website, documenting his/her hash values and discussing why the hash value changed.
The student will take 4 quizzes, each containing 25 multiple choice or written questions to be completed in 30 minutes. Each quiz will be open-book/open-notes. The questions will be a combination of questions provided in the assigned chapters, developed from chapter content, and expressed in either outside reading or presentations associated with the module/week.
The student will take a midterm and final test. Each test will contain 140 multiple-choice and essay questions and must be completed in 2 hours. The tests are open-book/open-notes and will cover the content presented through the readings and assignments.