Digital Forensics – CSIS 440

CG • Section 8WK • 11/08/2019 to 04/16/2020 • Modified 04/07/2022

Course Description

Students are introduced to the concept of computer crimes and the need for forensics specialists (people who know how to find and follow the evidence). System Forensics, Investigation, and Response begins by examining the fundamentals of system forensics, the role of computer forensics specialists, computer forensic evidence, and application of forensic analysis skills. It also gives an overview of computer crimes, forensic methods, and laboratories. It then addresses the tools, techniques, and methods used to perform computer forensics and investigation. Finally, it explores emerging technologies as well as future directions of this interesting and cutting-edge field. (Formerly BMIS 440)

For information regarding prerequisites for this course, please refer to the Academic Course Catalog.


This course is an introduction designed to familiarize the student with current approaches in computer, digital, and cyber related forensics techniques and to reinforce the appropriate procedures for evidence collection and processing. This course augments the core curriculum for criminal justice with a special emphasis in the challenging field of computer sciences. As electronic information increases in its importance and use in the court of law, future investigators need to understand the methods and processes available to them or to their coworkers to collect, process, analyze, and use information evidence supporting investigations and judicial proceedings.

Measurable Learning Outcomes

Upon successful completion of this course, the student will be able to:

  1. Demonstrate general knowledge and comprehension of digital forensic sciences as a profession.
  2. Demonstrate knowledge and comprehension of basic tools and techniques used in the field of computer forensics sciences.
  3. Evaluate an emerging issue in computer and cyber forensics, analyze the position or arguments around the issue, and present his/her knowledge in a written logical professional manner.
  4. Participate in a cyber crime investigation by developing and documenting procedures, following evidence handling protocols, documenting extraction, and presenting findings in a legally acceptable manner for use as evidence in a criminal or civil case.
  5. Articulate a biblical worldview of computer sciences and the legal profession.

Course Assignment

Readings and presentations

Course Requirements Checklist

After reading the Syllabus and Student Expectations, the student will complete the related checklist found in the Course Overview.

Discussions (8)

Discussions are collaborative learning experiences. Therefore, the student will participate in eight discussions.

Quizzes (2)

The student will participate in two exams, each dealing with a different aspect of digital forensics.

Assignments (8)

The student will submit eight assignments, each dealing with a different aspect of digital forensics.