The purpose of this module is: to provide learners with the skills to identify the correct forensics procedures in an investigation, especially the analysis of mobile device contents and networked applications. The module also examines the security vulnerabilities of communication devices and applications.
Overview
Introduction to forensics investigation methodology and procedures of mobile devices and networks, security threats and device vulnerabilities, communication infrastructure, types of cyber crime, legislation and IT compliance, knowledge bases and research.
Mobile Forensics
History of devices, physical vs logical imaging, communication networks and technology, mobile device operating systems, mobile applications, threats and security.
Network Forensics
Network technology and protocols, communication applications like email, sms, web services, internet messaging, threats, vulnerabilities, logging and forensics of attacks.
Forensics Tools
Review of forensics tools for digital devices and networks, mastery of commercial and open-source forensics tools, comparison of tools, sources of data on tools, NIST review documents, forensics organisations.
Investigative Procedures and Law
Forensics investigative procedures and the law, evidence collection and reporting, preparing for prosecution and testifying in court.
Module Content & Assessment | |
---|---|
Assessment Breakdown | % |
Other Assessment(s) | 100 |