- Degrees & Programs
- Student Activities
- Career Services
Course Code: ISSC455 Course ID: 4411 Credit Hours: 3 Level: Undergraduate
This course is an introduction to Computer Forensics Investigation Procedures and Response. It provides a basic understanding of the importance of computer forensics, how to set up a secure lab, the process for forensic investigation including first responder responsibilities, how to handle various incidents and information on the various reports used by computer forensic investigators.
|Registration Dates||Course Dates||Session||Weeks|
|04/27/20 - 10/02/20||10/05/20 - 11/29/20||Fall 2020 Session B||8 Week session|
|06/29/20 - 12/04/20||12/07/20 - 01/31/21||Fall 2020 Session D||8 Week session|
The successful student will fulfill the following learning objectives:
The grading will be based on eight weekly assignments, eight weekly Forum postings, six weekly labs, an individual project paper with topic, outline, presentation, and a case study.
All assignments, Forum question responses, and the labs are due by 11:55 Eastern Time Sundayof the week assigned.
Project Paper (Topic, Outline, PowerPoint Presentation, and Paper) Topics:
Week 2: Topic selection due Week 4: Outline due
Week 6: PowerPoint Presentation due Week 7: Paper due
Topics: Acceptable topics unless I have already approved one:
Details of Project Paper (10%): You must include at least ten references.
Prepare a 10-‐15 page paper in Microsoft Word (counts as 10% of the final grade) in APA format (see writing expectations in the Policies section) (350 words per page). The paper should be between 3500 to 5300 words excluding the title page content and the references page content. At a minimum include the following:
You may use resources from the APUS Online Library, any library, government library, or any peer-‐reviewed reference (Wikipedia and any other publicly-‐reviewed source is not accepted). The paper must be at least 10 pages double-‐spaced, 1" margin all around, black 12 point font (Times New Roman or Arial) with correct citations of all utilized references/sources, (pictures, graphics, etc... are extra -‐ allowed but extra for the minimum page count). The title page and references are also required but don't count in the minimum page count. A minimum of 10 references are required.
The paper will be subjected to checking against plagiarism. The paper must follow acceptable originality criteria (no more than 15% max total, and 2% per individual source match are allowed).
Save the file using the following file naming convention: ISSC455_Project_First_Last.doc(x) (where first and last are your first and last names resp.) and submit the file in this assignment area
Here are the originality report requirements:
If you don't follow these three requirement instructions you will get a 0 for your project paper assignment. I will give you the chance to rework your papers until an acceptable level of match is achieved.
At the end of the class, if you have not submitted your paper to turnitin.com, I will submit it anyways even after you'd get a 0, to see the level of plagiarism found, if any. If turnitin.com
matches more than 40% you will be subject to academic reporting.
Case Study (10%): You are hired by JLA Enterprise to create the layout of their computer forensics laboratory. The goal is to design a computer forensic lab that will contain 5 computers that are networked to a server to store all case data. Here are some things to consider when explaining the design of the Forensics lab:
Your submission should be about 3 to 5 pages (not including the title page and the references page) long in APA format with proper citations and references if you are using them. It will be subjected to checking against plagiarism. The final product must follow acceptable originality criteria (no more than 15% max total, and 2% per individual source match are allowed).
Save the file using the following file naming convention: ISSC455_CaseStudy_First_Last.doc(x) (where first and last are your first and last names resp.) and submit the file in this assignment area
|Assignment 1||2.50 %|
|Assignment 2||2.50 %|
|Assignment 3||2.50 %|
|Assignment 4||2.50 %|
|Assignment 5||2.50 %|
|Assignment 6||2.50 %|
|Assignment 7||2.50 %|
|Assignment 8||2.50 %|
|Forum 1||2.50 %|
|Forum 2||2.50 %|
|Forum 3||2.50 %|
|Forum 4||2.50 %|
|Forum 5||2.50 %|
|Forum 6||2.50 %|
|Forum 7||2.50 %|
|Forum 8||2.50 %|
|Wk2 Lab 1||3.00 %|
|Wk6 Lab 5||3.00 %|
|Wk3 Lab 2||3.00 %|
|Wk4 Lab 3||3.00 %|
|Wk5 Lab 4||3.00 %|
|Wk7 Lab 6||3.00 %|
|Project Paper Topic||2.00 %|
|Wk2 Project Paper Topic||2.00 %|
|Project Paper Outline||4.00 %|
|Wk4 Project Paper Outline||4.00 %|
|Project Powerpoint||6.00 %|
|Wk6 Project PowerPoint Presentation||6.00 %|
|Project Paper||10.00 %|
|Wk7 Project Paper||10.00 %|
|Case Study||10.00 %|
|Wk8 Case Study||10.00 %|
|Week 1 and 2 Quiz||2.50 %|
|Week 3 and 4 Quiz||2.50 %|
|Week 5 and 6 Quiz||2.50 %|
|Week 7 and 8 Quiz||2.50 %|
Gupta, U. (2011). Incident Response: 5 Critical Skills. Retrieved from http://www.bankinfosecurity.com/incident-‐response-‐5-‐critical-‐skills-‐a-‐4214/op-‐1
Mohay, G. M., Anderson, A., Collie, B., McKemmish, R. D., & de Vel, O. (2003). Computer and Intrusion Forensics [electronic resource]. Retrieved from http://library.books24x7.com.ezproxy1.apus.edu/toc.asp?bookid=7900
Sammons, J. (2012). The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics [electronic resource]. Retrieved from http://library.books24x7.com.ezproxy1.apus.edu/toc.asp?bookid=44731
Schroader, A., & Cohen, T. (2007). Alternate data storage forensics [electronic resource]. Retrieved from http://library.books24x7.com.ezproxy1.apus.edu/toc.asp?bookid=25445
TaoSecurity. (2009). Speaking of Incident Response. Retrieved from http://taosecurity.blogspot.com/2009/04/speaking-‐of-‐incident-‐response.html
Wiles, J., Cardwell, K., & Reyes, A. (2007). The best damn cybercrime and digital forensics book period [electronic resource]. Retrieved from http://library.books24x7.com.ezproxy1.apus.edu/toc.asp?bookid=25452
|Book Title:||Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations - e-book available in the APUS Online Library|
|Book Title:||Digital Forensics Basics: A Practical Guide Using Windows OS - e-book available in the APUS Online Library|
Not current for future courses.