Overview

This unit introduces students to the procedures that are used in relation to cyber forensics and digital investigations to detect cyber criminal activities, protect organisation from attack and prosecute perpetrators. Students will explore computer and operating system architectures, their associated data and file structures. The unit covers key procedures and processes involved in digital and cyber forensics. Students will conduct forensic processes, utilise and research a range of tools. A crucial aspect of this unit is that students will be able to communicate the results of investigations to non-specialist audiences.

Requisites

Prerequisites
CYB70003 Cyber Forensics

Rule

50 credit points

Teaching Periods
Location
Start and end dates
Last self-enrolment date
Census date
Last withdraw without fail date
Results released date

Learning outcomes

Students who successfully complete this unit will be able to:

  • Explain computer architectures and concepts associated with data structures, the collection of evidence and validation
  • Critically review the different forensic tools and techniques to gather and analyse digital evidence
  • Report cyber forensic investigations and findings to key business stakeholders and decision makers
  • Use legal frameworks to explain and present forensically gathered evidence

Teaching methods

Hawthorn

Type Hours per week Number of weeks Total (number of hours)
Face to Face Contact (Phasing out)
Class
3.00 12 weeks 36
Unspecified Learning Activities (Phasing out)
Independent Learning
9.50 12 weeks 114
TOTAL150

Swinburne Online

Type Hours per week Number of weeks Total (number of hours)
Online
Directed Online Learning and Independent Learning
12.50 12 weeks 150
TOTAL150

Assessment

Type Task Weighting ULO's
AssignmentIndividual 50 - 60% 1,2,3,4 
ProjectIndividual 40 - 50% 1,2,3,4 

Content

  • Overview of forensic Issues in cybercrime
  • The handling and management of digital evidence by business
  • Overview of computer forensic software tools
  • Entrapment, encryption and the expectation of privacy for the individual, the organisation and third parties
  • Analysis of forensic data, credibility of tools and data
  • Using the tools to develop strategies to detect cyber criminal attack, protect organisation from attack and prosecute perpetrators
  • Evidence based decision making
  • Analytical process descriptive, predictive and prescriptive
  • Identifying and analysing digital evidence such as computers, mobile phones and  online sources
  • Understand the process of chain of evidence and custody, sources of digital evidence, evidence artefacts and reporting structure of evidentiary analysis

 

 

Study resources

Reading materials

A list of reading materials and/or required textbooks will be available in the Unit Outline on Canvas.