eForensic Fundamentals
Duration
- One Semester or equivalent
Contact hours
- 36 Hours
On-campus unit delivery combines face-to-face and digital learning.
Prerequisites
Aims and objectives
This unit familiarises student with the workings of the various technologies used to undertake and investigate electronic misconduct. It provides an understanding of forensic tool kits and develops the skills to implement their use. Students will be presented with examples of e-forensic artefacts with each of the technologies.
Unit Learning Outcomes (ULO)
Students who successfully complete this unit will be able to:
1. Demonstrate knowledge of operating systems, networks, mobile technologies and internet technologies and related forensic artefacts of each technology.
2. Demonstrate knowledge of the workings of a forensic tool kit.
3. Apply knowledge of the usage of forensic tool kits.
4. Identify incidents of electronic fraud.
5. Identify, locate and develop strategies for the evaluation of data sources for e-forensic investigation.
6. Describe common malware types and their effects.
Unit Learning Outcomes (ULO)
Students who successfully complete this unit will be able to:
1. Demonstrate knowledge of operating systems, networks, mobile technologies and internet technologies and related forensic artefacts of each technology.
2. Demonstrate knowledge of the workings of a forensic tool kit.
3. Apply knowledge of the usage of forensic tool kits.
4. Identify incidents of electronic fraud.
5. Identify, locate and develop strategies for the evaluation of data sources for e-forensic investigation.
6. Describe common malware types and their effects.
Unit information in detail
- Teaching methods, assessment, general skills outcomes and content.
Teaching methods
* Scheduled face to face: Lectures (12 hours), Computer Laboratories (with Tutor) (24 hours)
* Scheduled synchronous online Learning events (N/A)
Non-scheduled online learning events and activities (N/A)
Other non-scheduled learning events and activities including independent study (approx. 114 hours)
* Scheduled synchronous online Learning events (N/A)
Non-scheduled online learning events and activities (N/A)
Other non-scheduled learning events and activities including independent study (approx. 114 hours)
Assessment
Types | Individual or Group task | Weighting | Assesses attainment of these ULOs |
Examination | Individual | 50% | 1,2,3,4,5,6 |
Laboratory Reports | Individual | 50% | 1,2,3,4,5,6 |
Minimum requirements to pass this unit
As the minimum requirements of assessment to pass the unit and meet all Unit Learning Outcomes to a minimum standard, a student must achieve:
(i) An aggregate mark of 50% or more, and
(ii) Obtain at least 40% in the final exam
Students who do not successfully achieve hurdle requirement (ii) will receive a maximum of 44% as the total mark for the unit and will not be eligible for a conceded pass.
As the minimum requirements of assessment to pass the unit and meet all Unit Learning Outcomes to a minimum standard, a student must achieve:
(i) An aggregate mark of 50% or more, and
(ii) Obtain at least 40% in the final exam
Students who do not successfully achieve hurdle requirement (ii) will receive a maximum of 44% as the total mark for the unit and will not be eligible for a conceded pass.
General skills outcomes
During this unit students will receive feedback on the following key generic skills:
• Analysis Skills
• Problem Solving Skills
• Communication Skills
• Ability to tackle unfamiliar problems
• Ability to work independently
• Analysis Skills
• Problem Solving Skills
• Communication Skills
• Ability to tackle unfamiliar problems
• Ability to work independently
Content
• File formats, structure, source of production and file systems
• Networks: Client-server architecture, LANS, WANS, network protocols
• Mobile technologies: protocols, mobile software, user identification
• Internet: protocols, internet software, user identification
• Forensic tool kits
• Data extraction and forensic copying.
• Pattern matching
• Verification and validation
• Anti-forensic techniques
• Malware
• Networks: Client-server architecture, LANS, WANS, network protocols
• Mobile technologies: protocols, mobile software, user identification
• Internet: protocols, internet software, user identification
• Forensic tool kits
• Data extraction and forensic copying.
• Pattern matching
• Verification and validation
• Anti-forensic techniques
• Malware
Study resources
- References.
References
A list of reading materials and/or required texts will be made available on the Unit Outline.