Abstract

In this subject students will acquire an understanding of the principles of forensic investigation and the complexities involved in conducting forensic investigations in a contemporary context. Students will develop a deeper understanding of the methods for acquiring digital evidence from more contemporary, non-traditional, digital systems (such as social media sites, … For more content click the Read More button below.

Syllabus

Computer forensicsFile System Forensic Analysis Part 1 - Volumes and FATFile System Forensic Analysis Part 2 - NTFSFile Carving.Acquiring digital evidenceLog file analysisMobile device forensics (Android/GPS/SIM Cards)Malware analysisRansomware analysisImage forgerySteganography & Steganalysis

Learning outcomes

Upon successful completion of this subject, students should:
1.
Describe key terms, concepts and implementation considerations of fundamental cyber security systems, processes, and tools in a contemporary business context;
2.
Analyse approaches to implementing secure networks, firewalls, intrusion detection/prevention systems and identity and access management systems;
3.
Analyse and describe vulnerabilities, threat actors and threat vectors within a contemporary context;
4.
Formulate approaches for incident analysis and response, risk management and disaster recovery/business continuity; and
5.
Analyse typical cyber security requirements, formulate and implement technical and procedural strategy to provide enhanced security solutions.

Assumed knowledge

It is assumed that students will have completed ITI581 Cyber Security Fundamentals or equivalent

Enrolment restrictions

Only available to students enrolled in IT Masters courses.