Delivery Type | Delivery length / details |
---|---|
Lecture | At least 10 hours |
Practical | 20 hours |
Assessment Type | Assessment length / details | Proportion |
---|---|---|
Semester Exam | 2 Hours | 50% |
Semester Assessment | Laboratory notebook and report | 50% |
Supplementary Assessment | Will take the same form, under the terms of the Department's policy |
On successful completion of this module students should be able to:
Analyze a computer for deleted and hidden information.
Detect vulnerabilities in a computer system using appropriate tools, and secure against.
Demonstrate an understanding of threats to computer systems and computer networks.
Demonstrate an understanding of the ethical concerns involved in forensics.
Distinguish between relevant and irrelevant materials at a crime scene.
Develop a strategy for defending a computer system against attack.
To provide an insight into the growing field of forensic computing and network security.
The course will provide a practical and in-depth view of security of machines and networks, an overview of the tools available to monitor and analyse such machines and networks before the systems have been compromised, and also to analyse the forensic evidence left behind to trace culprits.
Skills Type | Skills details |
---|---|
Application of Number | no |
Communication | Presentation of workshop results as a report and//or lab workbook. |
Improving own Learning and Performance | Inherent in level of subject |
Information Technology | Inherent to subject |
Personal Development and Career planning | no |
Problem solving | Use of forensic analysis software |
Research skills | In order to do practicals |
Team work | Working as pairs in lab work |
This module is at CQFW Level 7