The main objective(s) of the course and the expected outcomes are:
- Acquiring the necessary skills in applying computer systems protection techniques.
- Gaining the skills needed for creating robust and secure software applications.
- Obtaining the skills in collecting/analyzing the data, and acquiring relevant evidence following a cybercrime / cybercrime incident.
- Gaining the needed skills in using software tools specific to information systems security and data security.
- Introduction to cybercrime / informatics: investigations on information security, corporate informatics criminology, scientific methods in forensic analysis, investigation of cases of data security breaches. Malicious software analysis.
- Specialized forensic techniques; hidden data and ways to find it, spyware and adware, encryption methods and vulnerabilities. Protect data against Internet tracking methods, wireless technologies and security systems, biometric security systems and their security.
- Ethical hacking: essential terminology, Windows hacking, malware, scanning. Digital evidence in criminal investigations: evidence collection, types of evidence, volatile evidence, general procedures for evidence collection and archiving, methods of evidence collection.
- Identification of data of interest: timing, analysis of surveillance devices, reconstruction of previous events, file formats used, file conversion, investigation of network intrusions and cybercrime, network forensics and journal analysis. Investigating network traffic, investigating Internet attacks, investigating attacks on routers. Forensic tools and case studies.
|#||Course Title||Date and Time|
|01||About the course||October 7th, 2022|
|02||Skills Development in Cyber Industry||October 7th, 2022|
|03||Introduction in Information Systems Security||October 7th, 2022|
|#||Laboratory Title||Date and Time|
- Eoghan Casey, Digital Evidence and Computer Crime Forensic science, Computers and Internet, Elsevier Academic Press, 2011.
- Eoghan Casey (ed.), Handbook of Digital Forensics and Investigation, Academic Press. pp. 567, 2010.
- Eoghan Casey, Computer Evidence and Computer Crime: Forensic Science, Computers, and the Internet, Cambridge, Cambridge University Press, 2000.
- Vacca John R., Computer Forensics Computer Crime Scene Investigation, Massachusetts, Charles River Media, 2002.
C01 - About the course
Course objective In this short introduction about IT and Communications Forensics we will discuss about the main objectives of the course, its importance and main fundamental references for a deeper understanding of the foundations of Computer Forensics and Cybersecurity.
C02 - Skills Development in Cyber Industry
Course objective The lecture brings into discussion the most important skills that any rookie or professional should have in mind when starting on this path. The course will discuss about the technologies and trends, those that are requested by employees on the market, bringing into the discussion career paths and tracks that any professional can follow in his career.
C03 - Introduction in Information Systems Security
Course objective The course will discuss regulations, standards, concepts definitions and their limits with Information Security field.
L01 - TBA
Laboratory objective TBA