powered by
Center for Curriculum and Transfer Articulation
Cyber Forensics and Incident Handling
Course: CIS247DA

First Term: 2003 Summer I
Lecture   3 Credit(s)   4 Period(s)   3.7 Load  
Subject Type: Occupational
Load Formula: S


Description: Forensic and advanced incident handling techniques in a lab setting with hands-on skills in incident response, forensic preparation, Windows forensics, UNIX and Linux forensics, data recovery and analysis, malicious code analysis, law enforcement interaction and case law, corporate and managerial legal concerns and direction. Prepares students for GIAC Certified Forensic Analyst (GCFA) Certification and IACIS Certified Forensic Computer Examiner (CFCE) certification



MCCCD Official Course Competencies
1. Explain the steps in incident verification (I)
2. List and demonstrate the steps in searching for clues in incident response (I, V)
3. Explain the steps in the forensics process---seizure, preservation, analysis, and presentation (II)
4. Explain the steps in media analysis (II)
5. Audit a compromised system to determine its current status and probable attack methods and vectors (II)
6. Demonstrate evidence collection procedures (II)
7. Image and verify a hard disk using ddd and md5sum software. (II)
8. Identify files hidden in alternate data streams using LADS (Locate Alternate Data Streams) (II)
9. Recover deleted files under Windows and Unix (II)
10. List possible sources of logs that can be used to verify the incident (II)
11. Prepare and present a forensics report on an incident (II)
12. Describe the appropriate time to involve law enforcement in incident response (I, II)
13. Identify and explain the means of incident prevention (III)
14. Demonstrate incident and forensics documentation to be completed at each step (I, II, IV)
15. Explain proper file handling procedures during evidence preservation and analysis (V)
16. Explain and demonstrate media imaging for analysis (V)
17. Identify and demonstrate tools used in incident response (I, VI)
18. Identify and demonstrate tools used in forensics analysis (II, VI)
19. Identify and explain legal permissions and restrictions in incident response and forensics analysis (VII)
20. Prepare documents and evidence for a trial (VII)
21. Identify malicious codes under Windows and Unix (VIII)
22. Explain malicious code signatures (VIII)
MCCCD Official Course Competencies must be coordinated with the content outline so that each major point in the outline serves one or more competencies. MCCCD faculty retains authority in determining the pedagogical approach, methodology, content sequencing, and assessment metrics for student work. Please see individual course syllabi for additional information, including specific course requirements.
 
MCCCD Official Course Outline
I. Incident Response Overview
   A. Policies and procedures
   B. External incident source
   C. Internal incident source
   D. Tool kit and equipment preparation
   E. Incident responder vs. incident investigator
II. Forensics Response Overview
   A. Verifying occurrence of an incident
   B. Collecting evidence
   C. Chain of custody
   D. Media analysis
   E. Finding hidden disk space
   F. Live system response and analysis
   G. Dead system response and analysis
   H. Steps to avoid destroying evidence
   I. Building a profile of the incident
   J. Interviewing key people
   K. Recording findings
   L. Preparing a report
   M. Handling volatile evidence
III. Incident Prevention
   A. User and system administrator education and awareness of incidents
   B. Incident containment and mitigation
   C. Incident correction
IV. Documenting the Incident
   A. Collecting and protecting evidence
   B. Incident post mortem
V. Forensics theory on any Operating Systems
   A. Seizure
   B. Preserving evidence
   C. Analysis
   D. Presentation
   E. Searching for clues on Windows system
   F. Searching for clues on UNIX system
   G. File system forensics
   H. Network forensics
   I. Imaging a system
VI. Toolkits
   A. Building a forensics toolkit
   B. Review of existing tools
   C. Development of custom tools
VII. Legal Permissions and Restrictions
   A. Working with law enforcement
   B. Collecting evidence for trial
   C. Forensics challenge
VIII. Malicious Code and Binaries Dissection and Analysis
   A. Back doors
   B. Rootkits
   C. Trojan horses
   D. Worms
   E. Viruses
   F. Logic bomb
 
MCCCD Governing Board Approval Date:  6/17/2003

All information published is subject to change without notice. Every effort has been made to ensure the accuracy of information presented, but based on the dynamic nature of the curricular process, course and program information is subject to change in order to reflect the most current information available.