Module Code: H8IDFA
Long Title An Introduction to Digital Forensics and Auditing
Title An Introduction to Digital Forensics and Auditing
Module Level: LEVEL 8
EQF Level: 6
EHEA Level: First Cycle
Credits: 5
Module Coordinator: Simon Caton
Module Author: Vikas Sahni
Departments: School of Computing
Specifications of the qualifications and experience required of staff  
Learning Outcomes
On successful completion of this module the learner will be able to:
# Learning Outcome Description
LO1 Describe and explain what a digital investigation is, the sources of digital evidence, along with potential challenges and limitations of forensic.
LO2 Illustrate how data collection is accomplished whilst ensuring the integrity of the original and forensics copy.
LO3 Illustrate how data collection is accomplished whilst ensuring the integrity of the original and forensics copy.
Dependencies
Module Recommendations

This is prior learning (or a practical skill) that is required before enrolment on this module. While the prior learning is expressed as named NCI module(s) it also allows for learning (in another module or modules) which is equivalent to the learning specified in the named module(s).

No recommendations listed
Co-requisite Modules
No Co-requisite modules listed
Entry requirements  
 

Module Content & Assessment

Indicative Content
Basic Principles and methodologies for digital forensics
Design systems with forensic needs in mind  Rules of Evidence general concepts and differences between jurisdictions and Chain of Custody  Search and Seizure of evidence: legal and procedural requirements
Auditing
Identification and application of framework criteria (e.g. ISO 27001, PCI DSS)  Identifying the area of concern to maintain impartiality consistency  Contractual obligations / limitations: right to investigate or audit  Challenges: Privacy, collusion, encryption
Assessment Breakdown%
Coursework50.00%
End of Module Assessment50.00%

Assessments

Reassessment Requirement
Repeat examination
Reassessment of this module will consist of a repeat examination. It is possible that there will also be a requirement to be reassessed in a coursework element.

NCIRL reserves the right to alter the nature and timings of assessment

 

Module Workload

Module Target Workload Hours 0 Hours
Workload: Part Time
Workload Type Workload Description Hours Frequency Average Weekly Learner Workload
Lecture No Description 24 Every Week 24.00
Tutorial No Description 12 Every Week 12.00
Independent Learning No Description 89 Every Week 89.00
Total Weekly Contact Hours 36.00
 

Module Resources

Recommended Book Resources
  • Messier, Ric.. (2015), Operating System Forensics., Syngress, [ISBN: 0128019492].
Supplementary Book Resources
  • Nelson, Bill, Amelia Phillips and Christopher Steuart. (2015), Guide to Computer Forensics and Investigations, [ISBN: 1285060032].
  • Sammons, John.. (2015), Digital Forensics: Threatscape and Best Practices., Syngress, [ISBN: 0128045264.].
  • Spann, Delena D. (2013), Fraud Analytics: Strategies and Methods for Detection and Prevention., Wiley, [ISBN: 111823068X].
  • Albert J. Marcella, Frederic Guillossou, Fredrick Guillossou.. Cyber forensics, Chichester; John Wiley & Sons, [ISBN: 1118273664].
This module does not have any article/paper resources
This module does not have any other resources
Discussion Note: