| Long Title: | An Introduction to Digital Forensics and Auditing |
| Language of Instruction: | English |
| Field of Study: |
Computer use
|
| Module Coordinator: |
Simon Caton |
| Module editor: |
Vikas Sahni |
| Teaching and Learning Strategy: |
This module will be taught using a mix of a traditional instructivist and constructivist approach. Teaching and learning will take place primarily through theoretical material, practical workbooks, on-going formative assessment and case studies. The teaching and learning strategy will be applied in nature and
lectures will focus on the understanding and application of knowledge in a practical and applied manner utilising a problem based learning approach. Participants will be guided towards suitable online supporting material including videos and interactive textbook exercises (including MCQs, critical thinking
questions, discussion questions, etc.) to support a constructivist approach. |
| Learning Environment: |
Learning will take place in classroom or lab environments as appropriate. In lab environments, each student will have access to IT resources. Learners will have access to library resources and to faculty outside of the classroom where required. Module materials will be placed on Moodle, the colleges LMS. |
| Module Description: |
The Data Auditing and Forensics module has been included to prepare learners for auditing practices.
The module will prepare learners for the technical instrumentation of compliance and regulation, and by extension the best practices necessary. |
| Learning Outcomes |
| On successful completion of this module the learner will be able to: |
| LO1 |
Describe and explain what a digital investigation is, the sources of digital evidence, along with
potential challenges and limitations of forensic. |
| LO2 |
Illustrate how data collection is accomplished whilst ensuring the integrity of the original and
forensics copy. |
| LO3 |
Illustrate how data collection is accomplished whilst ensuring the integrity of the original and
forensics copy. |
| Pre-requisite learning |
Module Recommendations
This is prior learning (or a practical skill) that is required before enrolment on this module. While the prior learning is expressed as named NCI module(s) it also allows for learning (in another module or modules) which is equivalent to the learning specified in the named module(s).
|
| No recommendations listed |
Requirements
This is prior learning (or a practical skill) that is mandatory before enrolment in this module is allowed. You may not enrol on this module if you have not acquired the learning specified in this section.
|
| No requirements listed |
Module Content & Assessment
| Indicative Content |
|
Basic Principles and methodologies for digital forensics
Design systems with forensic needs in mind
Rules of Evidence general concepts and differences between jurisdictions and Chain of Custody
Search and Seizure of evidence: legal and procedural requirements
|
|
Auditing
Identification and application of framework criteria (e.g. ISO 27001, PCI DSS)
Identifying the area of concern to maintain impartiality consistency
Contractual obligations / limitations: right to investigate or audit
Challenges: Privacy, collusion, encryption
|
| Assessment Breakdown | % |
| Coursework | 50.00% |
| End of Module Assessment | 50.00% |
| Reassessment Requirement |
Repeat examination
Reassessment of this module will consist of a repeat examination. It is possible that there will also be a requirement to be reassessed in a coursework element.
|
Reassessment Description Should learners not achieve a 40% pass mark, they will either sit a repeat terminal exam, or undertake
an assessment that assesses all learning outcomes.
|
NCIRL reserves the right to alter the nature and timings of assessment
Module Workload
| This module has no Full Time workload. |
| Workload: Part Time |
| Workload Type |
Workload Description |
Hours |
Frequency |
Average Weekly Learner Workload |
| Lecture |
No Description |
24 |
Every Week |
24.00 |
| Tutorial |
No Description |
12 |
Every Week |
12.00 |
| Independent Learning |
No Description |
89 |
Every Week |
89.00 |
| Total Hours |
125.00 |
| Total Weekly Learner Workload |
125.00 |
| Total Weekly Contact Hours |
36.00 |
Module Resources
| Recommended Book Resources |
|---|
- Messier, Ric. 2015, Operating System Forensics., Syngress [ISBN: 0128019492]
| | Supplementary Book Resources |
|---|
- Nelson, Bill, Amelia Phillips and Christopher Steuart 2015, Guide to Computer Forensics and Investigations [ISBN: 1285060032]
- Sammons, John. 2015, Digital Forensics: Threatscape and Best Practices., Syngress [ISBN: 0128045264.]
- Spann, Delena D 2013, Fraud Analytics: Strategies and Methods for Detection and Prevention., Wiley [ISBN: 111823068X]
- Albert J. Marcella, Frederic Guillossou, Fredrick Guillossou., Cyber forensics, Chichester; John Wiley & Sons [ISBN: 1118273664]
| | This module does not have any article/paper resources |
|---|
| This module does not have any other resources |
|---|
Module Delivered in
| Programme Code |
Programme |
Semester |
Delivery |
| HDFINTECH |
HDip FinTech |
2 |
Optional |
|