Students
Tuition Fee
Not Available
Start Date
Not Available
Medium of studying
Fully Online
Duration
1 sessions
Details
Program Details
Degree
Masters
Major
Computer Science | Cybersecurity
Area of study
Information and Communication Technologies | Security Services
Education type
Fully Online
Course Language
English
About Program

Program Overview


Introduction to ITE513 Forensic Investigation

In this subject, students will acquire an in-depth knowledge and practical understanding of how to scan, test, hack, and secure a computer system against potential vulnerabilities. Students will also be prepared for the Computer Hacking Forensic Investigator (CHFI) industry certification exam from the EC-Council.


Availability

The subject is available in Session 2, with 60 students, and is offered online and at the Wagga Wagga Campus.


Subject Information

Grading System

The grading system for this subject is HD/FL.


Duration

The duration of this subject is one session.


School

This subject is offered by the School of Computing and Mathematics.


Enrolment Restrictions

This subject is only available to students enrolled in IT Masters relevant courses.


Learning Outcomes

Upon successful completion of this subject, students should:


  • be able to describe the role of the computer forensics investigator
  • be able to collect and secure evidence in a forensically sound manner
  • be able to testify in the Court as an Expert Witness
  • be able to design and develop a final investigation report
  • be able to critically evaluate and secure a digital crime scene
  • be able to define and justify the international principles for computer evidence

Syllabus

This subject will cover the following topics:


  • Computer forensic analysis
  • The latest computer attack vectors and how you can stop them
  • Proactive and reactive defences for each stage of a computer attack
  • Investigation of attacks against Windows, Unix, switches, routers, and other systems
  • Application-level vulnerabilities, attacks, and defences
  • Legal issues in incident handling
  • Recovering from computer attacks and restoring systems for business
See More