This document outlines the course details for an ISN 1803 Computer Forensics & Investigation course. The instructor is Clarence Lagera who has over 20 years of experience. Tests will be administered via LockDown Browser and assignments must follow specific formatting and submission guidelines. The course will cover topics such as pursuing computer forensics as a profession, corporate investigation procedures, computer forensics tools, analyzing file systems from different operating systems, and addressing data hiding techniques. Student performance will be evaluated based on assignments, tests, and in-class work for a final letter grade.
This document outlines the course details for an ISN 1803 Computer Forensics & Investigation course. The instructor is Clarence Lagera who has over 20 years of experience. Tests will be administered via LockDown Browser and assignments must follow specific formatting and submission guidelines. The course will cover topics such as pursuing computer forensics as a profession, corporate investigation procedures, computer forensics tools, analyzing file systems from different operating systems, and addressing data hiding techniques. Student performance will be evaluated based on assignments, tests, and in-class work for a final letter grade.
This document outlines the course details for an ISN 1803 Computer Forensics & Investigation course. The instructor is Clarence Lagera who has over 20 years of experience. Tests will be administered via LockDown Browser and assignments must follow specific formatting and submission guidelines. The course will cover topics such as pursuing computer forensics as a profession, corporate investigation procedures, computer forensics tools, analyzing file systems from different operating systems, and addressing data hiding techniques. Student performance will be evaluated based on assignments, tests, and in-class work for a final letter grade.
www.jblearning.com All rights reserved. Instructor: CLARENCE LAGERA MM, MBA, CISSP, CCFP 20+ years VP – Sales & Marketing, IT PhilCom PLDT Director for Business Dev't – North America
Legal Issues in Information Security www.jblearning.com Page 2 All rights reserved. House Rules: Synchronous/Asynchronous class Lecture Mid-term Test Final Test Assignment Absence (Medical certificate) Absolute academic integrity Coffee break
Legal Issues in Information Security www.jblearning.com Page 7 All rights reserved. Course Outline: 1. Preparations to pursue computer forensics as a profession 2. Corporate investigation procedures and requirements to setup investigators office 3. Methods of data acquisition, forensics workstation and software, certifications needed, security clearance, and the physical layout of a computer forensics lab 4. Steps in processing crime and incident scenes 5. Use computer forensics tools 6. Analyze file systems of different operating systems, including VM and live acquisition 7. Illustrate computer forensics analysis addressing data hiding techniques and recovering graphic files