Forensic course development

In recent years, digital technology has experienced dramatic growth. Many of these advances have also provided malicious users with the ability to conceal their activities and destroy evidence of their actions. This has raised the need of developing specialists in computer digital forensics -- the preservation, identification, extraction and documentation of evidence stored in the form of digitally encoded information (data).In this paper, we present the procedures and rationale used in the development of forensic courses at both the undergraduate and the graduate levels. We also demonstrate our decision making process of selecting topics included in each course.

[1]  Ed Tittel,et al.  Scene of the cybercrime : computer forensics handbook , 2002 .

[2]  Jack Koziol Intrusion Detection with Snort , 2003 .

[3]  Warren G. Kruse,et al.  Computer Forensics: Incident Response Essentials , 2001 .

[4]  Rafeeq Ur Rehman,et al.  Intrusion Detection with SNORT (Bruce Perens' Open Source Series): Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID , 2003 .

[5]  Henry B. Wolfe Encountering Encrypted Evidence (potential) , 2002 .

[6]  Eugene Schultz,et al.  Incident Response: A Strategic Guide to Handling System and Network Security Breaches , 2001 .

[7]  Donald L. Pipkin Halting the Hacker , 2002 .

[8]  Stephen Northcutt,et al.  Network intrusion detection , 2003 .

[9]  Eoghan Casey,et al.  Digital Evidence and Computer Crime , 2000 .

[10]  Timothy P. Kosiba Handbook of Computer Crime Investigation: Forensic Tools and Technology , 2003 .

[11]  Radia J. Perlman,et al.  Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.

[12]  Donald L. Pipkin Halting the Hacker: A Practical Guide to Computer Security , 1996 .

[13]  Berni Dwan Halting the hacker: A practical guide to computer security , 1997 .

[14]  Eoghan Casey Bs Ma Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet , 2000 .

[15]  Albert Marcella,et al.  Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes , 2002 .

[16]  Edward Skoudis Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses , 2001 .