Академический Документы
Профессиональный Документы
Культура Документы
Course Materials
Course texts include:
Examines the role of the computer forensics investigator as a member of an Incidence Response
Team and explores the nature of the threat to organizations, the indicators that an incident is
underway, the policies and procedures to be followed when an incident is detected, and the
investigation methods used to collect evidence for prevention or prosecution. The course will
Incident Response & Investigation Methods IS 1391 -
Page 1
explore the best practices used to create, organize and deploy an incident response team for
malicious activity. Student will receive three credits for successfully completing the course.
Page 2
Page 3
All assignments for each week are not only listed in the course syllabus but have a
corresponding learning unit under the Module button in this course. All work to be done for the
week as well as links for submitting assignments has been provided in these learning modules.
Page 4
The final course grade will be allocated according to the following formula:
Case Studies
Tutorial/Chapter Assignments
Projects
Exams
Papers
Discussion Board
20%
5%
25%
10%
15%
10%
100.00
92
89
86
82
79
76
72
69
66
59
93
90
87
83
80
77
73
70
67
60
0
4.0
3.7
3.3
3.0
2.7
2.3
2.0
1.7
1.3
1.0
0.0
Example:
Course Grading Policy:
In compliance with the Stevenson University grading policy, a students performance in a course
will be measured in accordance with the following grading system:
A = 4.0
B = 3.0
C = 2.0
Excellent:
Good:
Satisfactory:
D = 1.0
F = 0.0
Unsatisfactory:
Failure:
Page 5
The grade of C- is the lowest acceptable grade for Information Systems courses (accelerated or
traditional). Required IS courses in the major must be repeated for a grade of C- or better in order
to graduate.
The grade of 'B' represents above average work meeting minimum course requirements. The
student receiving a grade of 'B' has consistently demonstrated a complete understanding of the
material and concepts presented throughout the course. Additionally, the student has completed
all course requirements on time, exhibited enthusiastic interest in topics and discussions and is
able to present and apply course concepts in a clear and organized manner, both verbally and on
written tests.
The grade of 'A' is awarded only to those students who fully meet this standard, who additionally
demonstrate exceptional comprehension and application of the course material, and demonstrate
initiative in course requirements.
Page 6
Course Schedule
Module
Topic
Assignments
Blackboard Submission
Pre Assignment
Week
Preliminary Setup
Chapter 1:
The Need for Computer
Forensics
1
Chapter 1:
Computer Forensics in
Todays World
Read:
Computer
Forensics
Jump
Start ,Solomon, Barrett, and Broom
Completion of Chapter 2 Review
questions (Odd only)
Assemble an incident response team
to respond to a network security
breach
Create an action plan for handling the
network security breach
Chapter 2
Read: Computer Forensics Investigation
Procedures and Response
Computer Forensics
Investigation Procedures and
Response
Read:
Complete Case Study #4
Complete Project #1
Chapter 4:
Read:
Computer Forensics
Investigation Procedures and
Response
Page 8
Response textbook
Chapter:5 and 6
Computer Forensics
Investigation Procedures and
Response
Page 9
Page 10
Deliverable Schedule
DELIVERABLE
DUE
Readings
Weekly
Case Study
Weekly
Weeks 5, 8
Exercises
Weekly
Projects
Weeks 2, 4, 6, 8
Page 11
Plagiarism: Representing the words, ideas, research, or works of another as one's own.
Plagiarism can involve submitting work prepared entirely or in part by another person or
commercial service or borrowing material as direct quotation, partial quotation, or
paraphrase from published or unpublished sources without proper acknowledgement.
Students must document all print, online, and oral sources they use to complete
assignments.
Fabrication: Presenting false data, sources, or research results for academic credit.
Multiple Submission: Presenting the same work, in whole or in part, for credit in more
than one course without the explicit permission of all interested instructors.
Page 12
Other Violations: Including, but not limited to, lying, forgery, bribery, damaging or stealing
University or another's property, physically abusing another person, or verbally
threatening another.
Plagiarism Policy
Communication Policy
Effective communication between students and faculty is essential for student success and
faculty expectations. The process below is designed to help everyone feel comfortable that their
message is successfully delivered and acknowledged. Students and faculty should use the steps
below to close the loop in contacting each other. Note that for questions requiring a more
immediate response, students should contact faculty by telephone on their office extension.
1.) Student emails faculty with question or deliverable.
Incident Response & Investigation Methods IS 1391 -
Page 13
2.) Within one business day or as soon as the faculty sees the message, the faculty sends
an email message in response that acknowledges receipt and review of message from
the student. (not necessarily an answer)
3.) If the student does not get a response acknowledging the receipt within one business
day, the student should send the message again. If no acknowledgement is received, the
student should call the faculty member on their office extension or the phone number
listed in the course syllabus.
4.) If the student is still unable to reach the faculty member, they should then contact Cheryl
Bosse by email at cbosse@stevenson.edu
5.) Within 48 hours or sooner if project deadlines are involved, the faculty will respond with a
feedback message on questions or assignments.
6.) Students will respond with an acknowledgment of the feedback message from the faculty.
Student Responsibilities:
Students are responsible for communication with their instructor. There should be no delay in
asking questions, expressing concern about the clarity of concepts or requesting feedback on
assignments.
IMPORTANT:
In all email communications with the instructor, students must identify themselves in the
subject line of the message to include: Last Name, First Name, Course Number, and
Section Number.
All University email communication will be exchanged only over SU email accounts.
Students are responsible for the information sent to their SU email account and must
monitor their SU accounts each day for important University and course related
information. Students are required to view their SU email accounts directly or set up their
SU email account to forward to an account they view regularly during the day.
Students should expect to receive a great deal of information over their SU email account. If you
are not receiving regular information over a forwarded email address you should immediately
investigate the problem before missing important instructions or announcements.
Page 14
http://www.stevenson.edu/academics/academic_advising/disability_services.asp
Page 15