Skip to main content

Advanced ForensicsLaajuus (5 cr)

Code: TTC7040

Credits

5 op

Teaching language

  • Finnish

Responsible person

  • Joni Gadd
  • Marko Vatanen
  • Jarmo Viinikanoja

Objective

The student understands profoundly the operation and investigation methods of operating systems and is able to utilize them in analysis of cyber attacks and picturing the overall understanding. In the course, the student learns to use the most common disk, network, mobile and memory forensics tools and methods.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice

Content

- tools and methods of disc forensics
- tools and methods of mobile forensics
- tools and methods of network forensics
- tools and methods of memory forensics

Assessment criteria, satisfactory (1)

Sufficient 1: The student knows superficially the investigation methods of operating systems and cyber attacks. The student is able to select the most common methods for the problem to be solved and apply the most common methods. Additionally, the student can assess their implementation and justify the conclusions.

Satisfactory 2: The student knows the investigation methods of operating systems and cyber attacks. The student is able to select the most common methods for the problem to be solved and apply their technical competence to practice. Additionally, the student is able to superficially assess their implementation and justify the conclusions.

Assessment criteria, good (3)

Good 3: The student knows the investigation methods of operating systems and cyber attacks well and is able to utilize forensics methods in analysis of cyber attacks and picturing the overall understanding. The student is able to select the most common methods for the problem to be solved and apply their technical competence to practice. Additionally, the student is able to assess their implementation versatilely and justify the conclusions.

Very good (4): The student has commendable knowledge of the investigation methods of operating systems and cyber attacks and is able to utilize forensics methods in analysis of cyber attacks and picturing the overall understanding. The student is able to select the relevant methods for the problem to be solved and apply their technical competence to practice. Additionally, the student is able to assess their implementation versatilely and justify the conclusions.

Assessment criteria, excellent (5)

Excellent 5: The student has in-depth knowledge of the investigation methods of operating systems and cyber attacks and is able to utilize forensics methods in analysis of cyber attacks and picturing the overall understanding. The student is able to select the most relevant methods for the problem to be solved and is able to apply their technical competence to practice. Additionally, the student is able to assess their implementation critically and justify the conclusions.