Skip to main content

Digital Forensics and Incident ResponseLaajuus (5 cr)

Code: TTC7050

Credits

5 op

Teaching language

  • Finnish

Responsible person

  • Joni Gadd
  • Marko Vatanen
  • Jarmo Viinikanoja

Objective

The student understands the terminology, applications and workings of digital forensics as well as the concepts and procedures of cyber incident management. Additionally, the course deals with various tools to implement basic level digital forensics and incident management. The student learns about the significance of digital forensics for the study of cyber attacks.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 

Content

- terminology of digital forensics
- applications and processes of digital forensics
- tools of digital forensics
- significance of digital forensics when investigating cyber attacks
- Concepts and courses of action in cyber incident management

Assessment criteria, satisfactory (1)

Sufficient 1: The student knows superficially the applications of digital forensics and the processes when dealing with cyber attacks. The student is able to choose the most common methods for the problem to be solved and is able to apply the most common methods to it. Additionally, the student is able to assess their implementation superficially and justify their conclusions.

Satisfactory 2: The student knows the terminology of digital forensics and incident management. The student is able to choose the most common methods for the problem to be solved and is able to apply their technical competence in practice. Additionally, the student is able to assess their implementation superficially and justify their conclusions.

Assessment criteria, good (3)

Good 3: The student knows the principles, types and exploitation of cyber threat information in cyber defense. The student can select the most common methods for the problem to be solved and apply their technical competence to practice. Additionally, the student is able to assess their implementation versatilely and justify their conclusions.

Very good 4: The student knows the role of digital forensics in investigation of cyber attacks as well as its methods and applications. The student is able to select the correct methods for the problem to be solved and is able to apply their technical competence to practice. Additionally, the student is able to assess their implementation versatilely and justify their conclusions.

Assessment criteria, excellent (5)

Excellent 5: The student knows the applications of digital forensics thoroughly and how to exploit it in investigation of cyber attacks. The student is able to select the correct methods to the problem to be solved and apply their technical competence to practice. Additionally, the student is able to assess their implementation critically and justify the conclusions.