Skip to main content

Digital forensicsLaajuus (6 cr)

Code: TT00CE15

Credits

6 op

Teaching language

  • Finnish
  • English

Responsible person

  • Jarmo Nevala
  • Heli Ciszek

Objective

The student achieves a basic understanding of digital forensics, its processes, the different tools of digital forensics, and the legislation affecting digital forensics. The student knows the basic concepts, methods and tools of digital forensics. The student knows how to perform the different stages of the digital forensics investigation process and document them appropriately. The student can apply the knowledge and skills of digital forensics to various situations and problems.

EUR-ACE Knowledge and understanding
The student demonstrates wide-ranging and in-depth knowledge and understanding of the basics and application of engineering sciences. The student knows how to analyze the researched object by applying different methods with the help of practice and theory.

EUR-ACE Engineering practice
The student demonstrates the ability to analyze complex engineering problems using mathematical, scientific and technical methods. The student knows the basic methods of digital forensics by applying theory and practice. The student understands their importance when carrying out forensic research.

Content

sample chain integrity
legislation related to digital forensics
the working steps of digital forensics
different tools and methods of digital forensics

Qualifications

Cyber security management
Auditing and penetration testing
Mathematical foundations of encryption methods

Assessment criteria, satisfactory (1)

Sufficient 1
The student has superficial knowledge of the applications and processes of digital forensics in dealing with cyber attacks. The student knows how to choose the most common methods for the problem to be solved and knows how to apply the most common methods. In addition, the student can briefly evaluate his implementation and justify the conclusions.

Satisfactory 2
The student knows the terminology of digital forensics and anomaly management. The student knows how to choose the most common methods for the problem to be solved and knows how to apply their technical knowledge in practice. In addition, the student can superficially evaluate their implementation and justify the conclusions.

Assessment criteria, good (3)

Good 3
The student knows the principles, types and usability of cyber threat information in cyber defense. The student knows how to choose the most common methods for the problem to be solved and knows how to apply their technical knowledge in practice. In addition, the student can comprehensively evaluate his implementation and justify the conclusions.

Very good 4
The student knows the role of digital forensics in the investigation of cyber attacks and its methods and tools. The student knows how to choose the right methods for the problem to be solved and knows how to apply his technical knowledge in practice. In addition, the student can comprehensively evaluate his implementation and justify the conclusions.

Assessment criteria, excellent (5)

Excellent 5
The student thoroughly knows the uses of digital forensics and its utilization in the investigation of cyber attacks. The student knows how to choose the right methods for the problem to be solved and knows how to apply their technical knowledge in practice. In addition, the student can critically evaluate their implementation and justify the conclusions.