Digital forensicsLaajuus (6 cr)
Code: TT00CE15
Credits
6 op
Teaching language
- Finnish
- English
Responsible person
- Jarmo Nevala
- Heikki Järvinen
Objective
The student achieves a basic understanding of digital forensics, its processes, the different tools of digital forensics, and the legislation affecting digital forensics. The student knows the basic concepts, methods and tools of digital forensics. The student knows how to perform the different stages of the digital forensics investigation process and document them appropriately. The student can apply the knowledge and skills of digital forensics to various situations and problems.
EUR-ACE Knowledge and understanding
The student demonstrates wide-ranging and in-depth knowledge and understanding of the basics and application of engineering sciences. The student knows how to analyze the researched object by applying different methods with the help of practice and theory.
EUR-ACE Engineering practice
The student demonstrates the ability to analyze complex engineering problems using mathematical, scientific and technical methods. The student knows the basic methods of digital forensics by applying theory and practice. The student understands their importance when carrying out forensic research.
Content
In this course, you will gain a fundamental understanding of digital forensics, its processes, tools, and relevant legislation. You will learn the basic concepts, methods, and tools of digital forensics, and how to perform and document the various stages of the forensic investigation process. You will be able to apply your knowledge and skills in digital forensics to different situations and problems. The course equips you with the ability to analyze the subject of investigation using various methods in both practical and theoretical contexts.
sample chain integrity
legislation related to digital forensics
the working steps of digital forensics
different tools and methods of digital forensics
Qualifications
Cyber security management
Auditing and penetration testing
Mathematical foundations of encryption methods
Assessment criteria, satisfactory (1)
Sufficient 1
The student has superficial knowledge of the applications and processes of digital forensics in dealing with cyber attacks. The student knows how to choose the most common methods for the problem to be solved and knows how to apply the most common methods. In addition, the student can briefly evaluate his implementation and justify the conclusions.
Satisfactory 2
The student knows the terminology of digital forensics and anomaly management. The student knows how to choose the most common methods for the problem to be solved and knows how to apply their technical knowledge in practice. In addition, the student can superficially evaluate their implementation and justify the conclusions.
Assessment criteria, good (3)
Good 3
The student knows the principles, types and usability of cyber threat information in cyber defense. The student knows how to choose the most common methods for the problem to be solved and knows how to apply their technical knowledge in practice. In addition, the student can comprehensively evaluate his implementation and justify the conclusions.
Very good 4
The student knows the role of digital forensics in the investigation of cyber attacks and its methods and tools. The student knows how to choose the right methods for the problem to be solved and knows how to apply his technical knowledge in practice. In addition, the student can comprehensively evaluate his implementation and justify the conclusions.
Assessment criteria, excellent (5)
Excellent 5
The student thoroughly knows the uses of digital forensics and its utilization in the investigation of cyber attacks. The student knows how to choose the right methods for the problem to be solved and knows how to apply their technical knowledge in practice. In addition, the student can critically evaluate their implementation and justify the conclusions.