Advanced ForensicsLaajuus (5 cr)
Code: TTC7040
Credits
5 op
Teaching language
- Finnish
Responsible person
- Joni Gadd
- Marko Vatanen
- Jarmo Viinikanoja
Objective
The student understands profoundly the operation and investigation methods of operating systems and is able to utilize them in analysis of cyber attacks and picturing the overall understanding. In the course, the student learns to use the most common disk, network, mobile and memory forensics tools and methods.
Competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
Content
- tools and methods of disc forensics
- tools and methods of mobile forensics
- tools and methods of network forensics
- tools and methods of memory forensics
Assessment criteria, satisfactory (1)
Sufficient 1: The student knows superficially the investigation methods of operating systems and cyber attacks. The student is able to select the most common methods for the problem to be solved and apply the most common methods. Additionally, the student can assess their implementation and justify the conclusions.
Satisfactory 2: The student knows the investigation methods of operating systems and cyber attacks. The student is able to select the most common methods for the problem to be solved and apply their technical competence to practice. Additionally, the student is able to superficially assess their implementation and justify the conclusions.
Assessment criteria, good (3)
Good 3: The student knows the investigation methods of operating systems and cyber attacks well and is able to utilize forensics methods in analysis of cyber attacks and picturing the overall understanding. The student is able to select the most common methods for the problem to be solved and apply their technical competence to practice. Additionally, the student is able to assess their implementation versatilely and justify the conclusions.
Very good (4): The student has commendable knowledge of the investigation methods of operating systems and cyber attacks and is able to utilize forensics methods in analysis of cyber attacks and picturing the overall understanding. The student is able to select the relevant methods for the problem to be solved and apply their technical competence to practice. Additionally, the student is able to assess their implementation versatilely and justify the conclusions.
Assessment criteria, excellent (5)
Excellent 5: The student has in-depth knowledge of the investigation methods of operating systems and cyber attacks and is able to utilize forensics methods in analysis of cyber attacks and picturing the overall understanding. The student is able to select the most relevant methods for the problem to be solved and is able to apply their technical competence to practice. Additionally, the student is able to assess their implementation critically and justify the conclusions.