Skip to main content

Advanced ForensicsLaajuus (5 cr)

Course unit code: TTC7040

General information


Credits
5 cr
Teaching language
Finnish
Responsible person
Joni Gadd
Marko Vatanen
Jarmo Viinikanoja

Objective

The student understands profoundly the operation and investigation methods of operating systems and is able to utilize them in analysis of cyber attacks and picturing the overall understanding. In the course, the student learns to use the most common disk, network, mobile and memory forensics tools and methods.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice

Content

- tools and methods of disc forensics
- tools and methods of mobile forensics
- tools and methods of network forensics
- tools and methods of memory forensics

Assessment criteria, satisfactory (1)

Sufficient 1: The student knows superficially the investigation methods of operating systems and cyber attacks. The student is able to select the most common methods for the problem to be solved and apply the most common methods. Additionally, the student can assess their implementation and justify the conclusions.

Satisfactory 2: The student knows the investigation methods of operating systems and cyber attacks. The student is able to select the most common methods for the problem to be solved and apply their technical competence to practice. Additionally, the student is able to superficially assess their implementation and justify the conclusions.

Assessment criteria, good (3)

Good 3: The student knows the investigation methods of operating systems and cyber attacks well and is able to utilize forensics methods in analysis of cyber attacks and picturing the overall understanding. The student is able to select the most common methods for the problem to be solved and apply their technical competence to practice. Additionally, the student is able to assess their implementation versatilely and justify the conclusions.

Very good (4): The student has commendable knowledge of the investigation methods of operating systems and cyber attacks and is able to utilize forensics methods in analysis of cyber attacks and picturing the overall understanding. The student is able to select the relevant methods for the problem to be solved and apply their technical competence to practice. Additionally, the student is able to assess their implementation versatilely and justify the conclusions.

Assessment criteria, excellent (5)

Excellent 5: The student has in-depth knowledge of the investigation methods of operating systems and cyber attacks and is able to utilize forensics methods in analysis of cyber attacks and picturing the overall understanding. The student is able to select the most relevant methods for the problem to be solved and is able to apply their technical competence to practice. Additionally, the student is able to assess their implementation critically and justify the conclusions.

Go back to top of page