Part A: Course Overview
Course Title: Computer and Internet Forensics
Credit Points: 12.00
Course Coordinator: Mohammad Saidur Rahman
Course Coordinator Phone: +61 (449) 787067
Course Coordinator Email: mohammadsaidur.rahman@rmit.edu.au
Course Coordinator Location: City Campus
Course Coordinator Availability: by appointment
Pre-requisite Courses and Assumed Knowledge and Capabilities
Enforced Pre-Requisite Courses
Successful completion of the following course/s:
- COSC2531/COSC2976 Programming Fundamentals (Course ID: 045682)
- COSC2737 IT Infrastructure and Sec (Course ID: 052703)
Note: it is a condition of enrolment at RMIT that you accept responsibility for ensuring that you have completed the prerequisite/s and agree to concurrently enrol in co-requisite courses before enrolling in a course.
For information go to RMIT Course Requisites webpage.
If you have completed prior studies at RMIT or another institution that developed the skills and knowledge covered in the above course/s you may be eligible to apply for credit transfer.
Alternatively, if you have prior relevant work experience that developed the skills and knowledge covered in the above course/s you may be eligible for recognition of prior learning.
Please follow the link for further information on how to apply for credit for prior study or experience.
Course Description
This course introduces students to the principles and practice of computer and internet forensics. Students will explore issues related to security of computer systems, accessing and analyzing data, reconstructing events, surveillance, intrusion prevention, intrusion detection, and recovery from breaches. This course is particularly aimed at students who have a strong interest in computer and information security.
Topics include:
- Forernsically examining the state of desktop / mobile computer(s) left behind by an presumed offender to determine what happened.
- Determining internet presence and activity which may have forensic significance
- Learning the basics of evidence-gatehring and custody.
- Basic file reconstruction as evidence
- The use and limitations of visual evidence
Objectives/Learning Outcomes/Capability Development
Program Learning Outcomes
This course is an option course so it is not required to contribute to the development of program learning outcomes (PLOs) though it may assist your achievement of several PLOs.
For more information on the program learning outcomes for your program, please see the program guide.
Upon successful completion of this course, you will be able to:
- Apply your knowledge and understanding of computer security to identify security weaknesses and propose possible entry using them;
- Correctly isolate computer systems for investigation;
- Duplicate data and analyze it to recover latent information and reconstruct events;
- Trace and avoid entrapment by malicious internet activity;
- Analyze email and other online activity trails, such as social network analysis;
- Document and present gathered information in an appropriate manner for follow-up.
Overview of Learning Activities
You will be actively engaged in a range of learning activities such as lectorials, tutorials, practicals, laboratories, seminars, project work, class discussion, individual and group activities. Delivery may be face to face, online or a mix of both.
You are encouraged to be proactive and self-directed in your learning, asking questions of your lecturer and/or peers and seeking out information as required, especially from the numerous sources available through the RMIT library, and through links and material specific to this course that is available through myRMIT Studies Course.
Overview of Learning Resources
RMIT will provide you with resources and tools for learning in this course through myRMIT Studies Course.
BYOD requirement
Since this course is interactive, you will need to bring along a personal laptop to class that is powerful enough to handle the software used. See below for the minimum useful specifications
- Recent MS Windows 10 Professional with native ability to virtualize, or Windows 7+ with VirtualBox software (free), or MacOS with ability to virtualise
- 4GB of RAM minimum, 8GB+ preferred
- USB memory stick capability
- Ability to virtual-boot off USB memory stick is desirable
- 10GB free space on hard disk for the various software and virtual instances
- Reasonably powerful CPU, else everybody will be waiting for you.
- Most recent laptops will have the above characteristics.
There are services available to support your learning through the University Library. The Library provides guides on academic referencing and subject specialist help as well as a range of study support services. For further information, please visit the Library page on the RMIT University website and the myRMIT student portal.
Overview of Assessment
Note: This course has no hurdle requirements.
Assessment tasks
Assessment Tasks 1: Online Tests
Weighting 10%
This assessment task supports CLOs 1, then 2, 3, 4, 5, 6 & 7
Assessment Task 2: Group Presentation
Weighting 10%
This assessment task supports CLOs 1-6
Assessment Task 3: Group Presentation + Assignment
Weighting 30%
This assessment task supports CLOs 1, 2, 3, 4, 5 & 6.
Assessment Task 4: Exam
Weighting 50%
This assessment task supports CLOs 1, 2, 3, 4, 5, 6.
If you have a long-term medical condition and/or disability it may be possible to negotiate to vary aspects of the learning or assessment methods. You can contact the program coordinator or Equitable Learning Services if you would like to find out more.