There is a more recent version of this academic item available.

Overview

This subject formulates the procedures related to digital forensic and investigation in a computer and a networking scenario. Students critically appraise the key concepts associated with the data hiding, evidence collection and validation and traffic analysis required to perform forensic analysis in a digital environment. Students learn about the importance … For more content click the Read more button below.

Portfolio

Office of the Provost

Subject coordinator

Jabed Chowdhury

Subject type

Undergraduate

Year level

Year Level 3 - UG

AQF level

Level 7 - Bachelor Degree

Available as elective

No

Available to study abroad / exchange students

Yes

Capstone subject

Yes

Academic progress review - Schedule A subject

No

Subject instances

To view instance specific details which include - Assessments, Class requirements and Subject instance coordinators - please select your preferred instance via the drop-down menu at the top right-hand side of this page.

Career ready

Work based learning (placement):No

Graduate capabilities

COMMUNICATION - Communicating and Influencing
COMMUNICATION - Cultural Intelligence and Global Perspective
INQUIRY AND ANALYSIS - Critical Thinking and Problem Solving
INQUIRY AND ANALYSIS - Research and Evidence-Based Inquiry
PERSONAL AND PROFESSIONAL - Adaptability and Self-Management
PERSONAL AND PROFESSIONAL - Ethical and Social Responsibility

Subject intended learning outcomes

On successful completion you will be able to:
1.
Investigate and validate data hiding and collect evidence of cyber attacks in data systems and networks
2.
Articulate ethical and legal considerations in the documentation of forensic evidence
3.
Analyse common digital evidence with physical forensic evidence tools
4.
Design traffic analyses that are required to perform forensic Investigations of digital systems