Introduction to Computer Forensics
I. Course Prefix/Number: CNS 174
Course Name: Introduction to Computer Forensics
Credits: 3 (3 lecture; 1 lab)
III. Course (Catalog) Description
This course provides students with the knowledge and solid foundation by introducing Computer Forensics as an entry into the professional field of Computer Forensics and investigation. The course covers current and past Operating Systems and a range of computer hardware and forensics software tools. The course also assists students in preparing for the appropriate Network or Information Security Certification examinations. Recommend: CNS 111 or consent of instructor, coordinator or program chair
IV. Learning Objectives
Upon completion of this course the student will be able to;
- Describe the Computer Forensics, Enforcement agency investigations, corporate investigations and investigations as a Profession
- Learn and demonstrate how to manage a Computer Investigation
- Describe and explain how to use popular Computer-Forensics software
- Plan and list how to recover data for computer investigations and demonstrate an understanding of file systems and their associated Operating Systems
- Learn and list requirements for Forensic Lab Certification
- Understand and select a basic Forensic workstation
- Create a Forensic Boot Floppy Disk
- Identify and test Command-line Forensics Tools
- Explore and analyze graphical users interface (GUI) Forensics tools
- Identify and secure digital evidence at an incident scene and store digital evidence
- Process and test private-sector incident scenes
- Plan and list data recovery contingencies
- Understand and test Computer Forensics-analysis
- Investigate and list e-mail crimes and violations
- Identify and analyze copyright issues with graphics
- Identify and Create and test data compression
- Describe and list the importance of reports, procedural and evidence rules requirements
V. Academic Integrity and Student Conduct
• plagiarism (turning in work not written by you, or lacking proper citation),
• falsification and fabrication (lying or distorting the truth),
• helping others to cheat,
• unauthorized changes on official documents,
• pretending to be someone else or having someone else pretend to be you,
• making or accepting bribes, special favors, or threats, and
• any other behavior that violates academic integrity.
There are serious consequences to violations of the academic integrity policy. Oakton's policies and procedures provide students a fair hearing if a complaint is made against you. If you are found to have violated the policy, the minimum penalty is failure on the assignment and, a disciplinary record will be established and kept on file in the office of the Vice President for Student Affairs for a period of 3 years.
Please review the Code of Academic Conduct and the Code of Student Conduct, both located online at
VI. Sequence of Topics
- Computer Forensics and Investigations as a Profession
- Understanding Computer Investigations
- Working with Windows and DOS Systems
- Macintosh and Linux Boot Processes and Disk Structures
- The Investigator’s Office and Laboratory
- Current Computer Forensics Tools
- Digital Evidence Controls
- Processing Crime and Incident Scenes
- Data Acquisition
- Computer Forensic Analysis
- E-mail Investigations
- Recovering Image Files
- Writing Investigation Reports
- Becoming as Expert Witness
VII. Methods of Instruction
Course may be taught as face-to-face, hybrid or online course.
VIII. Course Practices Required
- Read course materials - textbook and current journals
- Attend and participate in class lecture and lab
- Complete required assignments, exercises, quizzes, and exams
IX. Instructional Materials
- Current Computer Forensics Textbook and Lab book
- Current Self-Test Software
- Software manuals
X. Methods of Evaluating Student Progress
XI. Other Course Information
If you have a documented learning, psychological, or physical disability you may be entitled to reasonable academic accommodations or services. To request accommodations or services, contact the Access and Disability Resource Center at the Des Plaines or Skokie campus. All students are expected to fulfill essential course requirements. The College will not waive any essential skill or requirement of a course or degree program.
Oakton Community College is committed to maintaining a campus environment emphasizing the dignity and worth of all members of the community, and complies with all federal and state Title IX requirements.
Resources and support for
- pregnancy-related and parenting accommodations; and
- victims of sexual misconduct
Resources and support for LGBTQ+ students can be found at www.oakton.edu/lgbtq.
Electronic video and/or audio recording is not permitted during class unless the student obtains written permission from the instructor. In cases where recordings are allowed, such content is restricted to personal use only. Any distribution of such recordings is strictly prohibited. Personal use is defined as use by an individual student for the purpose of studying or completing course assignments.
For students who have been approved for audio and/or video recording of lectures and other classroom activities as a reasonable accommodation by Oakton’s Access Disabilities Resource Center (ADRC), applicable federal law requires instructors to permit those recordings. Such recordings are also limited to personal use. Any distribution of such recordings is strictly prohibited.
Violation of this policy will result in disciplinary action through the Code of Student Conduct.