Unit search

Search results

SIT703 - Advanced Digital Forensics

Year:

2020 unit information

Important Update:

Classes and seminars in Trimester 2/Semester 2, 2020 will be online. Physical distancing for coronavirus (COVID-19) will affect delivery of other learning experiences in this unit. Please check your unit sites for announcements and updates one week prior to the start of your trimester or semester.

Last updated: 2 June 2020

Enrolment modes:Trimester 2: Burwood (Melbourne), Waurn Ponds (Geelong), Cloud (online)
Credit point(s):1
EFTSL value:0.125
Unit Chair:Trimester 2: Lei Pan
Prerequisite:

From 2021: SIT716

For students enrolled in S778, S779: Nil

Corequisite:

Nil

Incompatible with:

Nil

Typical study commitment:

Students will on average spend 150 hours over the teaching period undertaking the teaching, learning and assessment activities for this unit.

Scheduled learning activities - campus:

1 x 1 hour class per week, 1 x 2 hour face-to-face workshop per week.

Scheduled learning activities - cloud:

1 x 1 hour online seminar per fortnight.

Content

This unit will allow the student to explore various options available to organisations in investigating problems and attacks on their computer systems. Students will consider a range of computer forensic frameworks and generate their own framework in order to assist organisations with systematically documenting, analysing and solving cyber security issues. In SIT703, students will study exploitation techniques including shellcode, DLL hooking and authentication eavesdrop. They will learn how to use system log files, domain authentication and registry mechanisms to acquire digital evidence. They will identify the existence of rootkits and learn how to prevent attacks. The key focus of SIT703 is on identification, preservation, analysis and presentation of digital evidence related to a misuse or intrusion to an enterprise-level system.

 

These are the Learning Outcomes (ULO) for this Unit

At the completion of this Unit
successful students can:

Deakin Graduate Learning Outcomes

ULO1

Apply knowledge of security on Windows network domain and follow standard procedure to investigate different types of cyber-crime;

GLO1: Discipline-specific knowledge and capabilities
GLO3: Digital literacy
GLO4: Critical thinking

ULO2

Investigate the usefulness of various forensic techniques and apply relevant methods to gain access and recover computer crime data;

GLO1: Discipline-specific knowledge and capabilities
GLO3: Digital literacy
GLO4: Critical thinking
GLO5: Problem solving

ULO3

Analyse forensic data and review findings to further probe and investigate serious computer crimes; and

GLO1: Discipline-specific knowledge and capabilities
GLO3: Digital literacy
GLO4: Critical thinking
GLO5: Problem solving

ULO4

Reflect on findings and prepare reports for target audience that justifies findings.

GLO2: Communication
GLO4: Critical thinking
GLO5: Problem solving

These Unit Learning Outcomes are applicable for all teaching periods throughout the year

Assessment

Assessment Description Student output Weighting (% total mark for unit) Indicative due week
Technical report Written report, approximately 2,000 words 20% Week 4
Case investigation report Written report, approximately 2,000 words 20% Week 9
Examination 2-hour written examination 60% Examination period

The assessment due weeks provided may change. The Unit Chair will clarify the exact assessment requirements, including the due date, at the start of the teaching period.

Learning Resource

The texts and reading list for the unit can be found on the University Library via the link below: SIT703 Note: Select the relevant trimester reading list. Please note that a future teaching period's reading list may not be available until a month prior to the start of that teaching period so you may wish to use the relevant trimester's prior year reading list as a guide only.

Unit Fee Information

Click on the fee link below which describes you: