Unit search

Search results

SIT703 - Advanced Digital Forensics

Year:

2022 unit information

Important Update:

Unit delivery will be in line with the most current COVIDSafe health guidelines. We continue to tailor learning experiences for each unit to achieve the best possible mix of online and on-campus activities that successfully blend our approaches to learning, working and research. Please check your unit sites for announcements and updates.

Last updated: 4 March 2022

Enrolment modes:Trimester 1: Burwood (Melbourne), Waurn Ponds (Geelong), Online
Credit point(s):1
EFTSL value:0.125
Unit Chair:Trimester 1: Shang Gao
Prerequisite:

SIT716

Corequisite:

Nil

Incompatible with:

Nil

Typical study commitment:

Students will on average spend 150 hours over the teaching period undertaking the teaching, learning and assessment activities for this unit.

Scheduled learning activities - campus:

1 x 1 hour online class per week, 1 x 2 hour workshop per week.

Scheduled learning activities - cloud:

Online independent and collaborative learning including optional scheduled activities as detailed in the unit site.

Content

This unit will allow the student to explore various options available to organisations in investigating problems and attacks on their computer systems. Students will consider a range of computer forensic frameworks and generate their own framework in order to assist organisations with systematically documenting, analysing and solving cyber security issues. In SIT703, students will study exploitation techniques including shellcode, DLL hooking and authentication eavesdrop. They will learn how to use system log files, domain authentication and registry mechanisms to acquire digital evidence. They will identify the existence of rootkits and learn how to prevent attacks. The key focus of SIT703 is on identification, preservation, analysis and presentation of digital evidence related to a misuse or intrusion to an enterprise-level system.

ULO These are the Learning Outcomes (ULO) for this unit. At the completion of this unit, successful students can: Deakin Graduate Learning Outcomes
ULO1

Apply knowledge of security on Windows network domain and follow standard procedure to investigate different types of cyber-crime.

GLO1: Discipline-specific knowledge and capabilities
GLO3: Digital literacy
GLO4: Critical thinking

ULO2

Investigate the usefulness of various forensic techniques and apply relevant methods to gain access and recover computer crime data.

GLO1: Discipline-specific knowledge and capabilities
GLO3: Digital literacy
GLO4: Critical thinking
GLO5: Problem solving

ULO3

Analyse forensic data and review findings to further probe and investigate serious computer crimes.

GLO1: Discipline-specific knowledge and capabilities
GLO3: Digital literacy
GLO4: Critical thinking
GLO5: Problem solving

ULO4

Reflect on findings and prepare reports for target audience that justifies findings.

GLO2: Communication
GLO4: Critical thinking
GLO5: Problem solving

These Unit Learning Outcomes are applicable for all teaching periods throughout the year

Assessment

Assessment Description Student output Grading and weighting
(% total mark for unit)
Indicative due week
Technical report Written report including a critical review and bibliography 30% Week 4
Case investigation report Written report, approximately 3,000 words 40% Week 9
Examination Online examination 30% Examination period

The assessment due weeks provided may change. The Unit Chair will clarify the exact assessment requirements, including the due date, at the start of the teaching period.

Learning Resource

The texts and reading list for the unit can be found on the University Library via the link below: SIT703 Note: Select the relevant trimester reading list. Please note that a future teaching period's reading list may not be available until a month prior to the start of that teaching period so you may wish to use the relevant trimester's prior year reading list as a guide only.

Unit Fee Information

Click on the fee link below which describes you: