Course Outline

MGMT 388 : System Forensics, Investigation, and Response

Preview Workflow

Viewing: MGMT 388-WW : System Forensics, Investigation, and Response

Last approved: Wed, 20 Jan 2016 13:29:59 GMT

Last edit: Wed, 20 Jan 2016 13:29:58 GMT

College of Business (WBUAD)
System Forensics, Investigation, and Response
Computer crimes call for forensics specialists, people who know how to find and follow the evidence. System Forensics, Investigation, and Response begin by examining the fundamentals of system forensics; such as what forensics is, the role of computer forensics specialists, computer forensic evidence, and application of forensic analysis skills. It also gives an overview of computer crimes, forensic methods, and laboratories. It then addresses the tools, techniques, and methods used to perform computer forensics and investigation. Finally, it explores emerging technologies as well as future directions of this interesting and cutting-edge field.

This course is designed to provide students with the knowledge necessary to understand how systems forensics are conducted starting with acquiring digital evidence to reporting its findings. The course covers important topic including the science of obtaining and analyzing evidence from computers, evidence found on storage devices or found by traces of activity on computer networks, the type of crimes computer forensics specialists may investigate, and the information gathering tools and techniques may be used. As technology emerges and changes so quickly, more technologies, laws and guidelines are still being developed, which will make for an interesting academic exploration of the issues.

Upon course completion, the student will be able to:

1. Define system forensics and understand how computers are used in crimes, and why system forensics is an essential part of information security.

2. Describe the functional, technical, and ethical roles of a system forensics specialist; and explain the importance of properly handling forensic evidence.

3. Recognize the many types of cybercrimes and list various sources of cyber threats.

4. Explain the challenges of system forensics and the factors associated with them.

5. Evaluate forensic tools, frameworks and processes.

6. Outline system forensics tools commonly used, and explain how to determine the best acquisition method.

7. Illustrate the importance of preserve a digital crime scene and how to collect forensic evidence.

8. Explain the purpose of a file system, information hiding techniques, and some of the key concepts in data recovery.

9. Describe the process of investigating email, networks, and mobile devices.

10. Explain how to minimize security threats in an organization and understand the effect of internal and external factors on system forensics.

Located on the Daytona Beach Campus, the Jack R. Hunt Library is the primary library for all students of the Worldwide Campus. The Chief Academic Officer strongly recommends that every faculty member, where appropriate, require all students in his or her classes to access the Hunt Library or a comparable college-level local library for research. The results of this research can be used for class projects such as research papers, group discussion, or individual presentations. Students should feel comfortable with using the resources of the library. 

Web & Chat:
Text: (386) 968-8843
Library Phone:  (386) 226-7656 or (800) 678-9428


Written assignments must be formatted in accordance with the current edition of the Publication Manual of the American Psychological Association (APA) unless otherwise instructed in individual assignments.

ActivityPercent of Grade
Input Grading Item100

Undergraduate Grade Scale

90 - 100% A
80 - 89% B
70 - 79% C
60 - 69% D
0 - 60% F

Graduate Grade Scale

90 - 100% A
80 - 89% B
70 - 79% C
0 - 69% F
Michael S. Wills - 2/11/2015
Peter O’Reilly - 2/11/2015
Aaron Glassman - 2/11/2015
Bobby McMasters
1-5 Bachelor of Science in Technical Management 1. Employ supervisory and management skills needed to effectively lead and support
others within a team environment across business functions. (BSTM PO-1)

2. Apply research to solve business problems and communicate the results effectively. (BSTM PO2)

3. Analyze and evaluate business functions and processes, identify needs, and structure business approaches using problem-solving, critical thinking, and established methodologies and standards. (BSTM PO-3)

4. Know key principles of business and management disciplines and their business applications; and the possible interrelationships to technical management practices especially in the field of aviation and aerospace. (BSTM PO-4)

5. Demonstrate a proficiency in identifying and solving problems related to the specialty areas of Information Systems, Information Security, Project Management, Logistics and Supply Chain Management, Engineering Science, or Occupational Safety and Health knowledge and the interrelationships to business and technical management practices. (BSTM PO-5)
Key: 394