User Tools

Site Tools


forensics

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

forensics [2018/10/04 09:24]
127.0.0.1 external edit
forensics [2018/11/14 10:15] (current)
admin
Line 1: Line 1:
-====== ​[[media_typecustom_key23076670_alignright]]Introduction to Forensics ======+====== Introduction to Forensics ======
  
 +**Track Room Location: H134 - Heritage Hall**
  
 +<font inherit/​inherit;;#​c0392b;;​inherit>​**Please note that the "​Introduction to Forensics"​ track is now CLOSED.**</​font>​To join the wait-list, register for the "​Forensics"​ track as your first choice, but understand that for now you will be registered into your second choice. If more room becomes available in "​Forensics,"​ we will contact you in order of registration into the closed track.
  
-==== Track Room Location: H134 - Heritage Hall ==== +**Description**
- +
-**Please note that the "​Introduction to Forensics"​ track is now CLOSED.** To join the wait-list, register for the "​Forensics"​ track as your first choice, but understand that for now you will be registered into your second choice. If more room becomes available in "​Forensics,"​ we will contact you in order of registration into the closed track. +
- +
- +
- +
-===== Description ===== +
- +
  
 This course prepares students in the preservation,​ identification,​ extraction, documentation and interpretation of computer data. Students will learn to examine computer data for evidence of a crime or violations of corporate policy. Topics covered include evidence handling, chain of custody, collection, and recovery of computer data using forensic software and methods. This course prepares students in the preservation,​ identification,​ extraction, documentation and interpretation of computer data. Students will learn to examine computer data for evidence of a crime or violations of corporate policy. Topics covered include evidence handling, chain of custody, collection, and recovery of computer data using forensic software and methods.
  
- +**Prerequisites**
- +
-===== Prerequisites ​===== +
- +
  
 TBD TBD
  
 +**Instructor**
  
- +{{:​kevin_v.jpg?​nolink&​140}}
-===== Instructor ===== +
- +
- +
- +
-{{::​kevin_v.jpg?​nolink&​140|}} +
- +
  
 My name is **Kevin Vaccaro** and my background started in electronics when I attended DeVry in the early 90’s and received a degree as an electronic technician. At that time, I began my first job as a computer and printer repair technician. I worked 24 years in IT at various levels of management and also received a Master’s degree in Information Technology and management which I specialized in computer security. I had previously taught at Moraine Valley as an adjunct faculty member in the late 90’s until the mid-2000’s teaching CompTIA A+, Network+, Linux+. Later, I became an adjunct faculty member at Illinois Institute of Technology teaching computer networking, security, forensics, and ethical hacking. My name is **Kevin Vaccaro** and my background started in electronics when I attended DeVry in the early 90’s and received a degree as an electronic technician. At that time, I began my first job as a computer and printer repair technician. I worked 24 years in IT at various levels of management and also received a Master’s degree in Information Technology and management which I specialized in computer security. I had previously taught at Moraine Valley as an adjunct faculty member in the late 90’s until the mid-2000’s teaching CompTIA A+, Network+, Linux+. Later, I became an adjunct faculty member at Illinois Institute of Technology teaching computer networking, security, forensics, and ethical hacking.
- 
- 
  
 Currently, I have become a new faculty member at Moraine Valley specifically in the field of Cyber Security. My position is exciting as I am developing curriculum based on the current state of computer security and the associated parts. I want to bring the students as close as possible to real world. Currently, I have become a new faculty member at Moraine Valley specifically in the field of Cyber Security. My position is exciting as I am developing curriculum based on the current state of computer security and the associated parts. I want to bring the students as close as possible to real world.
- 
- 
  
 Education: Illinois Institute of Technology, Masters in Information Technology and Management; University of Chicago, Bachelors Degree in English; DeVry Institute, Associates in Applied Sciences in Electronics.\ Education: Illinois Institute of Technology, Masters in Information Technology and Management; University of Chicago, Bachelors Degree in English; DeVry Institute, Associates in Applied Sciences in Electronics.\
- 
- 
  
 Certifications:​ CompTIA Security+ Certification;​ CompTIA Server+ Certification;​ CompTIA Network+ Certification;​ CompTIA A+ Certification;​ CompTIA Linux+ Certification;​ ITAA Security Awareness Certificate;​ and FTK ACE - Accessdata Certified Examiner. Certifications:​ CompTIA Security+ Certification;​ CompTIA Server+ Certification;​ CompTIA Network+ Certification;​ CompTIA A+ Certification;​ CompTIA Linux+ Certification;​ ITAA Security Awareness Certificate;​ and FTK ACE - Accessdata Certified Examiner.
  
 +**Agenda**
  
- +Monday\\ 
-===== Agenda ===== +Introduction to Digital Forensics (lesson 1)\\ 
- +Investigative Methodology (lesson 2)\\
- +
- +
-Monday +
- +
- +
- +
-Introduction to Digital Forensics (lesson 1) +
- +
- +
- +
-Investigative Methodology (lesson 2) +
- +
- +
 Forensics Lab (lesson 3) Forensics Lab (lesson 3)
  
- +Tuesday\\ 
- +Data Acquisition (lesson 4)\\ 
-Tuesday +Processing the Crime Scene (lesson 5)\\
- +
- +
- +
-Data Acquisition (lesson 4) +
- +
- +
- +
-Processing the Crime Scene (lesson 5) +
- +
- +
 Computer Forensics Tools (lesson 6) Computer Forensics Tools (lesson 6)
  
- +Wednesday\\ 
- +File Systems (lesson 7)\\
-Wednesday +
- +
- +
- +
-File Systems (lesson 7) +
- +
- +
 Computer Forensics Analysis (lesson 8) Computer Forensics Analysis (lesson 8)
  
- +Thursday\\ 
- +Recovering Graphics (lesson 9)\\
-Thursday +
- +
- +
- +
-Recovering Graphics (lesson 9) +
- +
- +
 Network Forensics (lesson 10) Network Forensics (lesson 10)
  
- +Friday\\ 
- +Mobile Devices and Email (lesson 11)\\
-Friday +
- +
- +
- +
-Mobile Devices and Email (lesson 11) +
- +
- +
 Testimony and Report Writing (lesson 12) Testimony and Report Writing (lesson 12)
- 
- 
  
 This agenda above is tentative - the instructor reserves the right to make changes as needed. This agenda above is tentative - the instructor reserves the right to make changes as needed.
  
 +**Resources**
  
 +Instructor Links - TBD
  
-===== Resources =====+Certification Info - TBD
  
 +Track Evaluation - TBD
  
- 
-==== Instructor Links ==== 
- 
- 
- 
-TBD 
- 
- 
- 
-==== Certification Info ==== 
- 
- 
- 
-TBD 
- 
- 
- 
-===== Track Evaluation ===== 
- 
- 
- 
-TBD 
  
forensics.txt · Last modified: 2018/11/14 10:15 by admin