ABSTRACT
Recent research points to a severe shortage of cybersecurity professionals right now and in the near future. Universities are introducing cybersecurity programs to fill the gap between cybersecurity professionals' supply and demand. Although cybersecurity concepts/courses are being taught in many undergraduate programs for quite some time, but with the recent surge for cybersecurity professionals' demand, educators have realized the need to offer cybersecurity degree programs. Despite having a plethora of unstructured cybersecurity information available, faculty are struggling to find structured content for cybersecurity major courses. In this paper, we discuss our efforts of teaching a computer forensics course. We present our teaching modules and associated hands-on activities with the hope that our peers might find our course content or teaching methodology helpful in preparing similar courses.
- Soft 32. 2020. Soft 32. https://dumpit.soft32.com/.Google Scholar
- Soft 32. 2020. WinPrefetchView. https://winprefetchview.soft32.com/.Google Scholar
- aldeid. [n.d.]. PEView. https://www.aldeid.com/wiki/PEView.Google Scholar
- P. Allen, J. Impagliazzo, R. Raj, H. Santos, M. Asghar, A. Jøsang, T. Pereira, Vítor J. Sá, and E. Stavrou. 2018. Global Perspectives on Cybersecurity Education (ITiCSE 2018). Association for Computing Machinery, New York, NY, USA, 340--341. Google ScholarDigital Library
- R. Austin. 2007. Digital Forensics on the Cheap: Teaching Forensics Using Open Source Tools. In Proceedings of the 4th Annual Conference on Information Security Curriculum Development (Kennesaw, Georgia) (InfoSecCD '07). Association for Computing Machinery, New York, NY, USA, Article 6, 5 pages. Google ScholarDigital Library
- D. Burley. 2014. Cybersecurity Education, Part 1. ACM Inroads 5, 1 (March 2014), 41. Google ScholarDigital Library
- The Darkside. [n.d.]. The SNOW Home Page. http://www.darkside.com.au/snow/.Google Scholar
- Access Data. 2020. FTKImager. https://accessdata.com/product-download.Google Scholar
- SANS DFIR. [n.d.]. Find Evil - Know Normal. https://digital-forensics.sans.org/media/SANS_Poster_2018_Hunt_Evil_FINAL.pdf.Google Scholar
- SAN DFIR. 2020. EZ Tools. https://digital-forensics.sans.org/community/downloads/digital-forensics-tools.Google Scholar
- EDURange. 2020. EDURange. https://edurange.org.Google Scholar
- Volatility Foundation. 2020. Volatility Foundation. https://www.volatilityfoundation.org/.Google Scholar
- P. Harvey. 2020. Read, Write and Edit Meta Information. https://exiftool.org/.Google Scholar
- lo4d.com. [n.d.]. Resource Hacker. https://resource-hacker.en.lo4d.com/windows#.Google Scholar
- J. Mache and R. Weiss. 2018. Hands-on Cybersecurity Exercises. J. Comput. Sci. Coll. 34, 1 (Oct. 2018), 231--232.Google Scholar
- F. Maymi. 2019. Cybersecurity: What I Hope Someone's Teaching. In Proceedings of the 20th Annual SIG Conference on Information Technology Education (Tacoma, WA, USA) (SIGITE '19). Association for Computing Machinery, New York, NY, USA, 1--2. Google ScholarDigital Library
- R. Mcfeely. 2001. Enterprise Theory of Investigation. The FBI Law Enforcement Bulletin 70, 5 (May 2001).Google Scholar
- Microsoft. 2020. Windows Sysinternals. https://docs.microsoft.com/en-us/sysinternals/.Google Scholar
- MiniTool. 2020. MiniTool Partition Wizard 12.1. https://www.partitionwizard.com/.Google Scholar
- NSA. 2020. National Centers of Academic Excellence. https://www.nsa.gov/resources/students-educators/centers-academic-excellence/.Google Scholar
- RemoteDLL. 2020. RemoteDLL. https://remotedll.en.lo4d.com/windows.Google Scholar
- Softpedia. [n.d.]. tegoMagic. https://www.softpedia.com/get/Security/Encrypting/StegoMagic.shtml.Google Scholar
- C. Tang, C. Tucker, C. Servin, M. Geissler, and M. Stange. 2020. Curricular Guidance for Associate-Degree Cybersecurity Programs. In Proceedings of the 51st ACM Technical Symposium on Computer Science Education (Portland, OR, USA) (SIGCSE '20). Association for Computing Machinery, New York, NY, USA, 1285. Google ScholarDigital Library
- Kali Tools. 2020. RegRipper Package Description. https://tools.kali.org/forensics/regripper.Google Scholar
- M. Tu, D. Xu, C. Balan, and K. Cronin. 2012. On the Development of a Digital Forensics Curriculum. The Journal of Digital Forensics, Security and Law 7, 3 (2012), 13--32.Google Scholar
- K. Vasudevan. 2018. Digital Forensics---a Breadth-wise Overview. https://medium.com/redefyn/digital-forensics-a-breadth-wise-overview-2acb18803b74.Google Scholar
- VirusTotal. 2020. VirusTotal. https://www.virustotal.com/gui/home/upload.Google Scholar
- R. Weiss, J. Mache, and M. Locasto. 2014. EDURange: Hands-on Cybersecurity Exercises in the Cloud. J. Comput. Sci. Coll. 30, 1 (Oct. 2014), 178--180.Google Scholar
- R. Weiss, J. Mache, and M. Locasto. 2014. EDURange: Hands-on Cybersecurity Exercises in the Cloud. J. Comput. Sci. Coll. 30, 1 (Oct. 2014), 178--180.Google Scholar
- Hex Workshop. 2020. . http://www.hexworkshop.com/.Google Scholar
- E. Zimmerman. 2020. Eric Zimmerman's Tools. https://ericzimmerman.github.io/#!index.md.Google Scholar
Index Terms
- Teaching a computer forensics course
Recommendations
Computer Science Teaching Knowledge: A Framework and Assessment (Abstract Only)
SIGCSE '17: Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science EducationEducators, researchers, politicians, tech companies, and others continue to advocate for the importance of K-12 students learning computer science in our increasingly tech-driven society. One way school districts in the United States address this ...
A graduate immigration course in computer science
SIGCSE '78: Papers of the SIGCSE/CSA technical symposium on Computer science educationAs part of a RIAS grant from the NSF, a pilot course intended for incoming graduate students in computer science was offered during the fall of 1977. This course was intended to acquaint new graduate students with (1) the CS graduate curriculum and ...
Teaching Reform of Computer Basic Course Combined with Specialty
ICEBT '18: Proceedings of the 2018 2nd International Conference on E-Education, E-Business and E-TechnologyThe computer basic courses for non-computer majors in China are aimed to students of different professional groups and should be combined with professional application and practice during course teaching. This paper introduces the education reform of ...
Comments