skip to main content
10.1145/3409334.3452069acmconferencesArticle/Chapter ViewAbstractPublication Pagesacm-seConference Proceedingsconference-collections
research-article

Teaching a computer forensics course

Published:10 May 2021Publication History

ABSTRACT

Recent research points to a severe shortage of cybersecurity professionals right now and in the near future. Universities are introducing cybersecurity programs to fill the gap between cybersecurity professionals' supply and demand. Although cybersecurity concepts/courses are being taught in many undergraduate programs for quite some time, but with the recent surge for cybersecurity professionals' demand, educators have realized the need to offer cybersecurity degree programs. Despite having a plethora of unstructured cybersecurity information available, faculty are struggling to find structured content for cybersecurity major courses. In this paper, we discuss our efforts of teaching a computer forensics course. We present our teaching modules and associated hands-on activities with the hope that our peers might find our course content or teaching methodology helpful in preparing similar courses.

References

  1. Soft 32. 2020. Soft 32. https://dumpit.soft32.com/.Google ScholarGoogle Scholar
  2. Soft 32. 2020. WinPrefetchView. https://winprefetchview.soft32.com/.Google ScholarGoogle Scholar
  3. aldeid. [n.d.]. PEView. https://www.aldeid.com/wiki/PEView.Google ScholarGoogle Scholar
  4. P. Allen, J. Impagliazzo, R. Raj, H. Santos, M. Asghar, A. Jøsang, T. Pereira, Vítor J. Sá, and E. Stavrou. 2018. Global Perspectives on Cybersecurity Education (ITiCSE 2018). Association for Computing Machinery, New York, NY, USA, 340--341. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. R. Austin. 2007. Digital Forensics on the Cheap: Teaching Forensics Using Open Source Tools. In Proceedings of the 4th Annual Conference on Information Security Curriculum Development (Kennesaw, Georgia) (InfoSecCD '07). Association for Computing Machinery, New York, NY, USA, Article 6, 5 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. Burley. 2014. Cybersecurity Education, Part 1. ACM Inroads 5, 1 (March 2014), 41. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. The Darkside. [n.d.]. The SNOW Home Page. http://www.darkside.com.au/snow/.Google ScholarGoogle Scholar
  8. Access Data. 2020. FTKImager. https://accessdata.com/product-download.Google ScholarGoogle Scholar
  9. SANS DFIR. [n.d.]. Find Evil - Know Normal. https://digital-forensics.sans.org/media/SANS_Poster_2018_Hunt_Evil_FINAL.pdf.Google ScholarGoogle Scholar
  10. SAN DFIR. 2020. EZ Tools. https://digital-forensics.sans.org/community/downloads/digital-forensics-tools.Google ScholarGoogle Scholar
  11. EDURange. 2020. EDURange. https://edurange.org.Google ScholarGoogle Scholar
  12. Volatility Foundation. 2020. Volatility Foundation. https://www.volatilityfoundation.org/.Google ScholarGoogle Scholar
  13. P. Harvey. 2020. Read, Write and Edit Meta Information. https://exiftool.org/.Google ScholarGoogle Scholar
  14. lo4d.com. [n.d.]. Resource Hacker. https://resource-hacker.en.lo4d.com/windows#.Google ScholarGoogle Scholar
  15. J. Mache and R. Weiss. 2018. Hands-on Cybersecurity Exercises. J. Comput. Sci. Coll. 34, 1 (Oct. 2018), 231--232.Google ScholarGoogle Scholar
  16. F. Maymi. 2019. Cybersecurity: What I Hope Someone's Teaching. In Proceedings of the 20th Annual SIG Conference on Information Technology Education (Tacoma, WA, USA) (SIGITE '19). Association for Computing Machinery, New York, NY, USA, 1--2. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. R. Mcfeely. 2001. Enterprise Theory of Investigation. The FBI Law Enforcement Bulletin 70, 5 (May 2001).Google ScholarGoogle Scholar
  18. Microsoft. 2020. Windows Sysinternals. https://docs.microsoft.com/en-us/sysinternals/.Google ScholarGoogle Scholar
  19. MiniTool. 2020. MiniTool Partition Wizard 12.1. https://www.partitionwizard.com/.Google ScholarGoogle Scholar
  20. NSA. 2020. National Centers of Academic Excellence. https://www.nsa.gov/resources/students-educators/centers-academic-excellence/.Google ScholarGoogle Scholar
  21. RemoteDLL. 2020. RemoteDLL. https://remotedll.en.lo4d.com/windows.Google ScholarGoogle Scholar
  22. Softpedia. [n.d.]. tegoMagic. https://www.softpedia.com/get/Security/Encrypting/StegoMagic.shtml.Google ScholarGoogle Scholar
  23. C. Tang, C. Tucker, C. Servin, M. Geissler, and M. Stange. 2020. Curricular Guidance for Associate-Degree Cybersecurity Programs. In Proceedings of the 51st ACM Technical Symposium on Computer Science Education (Portland, OR, USA) (SIGCSE '20). Association for Computing Machinery, New York, NY, USA, 1285. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Kali Tools. 2020. RegRipper Package Description. https://tools.kali.org/forensics/regripper.Google ScholarGoogle Scholar
  25. M. Tu, D. Xu, C. Balan, and K. Cronin. 2012. On the Development of a Digital Forensics Curriculum. The Journal of Digital Forensics, Security and Law 7, 3 (2012), 13--32.Google ScholarGoogle Scholar
  26. K. Vasudevan. 2018. Digital Forensics---a Breadth-wise Overview. https://medium.com/redefyn/digital-forensics-a-breadth-wise-overview-2acb18803b74.Google ScholarGoogle Scholar
  27. VirusTotal. 2020. VirusTotal. https://www.virustotal.com/gui/home/upload.Google ScholarGoogle Scholar
  28. R. Weiss, J. Mache, and M. Locasto. 2014. EDURange: Hands-on Cybersecurity Exercises in the Cloud. J. Comput. Sci. Coll. 30, 1 (Oct. 2014), 178--180.Google ScholarGoogle Scholar
  29. R. Weiss, J. Mache, and M. Locasto. 2014. EDURange: Hands-on Cybersecurity Exercises in the Cloud. J. Comput. Sci. Coll. 30, 1 (Oct. 2014), 178--180.Google ScholarGoogle Scholar
  30. Hex Workshop. 2020. . http://www.hexworkshop.com/.Google ScholarGoogle Scholar
  31. E. Zimmerman. 2020. Eric Zimmerman's Tools. https://ericzimmerman.github.io/#!index.md.Google ScholarGoogle Scholar

Index Terms

  1. Teaching a computer forensics course

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ACM SE '21: Proceedings of the 2021 ACM Southeast Conference
          April 2021
          263 pages
          ISBN:9781450380683
          DOI:10.1145/3409334
          • Conference Chair:
          • Kazi Rahman,
          • Program Chair:
          • Eric Gamess

          Copyright © 2021 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 10 May 2021

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate178of377submissions,47%
        • Article Metrics

          • Downloads (Last 12 months)22
          • Downloads (Last 6 weeks)3

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader