COEN 152 Computer Forensics
Procedures for identification, preservation, and extraction of electronic evidence. Auditing and investigation of network and host system intrusions, analysis and documentation of information gathered, and preparation of expert testimonial evidence. Forensic tools and resources for system administrators and information system security officers. Ethics, law, policy, and standards concerning digital evidence. (4 units)
Ideas for Forensics and IA Senior Design Projects
(to be updated continually)
If you want to gain experience in Computer Forensics, you can apply as an unpaid intern for the Summer at Applied Materials. You would be doing some grunt work such as cloning hard drives, archiving the resulting image, utilizing Encase Forensics software to run scripts against the image, maintaining computer forensics equipment, etc. but you will also be able to participate in investigations not involving company sensitive information. Consider this as a chance to be mentored. If you wanted to do it full-time for four weeks, that should give you enough basic training and exposure to the use of industry standard tools. You can also consider a part-time arrangement as low as 4 hours per week for a fast overview of things.
Currently this is a very informal program, so please contact me. This is a good opportunity for anyone interested in making a job out of systems administration or information assurance, or someone looking for a career in computer forensics, law enforcement, intellectual property protection efforts, etc.
Applied will make a background check (criminal history) prior to acceptance (as is standard for many sensitive jobs).
|©2005 Thomas Schwarz, S.J., COEN, SCU||SCU||COEN||COEN152||T. Schwarz||These documents are not intended for dissemination beyond SCU. CAVEAT LECTOR|