CFOR-250 Computer Network Forensic Technology
This course will cover computer forensics examination process in a network environment. The OSI model, TCP/IP model, and IP addressing will be discussed and the relationship and how these layered approaches relate to the computer forensics examination process. Students will determine how various network devices such as servers, hubs, switches, and routers create log files that can be used for forensic examination. Students will examine various log files, port scans, and packet sniffers, etc., from the network devices for computer forensic analysis. Students will have hands-on experience with actual computer networks in the lab using various forensic tools and devices.