Forensics

This module explores digital forensics, focusing on techniques for investigating and analyzing digital evidence from electronic devices to solve cyber incidents and understand security breaches.

Portal > Cybersecurity > Forensics

Curriculum Builder

Eoghan, Casey. “Clearly conveying digital forensic results” Digital Investigation, 2018. DOI: 10.1016/j.diin.2018.03.001

Phillip, Aaron, Cowen, David, and Chris David. “Hacking Exposed: Computer Forensics,” Second ed, McGraw Hill, 2009.ISBN: 0071626778

Quick, Darren, Martini, Ben, and Kim-Kwang Raymond Choo. “Cloud Storage Forensics” Elsevier Inc. All, 2014. https://doi.org/10.1016/C2013-0-09718-6

Cahyani, Niken Dwi Wahyu, Rahman, Nurul Hidayah Ab, Glisson, William Bradley, and Kim-Kwang Raymond Choo. “The Role of Mobile Forensics in Terrorism Investigations Involving the Use of Cloud Storage Service and Communication Apps” Springer, (2017). Pp 240-254. DOI: 10.1007/s11036-016-0791-8

Garrie, Daniel. “Digital Forensic Evidence in the Courtroom: Understanding Content and Quality.” 12 Nw. J. Tech. & Intell. Prop. 121 (2014). https://scholarlycommons.law.northwestern.edu/njtip/vol12/iss2/1/

Hayes, Dr. Darren. “A Practical Guide to Computer Forensics Investigations” 2nd ed, Pearson IT Certification, 2020. ISBN: 9780137459759

Raggo M and C. Hosmer. “Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols” 1st ed, Syngress, 2012. ISBN 978-1-59749-743-5

Casey, Eoghan. “Handbook of Digital Forensics and Investigation.” Elsevier Academic Press, 2010.

Easttom, Chuck. “Computer crime, investigation, and the law.” 1st edition, Course Technology PTR, 2010.

Kavrestad, Joakim. “Guide to Digital Forensics: a Concise and Practical Introduction.” Springer, 2017.