Module Database Search



MODULE DESCRIPTOR
Module Title
Incident Management And Forensics
Reference CMM519 Version 4
Created January 2023 SCQF Level SCQF 11
Approved August 2017 SCQF Points 15
Amended June 2023 ECTS Points 7.5

Aims of Module
To provide students with the ability to evaluate and apply the methods, tools and techniques used in intrusion response and forensics.

Learning Outcomes for Module
On completion of this module, students are expected to be able to:
1 Evaluate and apply the techniques and tools used in intrusion analysis.
2 Appraise the methods used in incident handling and management.
3 Apply the techniques used in collecting, processing and preserving digital evidence.
4 Analyse and appraise the procedures used in preparing a forensics report and expert testimony.

Indicative Module Content
Incident identification: unauthorised access, denial of service, malicious code, improper usage, and scans/probes. Analysis of malware signatures and behaviour. Incident handling, containment and recovery. Understanding of legislation and legal constraints for digital forensics. Evidence gathering rules and techniques: collecting, processing and preserving digital evidence. Device forensics; Memory forensics; File systems forensics; Network forensics; Malware forensics; handheld device forensics; Anti-forensic techniques. Forensic report writing and expert testimony.

Module Delivery
Key concepts are introduced and illustrated through lectures and directed reading. The understanding of students is tested and further enhanced through lab sessions.

Indicative Student Workload Full Time Part Time
Contact Hours 30 30
Non-Contact Hours 120 120
Placement/Work-Based Learning Experience [Notional] Hours N/A N/A
TOTAL 150 150
Actual Placement hours for professional, statutory or regulatory body    

ASSESSMENT PLAN
If a major/minor model is used and box is ticked, % weightings below are indicative only.
Component 1
Type: Coursework Weighting: 100% Outcomes Assessed: 1, 2, 3, 4
Description: This is a coursework where students will be appraising the various methods of incident handling and preparing a forensics investigation report.

MODULE PERFORMANCE DESCRIPTOR
Explanatory Text
The calculation of the overall grade for this module is based on 100% weighting of C1. An overall minimum grade D is required to pass the module.
Module Grade Minimum Requirements to achieve Module Grade:
A The student needs to achieve an A in Component 1.
B The student needs to achieve a B in Component 1.
C The student needs to achieve a C in Component 1.
D The student needs to achieve a D in Component 1.
E The student needs to achieve an E in Component 1.
F The student needs to achieve an F in Component 1.
NS Non-submission of work by published deadline or non-attendance for examination

Module Requirements
Prerequisites for Module None.
Corequisites for module None.
Precluded Modules None.

INDICATIVE BIBLIOGRAPHY
1 Street, J., 2015, Dissecting the Hack: The V3rb0ten Network. Springer.
2 Zeigler, A., 2016, Preserving Electronic Evidence for Trial: A team approach to the litigation hold, data collection, and preservation of digital evidence. Elsevier.
3 SAMMONS, J., 2016, Digital Forensics: Threatscape and best practices. Elsevier.
4 Leighton, J., 2014 Computer incident response and forensics team management conducting a successful incident response. Syngress.
5 Malin, C., 2014, Malware Forensic Field Guide For Linux/Windows systems. Elsevier.
6 Hassan, N.A., 2019. Digital forensics basics: a practical guide using Windows OS. Springer.


Robert Gordon University, Garthdee House, Aberdeen, AB10 7QB, Scotland, UK: a Scottish charity, registration No. SC013781