Skip Navigation

We're giving our website a fresh new look. Take a few minutes to complete this short survey. Survey


Utah Core  •  Curriculum Search  •  All CTE/Computer Science & Information Technology Lesson Plans  •  USBE CTE/Computer Science & Information Technology website

 

CTE/Computer Science & Information Technology Curriculum Cyber Forensics
Printable Version Printable Version (pdf)

 

arrow icon Course Introduction

 

Core Standards of the Course

Strand 1
Analysis.

Standard 1
Analyze forensic images.

Standard 2
Apply procedural concepts required to use forensic tools.

Standard 3
Apply basic malware analysis using NIST accepted forensic techniques and tools.

Standard 4
Identify anti-forensics techniques.

Standard 5
Determine the important content of event logs in forensics.


Strand 2
Discovery.

Standard 1
Apply procedural concepts necessary to detect a hidden message inside a picture.

Standard 2
Analyze a conversation between two endpoints from a PCAP file.

Standard 3
Recognize that devices are kept in the same state as they were found.

Standard 4
Determine how to gather evidence in a forensically sound manner.

Standard 5
Apply procedural concepts required to discover evidence on different file systems.

Standard 6
Apply procedural concepts required to gather evidence on different operating systems.

Standard 7
Identify proper steps in network capture.

Standard 8
Given a scenario, determine evidence of email crimes.


Strand 3
Evidence.

Standard 1
Determine and report logon/logoff times for a specific user.

Standard 2
Verify the authenticity of evidence (e.g., hash value).

Standard 3
Summarize the proper handling of evidence.

Standard 4
Outline the process for creating a forensically sound image.

Standard 5
Apply evidence collection to the chain of custody.

Standard 6
Discriminate between a live acquisition and static acquisition.


Strand 4
Documentation and Reporting.

Standard 1
Apply forensic investigation methodology.

Standard 2
Identify the steps necessary to validate an emergency contact list for incident response.

Standard 3
Analyze a scene to determine what should be visually documented.

Standard 4
Report findings from a malware analysis.

Standard 5
Identify the elements of a complete forensics report.

Standard 6
Communicate the results of an investigation to an internal team.


Strand 5
Cyber Forensics Fundamentals.

Standard 1
Identify different types of cybercrimes.

Standard 2
Communicate incident handling and the response process.

Standard 3
Distinguish between steganography and cryptography.



UEN logo http://www.uen.org - in partnership with Utah State Board of Education (USBE) and Utah System of Higher Education (USHE).  Send questions or comments to USBE Specialist - Kristina  Yamada and see the CTE/Computer Science & Information Technology website. For general questions about Utah's Core Standards contact the Director - THALEA  LONGHURST.

These materials have been produced by and for the teachers of the State of Utah. Copies of these materials may be freely reproduced for teacher and classroom use. When distributing these materials, credit should be given to Utah State Board of Education. These materials may not be published, in whole or part, or in any other format, without the written permission of the Utah State Board of Education, 250 East 500 South, PO Box 144200, Salt Lake City, Utah 84114-4200.