
Basic information
- Field of study
- Modern Technologies in Forensic Science
- Major
- -
- Organisational unit
- Faculty of Computer Science, Electronics and Telecommunications
- Study level
- First-cycle (engineer) programme
- Form of study
- Full-time studies
- Profile
- General academic
- Didactic cycle
- 2025/2026
- Course code
- INKTS.Ii2.08531.25
- Lecture languages
- Polish
- Mandatoriness
- Obligatory
- Block
- Core Modules
- Course related to scientific research
- No
|
Period
Semester 2
|
Method of verification of the learning outcomes
Exam
Activities and hours
Lectures:
30
Laboratory classes: 30 |
Number of ECTS credits
4
|
Goals
| C1 | To acquaint students with a wide range of technical issues touched by digital forensics. |
| C2 | To provide knowledge of the basics of operating systems, file systems, computer networks, cryptography with a focus on digital forensics. |
Course's learning outcomes
| Code | Outcomes in terms of | Learning outcomes prescribed to a field of study | Methods of verification |
| Knowledge – Student knows and understands: | |||
| W1 | Zna konstrukcję systemów plików, pamięci i ruchu sieciowego w stopniu pozwalającym na ich analizę. | NKT1A_W04 | Execution of laboratory classes |
| W2 | Zna podstawowe artefakty w systemach Windows, Linux, macOS, Android i iOS. | NKT1A_W04 | Execution of laboratory classes |
| Skills – Student can: | |||
| U1 | Potrafi przeprowadzić analizę dowodową w zakresie systemów plików, pamięci operacyjnej i ruchu sieciowego. | NKT1A_U04 | Execution of laboratory classes |
| Social competences – Student is ready to: | |||
| K1 | Rozumie, jakie konsekwencje mogą mieć dane pozyskane w ramach analizy dowodowej. | NKT1A_K02 | Examination |
Student workload
| Activity form | Average amount of hours* needed to complete each activity form | |
| Lectures | 30 | |
| Laboratory classes | 30 | |
| Preparation for classes | 20 | |
| Realization of independently performed tasks | 25 | |
| Contact hours | 5 | |
| Student workload |
Hours
110
|
|
| Workload involving teacher |
Hours
60
|
|
* hour means 45 minutes
Program content
| No. | Program content | Course's learning outcomes | Activities |
| 1. |
|
W1, W2, U1, K1 | Lectures |
| 2. |
|
W1, W2, U1, K1 | Laboratory classes |
Extended information/Additional elements
Teaching methods and techniques :
Discussion, Group work, Design thinking, Gamification, E-learning, Problem Based Learning, Project Based Learning, Flipped classroom, Case study, Lectures
| Activities | Methods of verification | Credit conditions |
|---|---|---|
| Lectures | Execution of laboratory classes, Examination | Receiving a positive exam grade |
| Lab. classes | Execution of laboratory classes, Examination | Receiving more than 50% of points from each laboratory AND receiving more than 50% of the sum of points from all laboratories AND receiving more than 50% of the test points (if it will be carried out in a given year). |
Additional info
Classes conducted using innovative teaching methods developed during 2017-2019 in the POWR.03.04.00-00-D002/16 project, carried out by the Faculty of Computer Science, Electronics and Telecommunications under POWER 2014-2020.
Conditions and the manner of completing each form of classes, including the rules of making retakes, as well as the conditions for admission to the exam
- Laboratory: receiving more than 50% of points from each laboratory and receiving more than 50% of the sum of points from all laboratories and receiving more than 50% of the test points (if it is going to be carried out in a given year). Due to the nature of the course, it is not possible to attempt to pass it again within the retake period.
- Exam: no admission conditions, three pass attempts.
Method of determining the final grade
Weighted average of laboratory and exam grades.
Manner and mode of making up for the backlog caused by a student justified absence from classes
Students have to participate in laboratories on an ongoing basis. Failure to participate in the laboratory must be justified. Failure to join more than two laboratories without justification results in an entry „nb” at the end of the semester. If the absence is excused, it is possible to make up for it (maximum two absences).
Prerequisites and additional requirements
Students should:
- be familiar with Linux enough to navigate smoothly in the terminal and use advanced commands,
- be capable of writing scripts in Python.
Rules of participation in given classes, indicating whether student presence at the lecture is obligatory
- Lecture: Students participate in the classes, learning about the next teaching content in accordance with the subject syllabus. Students should ask questions and explain doubts on a regular basis. Audio-visual recording of the lecture requires the consent of the lecturer.
- Laboratory exercises: Students perform laboratory exercises in accordance with the materials provided by the teacher. The student is obliged to prepare for the subject of the exercise, which may be verified by an oral or written test. Completion of the course is based on the presentation of solutions to the problems posed.
Literature
Obligatory- Eoghan Casey, „Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet.” Academic Press, 2011.
- Eoghan Casey, „Handbook of digital forensics and investigation.” Elsevier Academic Press, 2010.
- * Michael Hale Ligh & Andrew Case & Jamie Levy & Aaron Walters, „The Art of Memory Forensics.” John Wiley and Sons, 214
- Brian Carrier, „File System Forensic Analysis.” Pearson Education, 2005.
- Andrew S. Tanenbaum & Herbert Bos, „Modern Operating Systems: Fourth Edition.” Pearson Education, 2015.
- Charles M. Kozierok, „THE TCP/IP GUIDE. A Comprehensive, Illustrated Internet Protocols Reference.” No Starch Press, 2005.