Abstract
This paper reports experiences and lessons learned in the process of developing and implementing an undergraduate curriculum for digital forensics over the last three years at the University of Illinois at Urbana-Champaign. The project addresses the challenges of developing a higher-education standardized curriculum for digital forensics that meets the needs of the digital forensics community. The curriculum provides degree options and considers the growing employability of digital forensics students in an increasing range of jobs. The approach builds on the multidisciplinary nature of the field. The findings include a curriculum model, detailed course content, exams, and an evaluation package for measuring how students respond to the courses. This paper summarizes the model, results, challenges, and opportunities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Meyers, M., Rogers, M.: CF: the need for standardization and certification. Int. J. Digital Evid. 3(2), 1–11 (2004)
Yasinsac, A., Erbacher, R.F., Marks, D.G., Pollitt, M.M., Sommer, P.M.: Computer forensics education. IEEE Secur. Priv. 1(4), 15–23 (2003)
Bem, D., Huebner, E.: Computer forensics workshop for undergraduate students. In: Proceedings of the Tenth Conference on Australian Computing Education, vol. 78, pp. 29–33. Australian Computer Society, Inc., January 2008
Kessler, G.C., Schirling, M.E.: The design of an undergraduate degree program in computer and digital forensics. J. Digital Forensics Secur. Law 1(3), 37–50 (2006)
Bashir, M., Applequist, J., Campbell, R., DeStefano, L., Garcia, G., Lang, A.: Development and dissemination of a new multidisciplinary undergraduate curriculum in digital forensics. In: ADFSL, Richmond, Virginia, 28–29 May 2014
Chi, H., Dix-Richardson, F., Evans, D.: Designing a computer forensics concentration for cross-disciplinary undergraduate students. In: Information Security Curriculum Development Conference, pp. 52–57. ACM (2010)
Srinivasan, S.: Computer forensics curriculum in security education. In: Information Security Curriculum Development Conference, pp. 32–36. ACM (2009)
Wassenaar, D., Woo, D., Wu, P.: A certificate program in computer forensics. J. Comput. Sci. Coll. 24(4), 158–167 (2009)
Woods, K., Lee, C.A., Garfinkel, S., Dittrich, D., Russel, A., Kearton, K.: Creating realistic corpora for forensic and security education. In: Proceedings of the ADFSL Conference on Digital Forensics Security and Law, pp. 123–134 (2011)
Lang, A., Bashir, M., Campbell, R., DeStefano, L.: Developing a new digital forensics curriculum. In: DFWRS, Denver, CO, 3–6 August 2014
Walls, R.J., Levine, B.N., Liberatore, M., Shields, C.: Effective digital forensic research is investigator-centric. In: HotSec (2011)
Beebe, N.: Digital forensic research: the good, the bad and the unaddressed. In: Peterson, G., Shenoi, S. (eds.) IFIP WG. IFIP AICT, vol. 306, pp. 17–36. Springer, Heidelberg (2009)
Kwan, M., Chow, K.-P., Law, F., Lai, P.: Reasoning about evidence using bayesian networks. In: Ray, I., Shenoi, S. (eds.) Advances in Digital Forensics IV. IFIP, vol. 285, pp. 275–289. Springer, Heidelberg (2008)
Bishop, M.: Education in information security. IEEE Concurrency 8(4), 4–8 (2000)
Craiger, P., Ponte, L., Whitcomb, C., Pollitt, M., Eaglin, R.: Master’s degree in digital forensics. In: System Sciences, HICSS 2007, 40th AHIC, pp. 264b. IEEE (2007)
Nance, K., Armstrong, H., Armstrong, C.: Digital forensics: defining an education agenda. In: System Sciences, HICSS 2010, 43rd AHIC, pp. 1–10. IEEE (2010)
Burnett, S.F.: Computer security training and education: a needs analysis. In: 2012 IEEE Symposium on Security and Privacy, p. 0026. IEEE Computer Society (1996)
Cooper, P., Finley, G.T., Kaskenpalo, P.: Towards standards in digital forensics education. In: Proceedings of the 2010 ITiCSE Working Group Reports, New York, pp. 87–95. ACM (2010)
Gottschalk, L., Liu, J., Dathan, B., Fitzgerald, S., Stein, M.: Computer forensics programs in higher education: a preliminary study. In: SIGCSE Bulletin, vol. 37, pp. 147–151 (2005)
Liu, J.: Implementing a baccalaureate program in computer forensics. J. Comput. Sci. Coll. 25(3), 101–109 (2010)
FEPAC Accreditation standards Technical report. AAFS (2012)
Curricula, C.: Report of ACM/IEEE-CS Joint Curriculum Task Force (1991)
WVUFSI: Technical working group for education and training in digital forensics technical report. U.S. Department of Justice, August 2007
Scientific Working Group on Digital Forensics. SWGDE/SWGIT guidelines and recommendations for training in digital and multimedia evidence technology (2010). https://www.swgde.org/documents/CurrentDocuments
Schipp, J., Dopheide, J., Slagell, A.: ISLET: an isolated, scalable and lightweight environment for training. In: The Proceedings of XSEDE 2015, St. Louis, MO, July 2015
Woods, K., Lee, C., Garfinkel, S., Dittrich, D., Russel, A., Kearton, K.: Creating realistic corpora for forensic and security education. In: ADFSL Conference on Digital Forensics, Security and Law (2011)
Ismand, E.S., Hamilton, J.A. Jr.: A digital forensics program to retrain America’s veterans. In: 5th ASIA, pp. 62–66 (2010)
Al Amro, S., Chiclana, F., Elizondo, D.A.: Application of fuzzy logic in computer security and forensics. In: Elizondo, D.A., Solanas, A., Martinez, A. (eds.) Computational Intelligence for Privacy and Security. SCI, vol. 394, pp. 35–49. Springer, Heidelberg (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Institute for Computer Sciences, Social informatics and Telecommunication Engineering
About this paper
Cite this paper
Palmer, I., Wood, E., Nagy, S., Garcia, G., Bashir, M., Campbell, R. (2015). Digital Forensics Education: A Multidisciplinary Curriculum Model. In: James, J., Breitinger, F. (eds) Digital Forensics and Cyber Crime. ICDF2C 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 157. Springer, Cham. https://doi.org/10.1007/978-3-319-25512-5_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-25512-5_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-25511-8
Online ISBN: 978-3-319-25512-5
eBook Packages: Computer ScienceComputer Science (R0)