Skip to main content

Digital Forensics Education: A Multidisciplinary Curriculum Model

  • Conference paper
  • First Online:
Digital Forensics and Cyber Crime (ICDF2C 2015)

Abstract

This paper reports experiences and lessons learned in the process of developing and implementing an undergraduate curriculum for digital forensics over the last three years at the University of Illinois at Urbana-Champaign. The project addresses the challenges of developing a higher-education standardized curriculum for digital forensics that meets the needs of the digital forensics community. The curriculum provides degree options and considers the growing employability of digital forensics students in an increasing range of jobs. The approach builds on the multidisciplinary nature of the field. The findings include a curriculum model, detailed course content, exams, and an evaluation package for measuring how students respond to the courses. This paper summarizes the model, results, challenges, and opportunities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 72.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Meyers, M., Rogers, M.: CF: the need for standardization and certification. Int. J. Digital Evid. 3(2), 1–11 (2004)

    Google Scholar 

  2. Yasinsac, A., Erbacher, R.F., Marks, D.G., Pollitt, M.M., Sommer, P.M.: Computer forensics education. IEEE Secur. Priv. 1(4), 15–23 (2003)

    Article  Google Scholar 

  3. Bem, D., Huebner, E.: Computer forensics workshop for undergraduate students. In: Proceedings of the Tenth Conference on Australian Computing Education, vol. 78, pp. 29–33. Australian Computer Society, Inc., January 2008

    Google Scholar 

  4. Kessler, G.C., Schirling, M.E.: The design of an undergraduate degree program in computer and digital forensics. J. Digital Forensics Secur. Law 1(3), 37–50 (2006)

    Google Scholar 

  5. Bashir, M., Applequist, J., Campbell, R., DeStefano, L., Garcia, G., Lang, A.: Development and dissemination of a new multidisciplinary undergraduate curriculum in digital forensics. In: ADFSL, Richmond, Virginia, 28–29 May 2014

    Google Scholar 

  6. Chi, H., Dix-Richardson, F., Evans, D.: Designing a computer forensics concentration for cross-disciplinary undergraduate students. In: Information Security Curriculum Development Conference, pp. 52–57. ACM (2010)

    Google Scholar 

  7. Srinivasan, S.: Computer forensics curriculum in security education. In: Information Security Curriculum Development Conference, pp. 32–36. ACM (2009)

    Google Scholar 

  8. Wassenaar, D., Woo, D., Wu, P.: A certificate program in computer forensics. J. Comput. Sci. Coll. 24(4), 158–167 (2009)

    Google Scholar 

  9. Woods, K., Lee, C.A., Garfinkel, S., Dittrich, D., Russel, A., Kearton, K.: Creating realistic corpora for forensic and security education. In: Proceedings of the ADFSL Conference on Digital Forensics Security and Law, pp. 123–134 (2011)

    Google Scholar 

  10. Lang, A., Bashir, M., Campbell, R., DeStefano, L.: Developing a new digital forensics curriculum. In: DFWRS, Denver, CO, 3–6 August 2014

    Google Scholar 

  11. Walls, R.J., Levine, B.N., Liberatore, M., Shields, C.: Effective digital forensic research is investigator-centric. In: HotSec (2011)

    Google Scholar 

  12. Beebe, N.: Digital forensic research: the good, the bad and the unaddressed. In: Peterson, G., Shenoi, S. (eds.) IFIP WG. IFIP AICT, vol. 306, pp. 17–36. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  13. Kwan, M., Chow, K.-P., Law, F., Lai, P.: Reasoning about evidence using bayesian networks. In: Ray, I., Shenoi, S. (eds.) Advances in Digital Forensics IV. IFIP, vol. 285, pp. 275–289. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  14. Bishop, M.: Education in information security. IEEE Concurrency 8(4), 4–8 (2000)

    Article  Google Scholar 

  15. Craiger, P., Ponte, L., Whitcomb, C., Pollitt, M., Eaglin, R.: Master’s degree in digital forensics. In: System Sciences, HICSS 2007, 40th AHIC, pp. 264b. IEEE (2007)

    Google Scholar 

  16. Nance, K., Armstrong, H., Armstrong, C.: Digital forensics: defining an education agenda. In: System Sciences, HICSS 2010, 43rd AHIC, pp. 1–10. IEEE (2010)

    Google Scholar 

  17. Burnett, S.F.: Computer security training and education: a needs analysis. In: 2012 IEEE Symposium on Security and Privacy, p. 0026. IEEE Computer Society (1996)

    Google Scholar 

  18. Cooper, P., Finley, G.T., Kaskenpalo, P.: Towards standards in digital forensics education. In: Proceedings of the 2010 ITiCSE Working Group Reports, New York, pp. 87–95. ACM (2010)

    Google Scholar 

  19. Gottschalk, L., Liu, J., Dathan, B., Fitzgerald, S., Stein, M.: Computer forensics programs in higher education: a preliminary study. In: SIGCSE Bulletin, vol. 37, pp. 147–151 (2005)

    Google Scholar 

  20. Liu, J.: Implementing a baccalaureate program in computer forensics. J. Comput. Sci. Coll. 25(3), 101–109 (2010)

    Google Scholar 

  21. FEPAC Accreditation standards Technical report. AAFS (2012)

    Google Scholar 

  22. Curricula, C.: Report of ACM/IEEE-CS Joint Curriculum Task Force (1991)

    Google Scholar 

  23. WVUFSI: Technical working group for education and training in digital forensics technical report. U.S. Department of Justice, August 2007

    Google Scholar 

  24. Scientific Working Group on Digital Forensics. SWGDE/SWGIT guidelines and recommendations for training in digital and multimedia evidence technology (2010). https://www.swgde.org/documents/CurrentDocuments

  25. Schipp, J., Dopheide, J., Slagell, A.: ISLET: an isolated, scalable and lightweight environment for training. In: The Proceedings of XSEDE 2015, St. Louis, MO, July 2015

    Google Scholar 

  26. Woods, K., Lee, C., Garfinkel, S., Dittrich, D., Russel, A., Kearton, K.: Creating realistic corpora for forensic and security education. In: ADFSL Conference on Digital Forensics, Security and Law (2011)

    Google Scholar 

  27. Ismand, E.S., Hamilton, J.A. Jr.: A digital forensics program to retrain America’s veterans. In: 5th ASIA, pp. 62–66 (2010)

    Google Scholar 

  28. Al Amro, S., Chiclana, F., Elizondo, D.A.: Application of fuzzy logic in computer security and forensics. In: Elizondo, D.A., Solanas, A., Martinez, A. (eds.) Computational Intelligence for Privacy and Security. SCI, vol. 394, pp. 35–49. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Masooda Bashir .

Editor information

Editors and Affiliations

Appendix A. Digital Forensics Curriculum Topics

Appendix A. Digital Forensics Curriculum Topics

See Tables 1 and 2.

Table 1. Topics for digital forensics 1
Table 2. Topics for digital forensics 2

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Institute for Computer Sciences, Social informatics and Telecommunication Engineering

About this paper

Cite this paper

Palmer, I., Wood, E., Nagy, S., Garcia, G., Bashir, M., Campbell, R. (2015). Digital Forensics Education: A Multidisciplinary Curriculum Model. In: James, J., Breitinger, F. (eds) Digital Forensics and Cyber Crime. ICDF2C 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 157. Springer, Cham. https://doi.org/10.1007/978-3-319-25512-5_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25512-5_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25511-8

  • Online ISBN: 978-3-319-25512-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics