Note: This is an archived Handbook entry from 2010.
|Dates & Locations:|| |
This subject has the following teaching availabilities in 2010:Semester 1, Hawthorn - Taught on campus.
Semester 2, Hawthorn - Taught on campus.
Timetable can be viewed here. For information about these dates, click here.
|Time Commitment:||Contact Hours: 24 hours of face-to-face contact over an eight-week semester plus at least eight hours of pre-seminar reading |
Total Time Commitment: It is anticipated that students will need to allocate around 80 hours to undertake the assessable components of the subject to be completed in the three months encompassing the eight-week semester.
|Recommended Background Knowledge:||nil|
|Non Allowed Subjects:||nil|
|Core Participation Requirements:||For the purposes of considering requests for Reasonable Adjustments under the Disability Standards for Education (Cwth 2005), and Students Experiencing Academic Disadvantage Policy, academic requirements for this subject are articulated in the Subject Description, Subject Objectives, Generic Skills and Assessment Requirements of this entry. |
The University is dedicated to provide support to those with special requirements. Further details on the disability support scheme can be found at the Disability Liaison Unit website: http://www.services.unimelb.edu.au/disability/
Melbourne Consulting and Custom Programs
Level 3, 442 Auburn Rd
Hawthorn VIC 3122
Phone: 9810 3148
|Subject Overview:||The topics in this unit include: |
• Digital Evidence;
• Identification and analysis of software and hardware equipment affected;
• Identification and recovery process of affected files /systems;
• Identification of key components of affected computers including the re-creation of target computers, peripherals and files;
• Internet evidence e.g. how to interpret mail and Usenet information;
• Tracking tools and techniques for email;
• Network analysis and technology including abuses of networks and network evidence;
• Gathering, monitoring network traffic and network based intrusion detection systems;
• Management of an electronic crime scene, and
• Understanding event logs.
This course is no longer taking new enrolments. The last intake into this program was Semester 2, 2009.
Students who successfully complete this subject will have demonstrated an understanding of:
Two written assignments and a practical exam totalling 6000 words.
|Recommended Texts:||Please refer to MCCP website.|
|Breadth Options:|| |
This subject is not available as a breadth subject.
|Fees Information:||Subject EFTSL, Level, Discipline & Census Date|
|Links to further information:||http://www.mccp.unimelb.edu.au/courses/award-courses/masters/e-forensics-enterprise-security|
Master of e-Forensics and Enterprise Security |
Download PDF version.