{"id":361,"date":"2026-03-07T17:20:51","date_gmt":"2026-03-07T17:20:51","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/?page_id=361"},"modified":"2026-03-07T19:09:01","modified_gmt":"2026-03-07T19:09:01","slug":"cyse-407-digital-forensics","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/cyse-407-digital-forensics\/","title":{"rendered":"CYSE 407 Digital Forensics"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"http:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/Screenshot-2026-03-07-140808.png\"><img loading=\"lazy\" decoding=\"async\" width=\"737\" height=\"370\" src=\"http:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/Screenshot-2026-03-07-140808.png\" alt=\"\" class=\"wp-image-400\" style=\"width:749px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/Screenshot-2026-03-07-140808.png 737w, https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/Screenshot-2026-03-07-140808-300x151.png 300w, https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/Screenshot-2026-03-07-140808-192x96.png 192w\" sizes=\"(max-width: 737px) 100vw, 737px\" \/><\/a><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Course Overview<\/h3>\n\n\n\n<p>CYSE 407 introduces the principles and techniques used in digital forensic investigations. The course focuses on identifying, collecting, preserving, and analyzing digital evidence from computer systems and networks. Through hands-on exercises and case-based scenarios, students learn how digital evidence can be used to reconstruct events, investigate cyber incidents, and support legal or organizational investigations.<\/p>\n\n\n\n<p>This course emphasizes the importance of maintaining evidence integrity, following proper forensic procedures, and documenting investigative findings in a clear and structured manner.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Key Skills Developed<\/h3>\n\n\n\n<p>\u2022 Digital evidence identification and preservation<br>\u2022 File system analysis and forensic investigation techniques<br>\u2022 Understanding chain of custody and evidence handling procedures<br>\u2022 Investigating system artifacts and user activity<br>\u2022 Documenting forensic findings and investigative reports<\/p>\n\n\n\n<p>\u2022 Documenting forensic findings and investigative reports<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Tools and Technologies<\/h3>\n\n\n\n<p>Throughout this course, I gained experience working with digital forensic tools and investigative techniques used to analyze computer systems and recover evidence from digital media.<\/p>\n\n\n\n<p>Examples of tools and concepts explored include:<\/p>\n\n\n\n<p>\u2022 Disk imaging and forensic acquisition techniques<br>\u2022 File system analysis<br>\u2022 Metadata and artifact examination<br>\u2022 Digital evidence documentation and reporting<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Reflection<\/h3>\n\n\n\n<p>CYSE 407 provided valuable insight into the investigative side of cybersecurity. The course helped me understand how digital evidence can be used to analyze cyber incidents and reconstruct events that occur on computer systems. Through hands-on activities and analysis of system artifacts, I developed a stronger understanding of how forensic investigations are conducted and how technical findings can support security operations and incident response.<\/p>\n\n\n\n<p>This course strengthened my analytical thinking and introduced investigative techniques that are essential in fields such as incident response, digital forensics, and cybersecurity investigations.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Course Artifacts<\/h3>\n\n\n\n<p>The following assignments demonstrate my work and understanding of digital forensic concepts covered in this course.<\/p>\n\n\n\n<p>Midterm Assignment:<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/CYSE-407-Midterm.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE-407-Midterm<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>Final Assignment<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-content\/uploads\/sites\/38223\/2026\/03\/CYSE-407-Final-Paper.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE-407-Final-Paper<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Course Overview CYSE 407 introduces the principles and techniques used in digital forensic investigations. The course focuses on identifying, collecting, preserving, and analyzing digital evidence from computer systems and networks. Through hands-on exercises and case-based scenarios, students learn how digital evidence can be used to reconstruct events, investigate cyber incidents, and support legal or organizational &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/cyse-407-digital-forensics\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">CYSE 407 Digital Forensics<\/span><\/a><\/p>\n","protected":false},"author":30417,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/pages\/361"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/users\/30417"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/comments?post=361"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/pages\/361\/revisions"}],"predecessor-version":[{"id":401,"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/pages\/361\/revisions\/401"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/eriksorto-portfolio\/wp-json\/wp\/v2\/media?parent=361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}