>
Course Unit Title Course Unit Code Type of Course Unit Level of Course Unit Year of Study Semester ECTS Credits
Judicial Informatics TBL222 Elective Bachelor's degree 2 Spring 5

Name of Lecturer(s)

Prof. Dr. Halil YİĞİT
Research Assistant Seda BALTA

Learning Outcomes of the Course Unit

1) Understands the importance of a systematic procedure for searching data in digital storage media that can provide evidence.
2) Understands file system storage mechanisms of two operating systems (Microsoft Windows and LINUX versions).
3) Uses tools for faithful preservation of data on disks for analysis purposes.
4) Finds data that may be clear or hidden on a computer disk.
5) Learns the use of forensic tools used in data analysis such as search, disk sector viewing and editing, file recovery, password cracking.
6) Understand how to present the results of disk data analysis in a court proceedi ng as an expert witness.

Program Competencies-Learning Outcomes Relation

  Program Competencies
1 2 3 4 5 6 7 8 9 10 11
Learning Outcomes
1 Low No relation High No relation No relation No relation No relation No relation No relation No relation No relation
2 No relation No relation No relation No relation No relation No relation No relation No relation No relation No relation No relation
3 No relation No relation No relation No relation No relation No relation No relation No relation No relation No relation No relation
4 No relation No relation No relation No relation No relation No relation No relation No relation No relation No relation No relation
5 No relation No relation No relation No relation No relation No relation No relation No relation No relation No relation No relation
6 No relation No relation No relation No relation No relation No relation No relation No relation No relation No relation No relation

Mode of Delivery

Face to Face

Prerequisites and Co-Requisites

None

Recommended Optional Programme Components

Not Required

Course Contents

Computer forensics; guilty of computers and the crimes they have made using information technologies, analyzing the scene starting with the process in which the offender is suspected, collection of data after necessary processing, analysis of this data, if available in regular reporting the results of the results by The associations necessary related crime to be presented to the judicial authorities and related to information technology security covers up to provide a broad perspective.

Recommended or Required Reading

Planned Learning Activities and Teaching Methods



Assessment Methods and Criteria

Language of Instruction

Turkish

Work Placement(s)

Not Required