This programme is specifically designed to provide:
As computers are an intrinsic part of normal life, they are also important as a tool in criminal activity. Hence, they can provide a vital source of evidence. This award provides a solid grounding in the skills you need to follow a career in forensic investigation of computer systems and related areas of security. The same skills that enable you to track down evidence also equip you with the abilities necessary to help organisations and individuals recover data/information that may have been lost or corrupted as a result of accidental or malicious activity. You can not only detect criminal activity but also help to save people from the consequences of such activity. The first year provides a general grounding in fundamental computing skills and introduces you to the use of standard software tools (e.g. Encase whose use in forensic investigation is recognised by UK courts).
In the following years, you will deepen your knowledge and skills required for the investigation, evidence gathering and forensic analysis of that evidence from computer systems (including mobile devices), as well as understanding the legal context and the role of expert witness testimony. Related areas of computer security are studied to provide a fuller context to your forensic computing studies. You will also extend your underpinning knowledge of computer networks and the hardware and system software of computer systems. We encourage student entrepreneurship with, where feasible and practicable, business start-ups during the placement year and the marketing of any artefact developed from their final year project.
We welcome applications from people with a wide variety of qualifications, skills and experience. Applications are individually assessed. However typically you will have:
- Route 1: Entry to Year 1 Degree
- Successful completion of STPM with 2 full passes or equivalent with minimum CGPA of 2.0 and completion of SPM or equivalent with credit in Mathematics; or
- Successful completion of A-Level with at least a pass in 2 subjects and successful completion of O-Level or equivalent with credit in Mathematics; or
- Recognised Matriculation or foundation with CGPA 2.0 and credit in Mathematics at SPM Level; or
- A qualification that SU accepts as equivalent to the above.
All students must demonstrate that they have met the equivalent of IELTS 6 either through formal English language assessment or through success in prior study at “A” level or equivalent in English.
- Route 2: Direct Entry to Year 2 Degree
- Successful completion of the relevant APIIT Diploma, or
- Successful completion of study in another recognised institution with academic credits equivalent to level 4 of an honours degree in relevant subjects
Degree Course Structure:
Topic you will be studied:
- Algorithms & Data Structures in C
- Hardware & Software Systems & Graphics
- Introduction to Forensic Tools & Techniques
- Introduction to Networking with LANs & WANs
- Introduction to Security Technologies
- Introduction to Software Development
- Mathematics & Statistics for Computing
- Systems and Database Analysis
- Forensics Data Recovery
- Hardware & Software Systems & Networks
- Object Oriented Methods
- Professional & Enterprise Development
- Computer Systems Low Level Techniques
- Information Systems Organisations & Management
- Ethical Hacking
- Cybercrime Forensic Analysis
- Expert Witness Testimony and the Legal System
- Computer Systems Security
- Group Case Study
- Forensic Data Gathering, Reconstruction and Analysis
- Legal & Evidentiary Aspects of Forensic Computing
- Project: Artefact Realisation, Testing & Evaluation
- Project: Planning, Management, Communication & Appraisal
- Project: Research, Analysis & Artefact Design
In addition to the above, all students are also required to successfully complete four (4) General Studies modules as stipulated by the Malaysian Qualifications Agency, as well as fulfill credit requirements for Co-Curricular Activities
Teaching and Learning
Different people learn in different ways and therefore the programme utilises a range of different teaching methods and situations – lectures, problem-based tutorials, practical laboratory sessions, group-based activities, project work, virtual learning environments, seminars, workshops (skills-based) etc. – that best deliver the specific learning outcomes of the modules. In all classes emphasis is placed on active, experiential learning usually based around a case study, or specific crime/event based scenarios. Students will be actively challenged during tutorials to explain or defend a particular viewpoint/finding/analysis, as the students may in the future be expected to defend their expert witness testimony within a legal environment. The use of industry standard packages, such as Encase and Forensic Tool Kit (FTK), hardware and software will be used with real life case studies to provide good exposure to students. With a dedicated and self-contained laboratory, with its own private internal network and containing some of the latest equipment and software, students will be able to practice and develop their practical and troubleshooting skills as required.
Learning approaches are chosen to be compatible to the method of delivery and can include: case studies, investigations, seminars, resource based learning and independent reading. A wide range of teaching, learning and assessment approaches are used and are seen as beneficial in exposing the student to diverse approaches. The emphasis is on developing students as confident, independent learners. Students are encouraged to access a variety of materials, journals, textbooks, e-journals etc., as part of their independent learning. This independent learning is directed, with lecturers providing general reading lists to prepare for or follow-up classes, specific assignment reading as well as a range of formative tasks and activities. All this directed study supports and builds upon the knowledge and skills learnt in class to provide a fuller understanding of the subject
Teaching Methods Include
Modules are normally presented through a mixture of lecture, tutorial and/or practical contact hours, these will vary depending upon the learning outcomes of the specific module, for example, more theoretical modules such as Information Systems Organisation and Management will have more lectures than tutorials. Thus it can be seen that the aim is to utilise whichever teaching and learning strategies are most appropriate to facilitate the development of the requisite knowledge, skills and abilities within the students. Each student is a partner in the learning experience, and is expected to take responsibility for his/her study. As a result the Faculty sees the role of lecturer as a learning facilitator. A resource based approach to facilitating student learning is enhanced by the availability of on-line learning facilities such as VLEs or websites. Students are encouraged to undertake independent learning to extend the material presented. The value of self-gained knowledge and understanding is emphasised, both as an essential skill/practice for life (lifelong learning) and as an expectation on computing professionals (continuing professional development). Students are given regular feedback throughout modules and are encouraged to reflect critically in order to understand their own strengths and weaknesses.
The Digital Forensics award employs an innovative range of formative and summative assessments. Typically, formative assessment is used as an aide to check students’ understanding of a specific subject or topic. The method of assessment is chosen to meet the academic content and outcomes the module is to assess. These will include individual coursework assignments, group-work assignments, presentations, demonstrations, written reports, end-of-module examinations, and oral viva.
This is to: ensure that learning outcomes are tested in the most appropriate way; reflect the sorts of materials graduates will be asked to prepare in future careers; and recognise that students have different abilities. Although the practical and skills based are the nature of the Digital Forensics award, coursework, formal examinations and class-tests are also used to assess knowledge-based modules across all three levels.
All information is correct at the time of publication, but is subject to change in the interest of continuing improvement.