Cyber Crime Technology
Catalog Downloads
Introduction to Cyber Crime
This course introduces and explains the various types of offenses that qualify as cyber crime activity. Emphasis is placed on identifying cyber crime activity and the response to these problems from both the private and public domains. Upon completion, students should be able to accurately describe and define cyber crime activities and select an appropriate response to deal with the problem.
Lec | Lab | Clinic | Credit |
---|---|---|---|
3 | 0 | 0 | 3 |
Co-Requisites
None
Pre-Requisites
None
Computer Crime Investigation
This course introduces the fundamental principles of computer crime investigation processes. Topics include crime scene/incident processing, information gathering techniques, data retrieval, collection and preservation of evidence, preparation of reports and court presentations. Upon completion, students should be able to identify cyber crime activity and demonstrate proper investigative techniques to process the scene and assist in case prosecution.
Lec | Lab | Clinic | Credit |
---|---|---|---|
3 | 2 | 0 | 4 |
Co-Requisites
None
Pre-Requisites
None
Data Recovery Techniques
This course introduces the unique skills and methodologies necessary to assist in the investigation and prosecution of cyber crimes. Topics include hardware and software issues, recovering erased files, overcoming encryption, advanced imaging, transient data, Internet issues and testimony considerations. Upon completion, students should be able to recover digital evidence, extract information for criminal investigation and legally seize criminal evidence.
Lec | Lab | Clinic | Credit |
---|---|---|---|
2 | 3 | 0 | 3 |
Co-Requisites
None
Pre-Requisites
None
Network Vulnerabilities I
This course introduces students to penetration testing, network vulnerabilities, and hacking. Topics include an overview of traditional network security, system hardening, and known weaknesses. Upon completion, students should be able to evaluate weaknesses of traditional and wireless network for the purpose of incident response, reconstruction, and forensic investigation.
Lec | Lab | Clinic | Credit |
---|---|---|---|
2 | 2 | 0 | 3 |
Co-Requisites
None
Pre-Requisites
None