Digital Forensics

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

The Digital Forensic specialization focuses on demonstrating the required skill set of a Computer Forensic Investigator. Through this specialization, you will learn the various aspects of digital forensics, including investigating network intrusions and mobile forensics. With this specialization, you would qualify as a Digital Forensic Investigator with the government at any level, as well as private industry––both on or leading an incident response team.

Job Roles

  • Forensic Analyst
  • Cyber Crime Investigator
  • Cyber Defense Forensics Analyst
  • Incident Responder
  • Chief Information Security Officer
  • Information Security Officer
  • Chief Security Officer
  • Information Assurance Security Officer

Course Description

ECCU 505 Introduction to Research and Writing for the IT Practitioner

Three Credit Hours

This foundational core course introduces students to basic English writing skills and research methods, including APA style writing, citing sources, determining when a website is credible, effective communication, outlines, and collaboration. Students will write/present portions of the above in the course in various formats.

MGMT 502 Business Essentials

Three Credit Hours

This course will lay a broad foundation of understanding the processes of global business principles for a varied population of students who work in businesses of all kinds, including the IT and IA fields. It covers the latest changes in Information Technology for Business, including computer-aided manufacturing (CAM), application software, and recent ethical issues arising from IT. Real-life business examples are added throughout the course that reinforce the business principles.

ECCU 504 Foundations of Organizational Behavior for the IT Practitioner

Three Credit Hours

This foundational course deals with organizational behavior and allows the technology practitioner to experience the basic facets of organizational theory and define the skills required to understand and apply the theory to a real organizational setting. Elements of the course are organizational structure, effective communication, team building, ethics, and project management as seen through the organizational lens.

ECCU 516 The Hacker Mind: Profiling the IT Criminal

Three Credit Hours

Cyberspace has increased human communication, connectivity, creativity, capacity, and crime by leaps and bounds in the last decade. For all the positive aspects it offers, it offers as many negative aspects. Those negative aspects are explored and developed by everyone from the high school challenge hacker to an international terrorist. The IT criminal threatens businesses, governmental agencies, militaries, and organizations of every kind. This course will survey the spectrum of psychological attributes that may make up the profile of the IT criminal.

ECCU 514 Quantum Leadership

Three Credit Hours

This course encompasses an extensive research project about cross-cultural differences in leadership conducted by a group of researchers in 62 countries. It lays a foundation for understanding the process of leadership. The study describes the roles, functions, and impact of global leadership concepts. Many team exercises provide the speed at which leaders must work. Research and views into how most cultures respond to this area of management are provided.

ECCU 500 Managing Secure Network Systems

Three Credit Hours

This course focuses on evaluating network and Internet security issues, designing and implementing successful security policies and firewall strategies, and exposing the system and network vulnerabilities and defending against them. Topics include network protocols, network attacks, intrusion detection systems, packet filtering and proxy servers, Bastion hosts and honey pots, hardening routers, hardening security, email security, virtual private networks and creating fault tolerance.

ECCU 507 Linux Networking and Security

Three Credit Hours

This course focuses on configuring a secure Linux network using the command line and graphical utilities. Emphasis is placed on file-sharing technologies such as the Network File System, NetWare’s NCP file sharing, and File Transfer Protocol. Additional topics include making data secure, user security, file security, and network intrusion detection. Students will be required to take on the role of problem solvers and apply the concepts presented to situations that might occur in a work environment.

ECCU 501 Ethical Hacking & Countermeasures

Three Credit Hours

This course focuses on how perimeter defenses work, how intruders escalate privileges, and methods of securing systems. Additional topics include intrusion detection, policy creation, social engineering, DoS attacks, buffer overflows, and virus creation.

ECCU 502 Investigating Network Intrusions and Computer Forensics

Three Credit Hours

This course focuses on cyber-attack prevention, planning, detection, and incident response with the goals of counteracting cybercrime, cyber terrorism, and cyber predators, and making them accountable. Additional topics include fundamentals of computer forensics, forensic duplication and analysis, network surveillance, intrusion detection and response, incident response, anonymity, computer security policies and guidelines, and case studies.

ECCU 521: Advanced Mobile Forensics and Security

Three Credit Hours

This course focuses on the intricacies of manual acquisition (physical vs. logical) and advanced analysis using reverse engineering to understand how popular Mobile OSs are hardened to defend against common attacks and exploits. Topics include mobile forensic challenges and processes, mobile hardware design and architectures, OS architecture, boot process, file systems, threats and security, evidence acquisition and analysis, application reverse engineering, and mobile forensics reporting and expert testimony.

ECCU 517 Cyber Law

Three Credit Hours

This course focuses on the legal issues affected by online criminal conduct and electronic evidence and the legal ramifications of neglecting trademarks, copyrights, patents, and digital rights. Topics include laws, regulations, and international standards; privacy laws governing law enforcement investigations in cyberspace; implications of cybercrimes upon the traditional notions of sovereignty; and current events that affect cyber laws. Prerequisite ECCU 505.

Student Ratings & Reviews

No Review Yet
No Review Yet

Want to receive push notifications for all major on-site activities?