|
|
|
|
|
|
|
Course Criteria
Add courses to your favorites to save, share, and find your best transfer school.
-
3.00 Credits
This course is designed to introduce and apply financial investigative techniques to the detection and resolution of criminal activity. It includes an in-depth discussion of financial investigative approaches, law and legal concepts guiding criminal prosecutions in the United States, concepts of evidence and procedure, the movement of money through financial institutions, tracing money through a business including discussions of business organization and accounting systems, various methods of tracing funds and interviewing techniques used in these investigations.
-
3.00 Credits
This course is designed to introduce students to the concepts of intellectual property and proprietary interests. The laws, tools and techniques needed to establish, monitor, and maintain information security will be examined. Prerequisite: Upper division status or permission of the department.
-
3.00 Credits
This course is designed to introduce students to the intelligence process and its role in research and criminal investigations. Using analytic and database software, students will apply the intelligence process to basic research on topics in economic crime investigation, criminal justice and business. The course will culminate with students presenting their research on an assigned topic in both written and oral formats.
-
3.00 Credits
This course will focus on the protection of the Confidentiality, Integrity, and Availability of information. Physical security and other security management topics will be discussed as they pertain to computer and network security. The identification and authentication of users and types of authentication will be covered. Lectures will include the discussion of formal security models and associated access controls. An emphasis will be placed on network security technologies including: firewalls/packet filtering and intrusion detection systems, business continuity planning/disaster recovery and the importance of logs and audits will also be covered.
-
3.00 Credits
Economic Crime Investigation focuses on those complex crimes designed to bring financial rewards to the offender. The course will examine substantive and procedural law affecting financial institutions, commercial businesses and their agents and employees in relation to economic and business-related crimes. This course will identify criminal statutes and case law applicable to economic crimes, and through a study of these will give students a thorough knowledge of the elements required to successfully identify, investigate and prosecute economic crimes.
-
3.00 Credits
The media reports terrorist attacks on computer centers, electronic fraud on international funds transfer networks, viruses and worms in software and e-mail, corporate espionage on business networks, and crackers breaking into systems on the Internet. Computer criminals are becoming ever more technically sophisticated, and it’s an increasing challenge to keep up with their methods. This course will focus on computer crimes: what they are, how to prevent them, and how to detect, investigate and prosecute them if they do occur. Computer crime laws will also be covered. Other topics will include evidence collection during a computer crime investigation as well as the preparation and execution of a search warrant.
-
3.00 Credits
A police officer makes a gruesome discovery, a body is found. Located near the corpse is a cellular telephone, a digital camera and a computer. The officer is unsure on how to proceed. On the other side of town, a search warrant of a business is being conducted. A server and the computers networked to it are believed to contain the evidence of a crime. The detectives are trying to decide on what to seize and how to take it. More and more crimes involve digital evidence that requires seizing, imaging and analysis. The evidence needs to be reviewed for possible investigative leads and for possible presentation in court. This course will focus on how to properly seize, image and examine digital evidence. It will include creating and verifying the duplicate image of digital evidence, analyzing the data to locate evidence, and recovering evidence.
-
3.00 Credits
Intelligence led policing and intelligence based investigative strategies are coming to the forefront of law enforcement. Private industry is also becoming increasingly aware of the strategic intelligence model as it applies to corporate planning, competitive practices and maintaining corporate integrity. This course is designed to introduce students to several key software tools that are widely used and considered essential for intelligence research and criminal investigations. These software tools will include, but not be limited to, Analyst Notebook, iBase, and Idea. Students will be given a thorough understanding of how to apply these tools in the course of the intelligence process and /or during the course of a criminal investigation. The course will culminate with students preparing a project using all the software tools introduced during the course
-
-
3.00 Credits
In this course, the key terms, concepts and principles of cryptography are defined and explained. Application of cryptographic techniques to ensure confidentiality, integrity, authentication, access control, and non-repudiation issues will also be covered. Other topics will include the history of classical cryptographic and cryptanalytic techniques, modern symmetric and asymmetric algorithms, Federal Information Processing Standard (FIPS) algorithms, random and pseudorandom number generators and cryptographic hash functions. Issues involving cryptographic application at various OSI layers in networking communications will also be discussed.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Privacy Statement
|
Terms of Use
|
Institutional Membership Information
|
About AcademyOne
Copyright 2006 - 2025 AcademyOne, Inc.
|
|
|