[PORTALNAME]
Toggle menu
Home
Search
Search
Search Transfer Schools
Search for Course Equivalencies
Search for Exam Equivalencies
Search for Transfer Articulation Agreements
Search for Programs
Search for Courses
PA Bureau of CTE SOAR Programs
Transfer Student Center
Transfer Student Center
Adult Learners
Community College Students
High School Students
Traditional University Students
International Students
Military Learners and Veterans
About
About
Institutional information
Transfer FAQ
Register
Login
Course Criteria
Add courses to your favorites to save, share, and find your best transfer school.
SEC 350: Introduction Computer Forensics
3.00 Credits
Wilmington University
This hands-on introductory course provides students with the knowledge and skills necessary to begin a computer-based investigation. The course begins with an overview of computer forensics and then proceeds to introduce forensics tools, concepts, and documentation of evidence/procedures. The course uses common and accepted Incident Response Policies and Procedures for previewing and securing digital evidence. Topics include: (1) Learn "What exactly are computer forensics and computer evidence?" (2) Learn basic forensic methodology: a) how to acquire the evidence without altering or damaging the original, b) how to authenticate the recovered evidence, and c) how to analyze the data without modifying it.
Share
SEC 350 - Introduction Computer Forensics
Favorite
Show comparable courses
SEC 355: Mobile Device Security and Forensics
3.00 Credits
Wilmington University
This hands-on intermediate course provides students with the knowledge and skills necessary to begin a digital investigation centered around a mobile device. The course begins with an overview of common security issues associated with mobile devices and explains how they relate to digital forensics. The course proceeds to introduce digital forensics tools, concepts, and industry accepted best practices for proper evidence collection, analysis and reporting.
Share
SEC 355 - Mobile Device Security and Forensics
Favorite
Show comparable courses
SEC 360: Advd Mobile and IoT Forensics
3.00 Credits
Wilmington University
Advanced mobile and IoT forensics will build upon the student's basic knowledge gained from prior forensic courses by analyzing data from mobile devices and IoT devices with forensic programs used in prior courses (Magnet AXIOM) and introduce open source forensic suites such as Autopsy. Instruction in this course will introduce students to advanced mobile artifacts that relate to common data used in criminal and civil cases such as GPS and pattern of life databases and files. Students will also use mobile device emulators to test unknown apps and discover their behavior without modifying data from the original evidence source. Finally, students will process data from IoT devices and identify artifacts that could be useful to investigators while using methods to properly verify the data and accurately report their findings. Both Windows and Linux operating systems will be used for this course.
Share
SEC 360 - Advd Mobile and IoT Forensics
Favorite
SEC 370: Computer Incident Response Course
3.00 Credits
Wilmington University
This hands-on introductory course provides students with the knowledge and skills necessary to begin a computer-based investigation. The course begins with an overview of computer forensics concepts, terminology and management of digital evidence. This is followed by the identification, collection and preservation (first responder) of computer-related and other digital evidence, digital evidence acquisition and basic forensic analysis concepts. Best practices for Incident Response Policies and Procedures for previewing and securing digital evidence are studied. The terms "computer forensics" and "computer evidence" will be explained and students will examine the following basic forensic methodology: a) how to acquire the evidence without altering or damaging the original, b) how to authenticate the recovered evidence, and c) how to analyze the data without modifying it.
Share
SEC 370 - Computer Incident Response Course
Favorite
Show comparable courses
SEC 375: Malware Analysis Techniques
3.00 Credits
Wilmington University
This course teaches the core principles associated with several aspects of malware analysis. The course covers both basic and advanced static malware analysis techniques as well as basic and advanced dynamic malware analysis techniques. Various forms of malware will be discussed and analyzed during the class including executable files, PDF documents and data link libraries. Both Windows and Linux operating systems will be utilized during the analysis of the malware samples. Through readings, discussions and hands-on labs using real-world sample files, the students will gain topical and pertinent experience in the field of malware analysis.
Share
SEC 375 - Malware Analysis Techniques
Favorite
SEC 410: Web and Data Security
3.00 Credits
Wilmington University
This course will help students build a security policy and SOP for an organization which is implementing a new network and web infrastructure. Topics include the following: Security Education and Advisory, Risk Management, Threats to IT Assets, Encryption (an expansion of SEC 310), Standards and Compliance, and Security Testing and Implementation.
Share
SEC 410 - Web and Data Security
Favorite
Show comparable courses
SEC 420: Data Integrity and Disaster Recovery
3.00 Credits
Wilmington University
This course will expand upon SEC 250 and will leave a student with a complete understanding of the steps necessary to protect an organization from an attack or disaster. Topics include the following: Data Backup and archiving, Retrieval methods, Log Analysis, Error Checking and Integrity Analysis. Also covered in this course is Disaster Recovery. Students will be asked to develop a Disaster Recovery Plan keeping in mind the risk assessment, location, network, computer, financial and power constraints necessary to develop an efficient DRP for an organization.
Share
SEC 420 - Data Integrity and Disaster Recovery
Favorite
Show comparable courses
SEC 425: Ethical Hacking
3.00 Credits
Wilmington University
The course aims to equip students with the technical skills necessary to identify, exploit and fix vulnerabilities in computer systems and networks. As a result, students would become more effective in defending their computing environments against the damaging work of hackers. While learning about the technical and legal dimensions of the hands-on tasks conducted, students get to perform penetration testing on multiple operating systems spanning Unix/LINUX and Microsoft Windows networks using ethical hacking techniques. With students working with tools like Backtrack and others, topics covered include Ethical Hacking Overview, Network & Computer Attacks, Footprinting, Social Engineering, Port Scanning, Enumeration, Linux Operating System Vulnerabilities, Hacking Web Servers, Hacking Wireless Networks and more.
Share
SEC 425 - Ethical Hacking
Favorite
Show comparable courses
SEC 435: Advanced Network Management
3.00 Credits
Wilmington University
This course builds on Introduction to Network Management to develop an understanding of advanced networking management and Management Information Systems, MIS. Students will design and maintain their own corporate network configuration. Topics will be covered in a theoretical and practical way. There is a large component of hands-on computer work. Students will practice network theory, hardware selection and upgrading, operating systems, platforms, programming languages, batch control, shared resources, security systems, anti-virus procedures, and specific manufacturers' methodology.
Share
SEC 435 - Advanced Network Management
Favorite
Show comparable courses
SEC 440: Network Forensics
3.00 Credits
Wilmington University
This hands-on intermediate course provides students with the knowledge and skills necessary to begin a digital investigation centered on network devices and associated network traffic. The course begins with a review of common network topologies and protocols. The course proceeds to introduce industry-accepted tools and techniques used to identify and acquire digital evidence residing or in transmission on a network. The course concludes with a primer on several data exfiltration techniques used by criminals during network intrusions and data theft.
Share
SEC 440 - Network Forensics
Favorite
Show comparable courses
First
Previous
121
122
123
124
125
Next
Last
Results Per Page:
10
20
30
40
50
Search Again
To find college, community college and university courses by keyword, enter some or all of the following, then select the Search button.
College:
(Type the name of a College, University, Exam, or Corporation)
Course Subject:
(For example: Accounting, Psychology)
Course Prefix and Number:
(For example: ACCT 101, where Course Prefix is ACCT, and Course Number is 101)
Course Title:
(For example: Introduction To Accounting)
Course Description:
(For example: Sine waves, Hemingway, or Impressionism)
Distance:
Within
5 miles
10 miles
25 miles
50 miles
100 miles
200 miles
of
Zip Code
Please enter a valid 5 or 9-digit Zip Code.
(For example: Find all institutions within 5 miles of the selected Zip Code)
State/Region:
Alabama
Alaska
American Samoa
Arizona
Arkansas
California
Colorado
Connecticut
Delaware
District of Columbia
Federated States of Micronesia
Florida
Georgia
Guam
Hawaii
Idaho
Illinois
Indiana
Iowa
Kansas
Kentucky
Louisiana
Maine
Marshall Islands
Maryland
Massachusetts
Michigan
Minnesota
Minor Outlying Islands
Mississippi
Missouri
Montana
Nebraska
Nevada
New Hampshire
New Jersey
New Mexico
New York
North Carolina
North Dakota
Northern Mariana Islands
Ohio
Oklahoma
Oregon
Palau
Pennsylvania
Puerto Rico
Rhode Island
South Carolina
South Dakota
Tennessee
Texas
Utah
Vermont
Virgin Islands
Virginia
Washington
West Virginia
Wisconsin
Wyoming
American Samoa
Guam
Northern Marianas Islands
Puerto Rico
Virgin Islands