Course Criteria

Add courses to your favorites to save, share, and find your best transfer school.
  • 3.00 Credits

    This hands-on introductory course provides students with the knowledge and skills necessary to begin a computer-based investigation. The course begins with an overview of computer forensics and then proceeds to introduce forensics tools, concepts, and documentation of evidence/procedures. The course uses common and accepted Incident Response Policies and Procedures for previewing and securing digital evidence. Topics include: (1) Learn "What exactly are computer forensics and computer evidence?" (2) Learn basic forensic methodology: a) how to acquire the evidence without altering or damaging the original, b) how to authenticate the recovered evidence, and c) how to analyze the data without modifying it.
  • 3.00 Credits

    This hands-on intermediate course provides students with the knowledge and skills necessary to begin a digital investigation centered around a mobile device. The course begins with an overview of common security issues associated with mobile devices and explains how they relate to digital forensics. The course proceeds to introduce digital forensics tools, concepts, and industry accepted best practices for proper evidence collection, analysis and reporting.
  • 3.00 Credits

    Advanced mobile and IoT forensics will build upon the student's basic knowledge gained from prior forensic courses by analyzing data from mobile devices and IoT devices with forensic programs used in prior courses (Magnet AXIOM) and introduce open source forensic suites such as Autopsy. Instruction in this course will introduce students to advanced mobile artifacts that relate to common data used in criminal and civil cases such as GPS and pattern of life databases and files. Students will also use mobile device emulators to test unknown apps and discover their behavior without modifying data from the original evidence source. Finally, students will process data from IoT devices and identify artifacts that could be useful to investigators while using methods to properly verify the data and accurately report their findings. Both Windows and Linux operating systems will be used for this course.
  • 3.00 Credits

    This hands-on introductory course provides students with the knowledge and skills necessary to begin a computer-based investigation. The course begins with an overview of computer forensics concepts, terminology and management of digital evidence. This is followed by the identification, collection and preservation (first responder) of computer-related and other digital evidence, digital evidence acquisition and basic forensic analysis concepts. Best practices for Incident Response Policies and Procedures for previewing and securing digital evidence are studied. The terms "computer forensics" and "computer evidence" will be explained and students will examine the following basic forensic methodology: a) how to acquire the evidence without altering or damaging the original, b) how to authenticate the recovered evidence, and c) how to analyze the data without modifying it.
  • 3.00 Credits

    This course teaches the core principles associated with several aspects of malware analysis. The course covers both basic and advanced static malware analysis techniques as well as basic and advanced dynamic malware analysis techniques. Various forms of malware will be discussed and analyzed during the class including executable files, PDF documents and data link libraries. Both Windows and Linux operating systems will be utilized during the analysis of the malware samples. Through readings, discussions and hands-on labs using real-world sample files, the students will gain topical and pertinent experience in the field of malware analysis.
  • 3.00 Credits

    This course will help students build a security policy and SOP for an organization which is implementing a new network and web infrastructure. Topics include the following: Security Education and Advisory, Risk Management, Threats to IT Assets, Encryption (an expansion of SEC 310), Standards and Compliance, and Security Testing and Implementation.
  • 3.00 Credits

    This course will expand upon SEC 250 and will leave a student with a complete understanding of the steps necessary to protect an organization from an attack or disaster. Topics include the following: Data Backup and archiving, Retrieval methods, Log Analysis, Error Checking and Integrity Analysis. Also covered in this course is Disaster Recovery. Students will be asked to develop a Disaster Recovery Plan keeping in mind the risk assessment, location, network, computer, financial and power constraints necessary to develop an efficient DRP for an organization.
  • 3.00 Credits

    The course aims to equip students with the technical skills necessary to identify, exploit and fix vulnerabilities in computer systems and networks. As a result, students would become more effective in defending their computing environments against the damaging work of hackers. While learning about the technical and legal dimensions of the hands-on tasks conducted, students get to perform penetration testing on multiple operating systems spanning Unix/LINUX and Microsoft Windows networks using ethical hacking techniques. With students working with tools like Backtrack and others, topics covered include Ethical Hacking Overview, Network & Computer Attacks, Footprinting, Social Engineering, Port Scanning, Enumeration, Linux Operating System Vulnerabilities, Hacking Web Servers, Hacking Wireless Networks and more.
  • 3.00 Credits

    This course builds on Introduction to Network Management to develop an understanding of advanced networking management and Management Information Systems, MIS. Students will design and maintain their own corporate network configuration. Topics will be covered in a theoretical and practical way. There is a large component of hands-on computer work. Students will practice network theory, hardware selection and upgrading, operating systems, platforms, programming languages, batch control, shared resources, security systems, anti-virus procedures, and specific manufacturers' methodology.
  • 3.00 Credits

    This hands-on intermediate course provides students with the knowledge and skills necessary to begin a digital investigation centered on network devices and associated network traffic. The course begins with a review of common network topologies and protocols. The course proceeds to introduce industry-accepted tools and techniques used to identify and acquire digital evidence residing or in transmission on a network. The course concludes with a primer on several data exfiltration techniques used by criminals during network intrusions and data theft.
To find college, community college and university courses by keyword, enter some or all of the following, then select the Search button.
(Type the name of a College, University, Exam, or Corporation)
(For example: Accounting, Psychology)
(For example: ACCT 101, where Course Prefix is ACCT, and Course Number is 101)
(For example: Introduction To Accounting)
(For example: Sine waves, Hemingway, or Impressionism)
Distance:
of
(For example: Find all institutions within 5 miles of the selected Zip Code)
Privacy Statement   |   Terms of Use   |   Institutional Membership Information   |   About AcademyOne   
Copyright 2006 - 2024 AcademyOne, Inc.