This course covers topics related to computer forensics and criminal justice and is, by its nature, a multi-disciplinary course. Forensics is the use of science in a course of law. Computer Forensics and this course looks specifically at how one obtains evidence off of a computer, other digital devices and from network messages and logs, preserving the evidentiary chain, and the legal aspects of the search and seizure of computers and related equipment/information.
Pre-requisites IT110 or MSIS110 or permission of instructor
Let's Stop Cybercriminals
What is Computer Forensics?
Enjoy watching CSI: Miami or CSI: New York? Then
you will like Computer Forensics (CF) because it is
CSI Computers. Computer forensics is a discipline
in forensics science that combines elements of law
and information technology to collect and analyze
data from computer systems, networks, wireless
communications, and storage devices in a way that
is admissible as evidence in a court of law.
Computer forensics is also the process of using
scientific knowledge for collecting, analyzing, and
presenting digital evidence to the courts.
Graduates from the Computer Forensics track will
possess the knowledge of systems, investigative
techniques, and technical and presentation skills
to produce and present digital evidence for
investigation and legal proceedings. These skills
will meet the strong demands in security and
computer forensics from public and private
organizations.
What Career Paths can I go into?
With the increasing use of computers to commit
crimes and growing demand for computer-based
data in civil proceedings, a need has rapidly
developed for forensic experts to extract useful
information from computer evidence. Both industry
and government are eagerly seeking out job
candidates with computer forensics and security
skills. The Computer Forensics track prepares
students for careers as computer forensics
experts.
Students graduating from CF track can expect to
find jobs in businesses and government agencies.
Students may assume a job title like Computer
Forensics Examiner, Computer Forensics Analyst,
Cybersecurity Consultant, e-Discovery Project
Manager, IT Security Administrator, and eventually
Chief Security Officer.
Advising Notes
College of Management students should see
general advising from the University Advising Center
until they have earned 60 credits and selected a
track. Students seeking advising regarding track
courses should see a faculty mentor for their
chosen track (names available in the College
advising offices respectively). Advising for degree
exceptions and policy overrides should go through
the advising office for the College in which the
student is enrolled (CM students should go to M-5-
610), as appropriate.
Students should plan to take the track courses over
the course of two years (four semesters) to ensure
a wide selection of required and elective courses in
the concentration. Some track courses may be
offered once a year and are subject to sequencing
due to pre-requisites, making this time allowance
necessary.
The pre-requisites for these courses are strictly
enforced; students should plan their schedule early
and carefully.
Take five of the following six courses:
This course is designed to expose students to advanced concepts in digital/computer forensic analysis. As with Computer Forensics I, there will be a balance between legal and technical aspects, although this course will focus more on the use of specific tools. For example the students will practice Disk and other digital device analysis using professional proprietary widely-used software tools such as Encase.
Pre-requisites IT110 or MSIS110 or permission of instructor
This course deals with the collection, preservation, and analysis of network generated digital evidence such that this evidence can be successfully presented ina court of law (both civil and criminal). The course provides a comprehnsive understanding of network forensic analysis principles as well as an introduction to mobile (i.e. Cell-phone/PDA) forensics. Within the context of forensics security, network infrastructures, topologies, and protocols are introduced. Students will understand, learn, and experience the relationship between forensic analysis and network security technologies.
This course provides an introduction to advanced digital forensics topics relating to malicious software (malware) and its analysis. Malware (virus, worms, rootkits, spam...) represents an increasing information security threat to computer systems and networks. Students will review software engineering design fundamentals and reverse engineering techniques utilized to conduct static and dynamic forensic analysis on computer systems and networks on multiple platforms (e.g.Windows, Linux..). Students will learn about the importance of forensic principles, legal considerations, digital evidence controls, and documentation of forensic procedures in the context of malware. In addition, students will study remediation measures for malware infection.
Pre-requisites MSIS110 or IT110 and IT244
This course introduces students to the social scientific study of crime and criminal justice systems through a sociological perspective. Topics covered will include theories of the causes of crime; the structure and function of the police, courts, and correctional systems; and the experiences of people who are processed through the justice system. Special attention will be paid to controversial issues and public policy debates, and students will consider proposals for criminal justice reform. Students will also consider the relationships between criminal justice systems and society.
This course provides an overview of cybercrime and related criminal justice system responses. Topics covered will include the types and extent of cybercrimes, how law enforcement officers respond to these crimes, the constitutional rights of computer users, the law and policies that govern cybercrime detection and prosecution, and the technologies used by law enforcement in the pursuit of cybercriminals. Special attention will be paid to the rapidly changing role of technology in society, and the ways the technological advances challenge traditional understands of deviance and privacy.
Pre Requisites: Pre-requisite: SOCIOL 101