Let's Stop Cybercriminals

What is Computer Forensics?

Enjoy watching CSI: Miami or CSI: New York? Then you will like Computer Forensics (CF) because it is CSI Computers. Computer forensics is a discipline in forensics science that combines elements of law and information technology to collect and analyze data from computer systems, networks, wireless communications, and storage devices in a way that is admissible as evidence in a court of law. Computer forensics is also the process of using scientific knowledge for collecting, analyzing, and presenting digital evidence to the courts.

Graduates from the Computer Forensics track will possess the knowledge of systems, investigative techniques, and technical and presentation skills to produce and present digital evidence for investigation and legal proceedings. These skills will meet the strong demands in security and computer forensics from public and private organizations.

What Career Paths can I go into?

With the increasing use of computers to commit crimes and growing demand for computer-based data in civil proceedings, a need has rapidly developed for forensic experts to extract useful information from computer evidence. Both industry and government are eagerly seeking out job candidates with computer forensics and security skills. The Computer Forensics track prepares students for careers as computer forensics experts.

Students graduating from CF track can expect to find jobs in businesses and government agencies. Students may assume a job title like Computer Forensics Examiner, Computer Forensics Analyst, Cybersecurity Consultant, e-Discovery Project Manager, IT Security Administrator, and eventually Chief Security Officer.

Advising Notes

College of Management students should see general advising from the University Advising Center until they have earned 60 credits and selected a track. Students seeking advising regarding track courses should see a faculty mentor for their chosen track (names available in the College advising offices respectively). Advising for degree exceptions and policy overrides should go through the advising office for the College in which the student is enrolled (CM students should go to M-5- 610), as appropriate.

Students should plan to take the track courses over the course of two years (four semesters) to ensure a wide selection of required and elective courses in the concentration. Some track courses may be offered once a year and are subject to sequencing due to pre-requisites, making this time allowance necessary.

The pre-requisites for these courses are strictly enforced; students should plan their schedule early and carefully.

Take five of the following six courses:

This course covers topics related to computer forensics and criminal justice and is, by its nature, a multi-disciplinary course. Forensics is the use of science in a course of law. Computer Forensics and this course looks specifically at how one obtains evidence off of a computer, other digital devices and from network messages and logs, preserving the evidentiary chain, and the legal aspects of the search and seizure of computers and related equipment/information.

Pre-requisites IT110 or MSIS110 or permission of instructor

This course is designed to expose students to advanced concepts in digital/computer forensic analysis. As with Computer Forensics I, there will be a balance between legal and technical aspects, although this course will focus more on the use of specific tools. For example the students will practice Disk and other digital device analysis using professional proprietary widely-used software tools such as Encase.

Pre-requisites IT110 or MSIS110 or permission of instructor

This course deals with the collection, preservation, and analysis of network generated digital evidence such that this evidence can be successfully presented ina court of law (both civil and criminal). The course provides a comprehnsive understanding of network forensic analysis principles as well as an introduction to mobile (i.e. Cell-phone/PDA) forensics. Within the context of forensics security, network infrastructures, topologies, and protocols are introduced. Students will understand, learn, and experience the relationship between forensic analysis and network security technologies.

This course provides an introduction to advanced digital forensics topics relating to malicious software (malware) and its analysis. Malware (virus, worms, rootkits, spam...) represents an increasing information security threat to computer systems and networks. Students will review software engineering design fundamentals and reverse engineering techniques utilized to conduct static and dynamic forensic analysis on computer systems and networks on multiple platforms (e.g.Windows, Linux..). Students will learn about the importance of forensic principles, legal considerations, digital evidence controls, and documentation of forensic procedures in the context of malware. In addition, students will study remediation measures for malware infection.

Pre-requisites MSIS110 or IT110 and IT244

This course introduces students to the social scientific study of crime and criminal justice systems through a sociological perspective. Topics covered will include theories of the causes of crime; the structure and function of the police, courts, and correctional systems; and the experiences of people who are processed through the justice system. Special attention will be paid to controversial issues and public policy debates, and students will consider proposals for criminal justice reform. Students will also consider the relationships between criminal justice systems and society.

This course provides an overview of cybercrime and related criminal justice system responses. Topics covered will include the types and extent of cybercrimes, how law enforcement officers respond to these crimes, the constitutional rights of computer users, the law and policies that govern cybercrime detection and prosecution, and the technologies used by law enforcement in the pursuit of cybercriminals. Special attention will be paid to the rapidly changing role of technology in society, and the ways the technological advances challenge traditional understands of deviance and privacy.

Pre Requisites: Pre-requisite: SOCIOL 101