| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

Advanced Technical Certificate in Cybersecurity and Cyberforensics

This version was saved 9 years, 2 months ago View current version     Page history
Saved by Philip Craiger
on February 3, 2015 at 11:41:13 am
 

Mission:

The Advanced Technical Certificate in Cybersecurity and Cyberforensics program provides the student with an understanding of both technical and management aspects of computer and network security and forensics using exposition of theory, laws, and technical forensic and security tools and techniques. Students are exposed to hands-on projects where they are required to combine theory, legal issues, and technical knowledge to solve real-world problems. The program incorporates innovative, tested methods of instruction with hands-on lab work to encourage student learning and success.

 

Description:

This program consists of 18 credits leading towards requirements for proficiency in protection and analysis of computer and network systems security and forensics. The program fulfills a critical need for IT professionals with expertise in cybersecurity and cyberforensics. 

 

Courses:

CTS 3348 Linux Administration (online, 3 credits) (web site)

CET 4663 Computer and Network Security (online, 3 credits) (web site)

CET 4860 Introduction to Digital Forensics (online, 3 credits) (web site)

CET 4861 Advanced Digital Forensics (online, 3 credits) (web site)

CET 4862 Network Forensics and Incident Response (online, 3 credits) (web site)

CET 4884 Security Methods and Practices (online, 3 credits)

 

Objectives
Graduates of the program will be able to:
1. Conduct a password audit.
2. Design a password security policy.
3. Identify elements of security policy.
4. Design and implement a firewall based on security risk management and policies.
5. Design and implement an intrusion detection system based on security policies.
6. Use cryptography and cryptographic protocols.
7. Identify anomalous network packets.
8. Create and verify a forensic image.
9. Recover evidence in a forensically sound manner.
10. Validate forensic tools.
11. Identify and manage computer and network incidents.
12. Use cryptography and cryptographic protocols.
13. Identify the function and purpose of malware.
14. Conduct a static and dynamic analysis of malware.
15. Conduct a hash analysis for known files.
16. Identify evidence of a server intrusion.
.
 

Note: The length of this program makes it ineligible for federal and state financial aid.

Comments (0)

You don't have permission to comment on this page.