Computer Forensics Minor
(for all majors)
Computer forensics involves the identification, preservation, extraction, interpretation and the documentation of digital evidence in criminal and civil investigations. It is an interdisciplinary minor developed and administered jointly by the Lee Gildart and Oswald Haase School of Computer Sciences and Engineering and the School of Criminal Justice, Political Science and International Studies. The minor, consisting of 15 credits, is designed to provide students with a blend of theory and practice in six interdisciplinary-specific courses – three from each school. This minor will provide students with a strong foundation in the knowledge, understanding and competencies sought by prospective employers in the area of computer forensics.
CRIM2218 Comp Tech Cyber Crime (J. Burke) (Fall/Spring)
INFO1101 Comp Concepts Technology (Fall)
CRIM3327 File System Forensic Inv (J Morgan) (Fall)
INFO4101 Data Communication computer networks (Fall)
Select one below
CRIM4010 Computer Forensic Software/Hardware (J. Morgan) (Spring)
INFO4410 Foundations of Cyber Security (Spring)
CRIM2218 This course introduces students to the use and application of computer, digital, and information technologies within the fields of criminal justice and security. Topics will examine the use of computer and related technologies in committing crimes and conducting criminal investigations, including intelligence gathering, crime-mapping and analysis, predictions, biometric and biological (DNA) identification, and personnel management and administration. It will also examine the motives of the cyber offender, the forensic analysis of a computer to assist in the development of a suspect?s psychological profile, the role of the computer forensics in investigations, and the protection and processing of digital data and computer crime scenes.
CRIM3327 This course is designed to introduce students to computer file system storage, analysis, and retrieval. It provides an overview of computer foundations and associated investigative techniques beginning with an illustrated overview of contemporary volume and file systems, namely, crucial information for discovering hidden evidence, recovering deleted data, and validating computer forensic tools. Students will investigate and describe data structures, analyze examples of disk images, provide advanced investigation scenarios, and use today?s most valuable open source file system analysis tools.
CRIM4010 This course examines the skills necessary to launch and complete a successful computer forensic investigation utilizing the latest software and hardware applications. Students will learn how to conduct high-tech investigations, from acquiring digital evidence to reporting its findings. This course further highlights the objectives of the International Association of Computer Investigative Specialists (IACIS) certification to provide credible, standards-based information.
INFO1101 This course introduces the concepts of computer hardware organization and operating systems. A survey of various operating systems including Windows Mac-OS, Unix, Sun-OS, and Linux is conducted. Students learn about the current development of computers. Topics covered include Boolean algebra, digital system design, buses and addressing, memory systems, microprocessors, computer peripherals, interfacing techniques, and performance evaluation.
INFO4101 This course provides a comprehensive overview of data communications and computer networks, with emphasis on network simulation and network protocols. The topics to be covered include network components and model, network services and applications, network transport architectures, routing and switching, local area networks, mobile networks and network security and management. Integrated laboratory experience.
INFO4410 The topic of Information Assurance and Security (IAS) has become of increasing Importance as computer systems are being subjected to continuous and more sophisticated attacks. This course presents an introduction to the application and management of mechanism for cyber security and information assurance in computing, communication, and organizational systems. Topics covered include malware and social engineering, vulnerability assessments, network security, authentication, basis cryptography, and risk analysis.