See Course and Program Development Policy and Procedures Iwww.ubalt.edu/Provostl for instructions. C5)PROGRAM ACTIONS. Original Program ntle:

Size: px
Start display at page:

Download "See Course and Program Development Policy and Procedures Iwww.ubalt.edu/Provostl for instructions. C5)PROGRAM ACTIONS. Original Program ntle:"

Transcription

1 alb Document N: Course and Program Development: IMPACT AND APPROVAL SIGNATURES See Course and Program Development Policy and Procedures Iwww.ubalt.edu/Provostl for instructions. SCHOOL: o LAW OMSB o CAS (!)CPA CONTACT NAME: IDebra Stanley 1 PHONE: DEPARTMENT/DIVISION: ISchool of Criminal Justice IDATE PREPARED: 14/8/14 PROPOSED SEMESTER OF IMPLEMENTAnON: 0 fa" o spring YEAR: TYPE OF ACTION: o add (new) o deactivate modify o other LEVEL OF ACTION: o noncredit o undergraduate graduate o other ACTION BEING REQUESTED (select one category, either Course Actions or Program Actions): OCOURSE ACTIONS Original Subject Code/Course Number: eou...tltl., C5)PROGRAM ACTIONS Original Program ntle: Master of Science in ForensiC Science - High Technology Crime Select one or multiple actions from one of the lists below (review the list ofnecessary documents and signatures); I i I 1. Experimental Course 2. Course Title 3. Course Credits 4. Course Number S. Course level 6. Pre- and Co-Requisite 7. Course Description 8. New Course 9. Deactivate Course 22. Other ",.{ 10. Program Requirements lla. Undergraduate Specialization (24 credits or fewer) llb. Masters Specialization (12 credits or fewer) 11c. Doctoral Specialization (18 credits or fewer) 12. Minor (add or delete) i 13. Closed Site Program 14. Program Suspension! 15. Program Reactivation 16a. Certificate Program (UG/G) exclusively within existing degree program! 16b. Certificate Program (UG/G) outside of or across degree programs (12 or more credits) 17. Off-Campus Delivery of Existing Programs 18a. Undergraduate Concentration (exceeds 24 credits) 18b. Masters Concentration (exceeds 12 credits) 18c. Doctoral Concentration (exceeds 18 credits) 19. Program Title Change! 20. Program Termination 21. New Degree Program ~ 22. Other ADDITIONAL DOCUMENTATION (check all appropriate boxes of documents included; review the list ofnecessarv documents): \iii summary proposal (0) (J course definition document (P) (J full five-page MHEC proposal (Q) (J financial tables (MHEC) (R) (J other documents as may be required by MHEC/U5M (5) (J other (T) Summer

2 IMPACT REVIEW (review the list ofnecessary signatures): Q impact statement attached APPROVAL SEQUENCE (review the list ofnecessarv signatures): B. General Education (for No.7, 8) C. Final Faculty Review Body Within Each School (Chair) D.Dean E. University Faculty Senate (Chair) F. University Council (Chair)l G. Provost and Senior Vice President for Academic Affairs /L-- H. President I. Board of Regents (notification only) J. Board of Regents (approval) K. MHEC (notification only) L MHEC (approval) M. Middle States Association notification Required only if the University's mission is changed by the action 1 University Council review (for recommendation to the president or back to the provost) shall be limited to curricular or academic policy issues that may potentially affect the University's mission and strategic planning, or have a significant impact on the generation or allocation of its financial resources. Summer

3 Ub Document 0: Course and Program Development: SUMMARY PROPOSAL See Course and Program Development Policy and Procedures ( for instructions. SCHOOL: o LAW OMSB o CAS 0CPA CONTACT NAME: \ Debra Stanley I PHONE: \4l DEPARTMENT/DIVISION: Ischool of Criminal Justice IDATE PREPARED: 14/8/14 PROPOSED SEMESTER OF IMPLEMENTATION: o fall o spring YEAR: \2014 ACTION BEING REQUESTED (select one category, either Course Actions or Program Actions): o COURSE ACTIONS e PROGRAM ACTIONS Original Subject Code/Course Number:,CO T r , Original Program Title: Master of Science in Forensic Science - High Technology Crime Select one or multiple actionsfrom one ofthe lists below (review the list ofnecessarv documents and signatures}: I! 1. Experimental Course 2. Course Title 3. Course Credits 4. Course Number 5. Course Level 6. Pre- and Co-Requisite 7. Course Description 8. New Course 9. Deactivate Course 22. Other.. of 10. Program Requirements 11a. Undergraduate Specialization (24 credits or fewer) i 11b. Master's Specialization (12 credits or fewer) 11c. Doctoral Specialization (18 credits or fewer) 12. Minor (add or delete) 13. Closed Site Program 14. Program Suspension ls. Program Reactivation 16a. Certificate Program lug/g) exclusively within existing degree program 16b. Certificate Program lug/g) outside of or across degree programs (12 or more credits) 17. Off-Campus Delivery of Existing Programs 18a. Undergraduate Concentration (exceeds 24 credits) 18b. Master's Concentration (exceeds 12 credits) 18c. Doctoral Concentration (exceeds 18 creditsl 19. Program Title Change 20. Program Temninatlon I 21. New Degree Program I 22. Other -_..._--_..._- - For changes to existing courses: OLDmLE I SUBJECT CODE/COURSE No 1 ICREDITS IL--_...I?=======================~ NEwTrrLEIL- ~ SUBJECT CODE/COURSE No 1 ICREDITS _...1 Summer

4 DESCRIBE THE REQUESTED COURSE/PROGRAM ACTION (additional pages may be attached if necessary): Request that the requirements of the MSFS High Technology Crime program be decreased from 42 credits to 30 credits. The requested changes impact less than 33% of the total program requirements. The core courses will remain at 10 courses. The program changes would reduce the 42 credit program to 30 credits as a result of the following changes: 1) Eliminate the 3 course concentration requirements (-9 credits) 2) Reduce the three 4 credit courses to 3 credits (-3 credits) 3) Eliminate the 2nd section of Incident Response and now require Intro to Cryptanalysis 4) Merge course content from two of the concentration courses into two of the existing core courses 5) Integrate material from a 4th concentration course into all core courses. Two courses will integrate material from courses that are no longer required in the program. The two revised courses will require course description revisions, please see attached course curriculum forms. (Please see the attached document with a complete list of all courses in the revised program) SET FORTH THE RATIONALE FOR THIS PROPOSAL: The first year of administering this degree program has suggested a number of changes to improve the program. The proposed program changes will increase the efficiency of the program by consolidation of the appropriate courses and material. The program changes will simply the program schedule to enable students to complete the degree in two years. Students will be well prepared to move into high demand computer security positions within the federal, state, and local government, corporate security financial institutions and other security related positions. Summer

5 Impact Statement From the Office of University Relations Regarding Changes to Program Requirements for the M.S. in Forensic Science-High-Technology Crime General Impact: Please be advised that any programmatic changes are likely to affect recruitment and other publications as well as Web content produced and/or managed by the Office of University Relations that contain this type of specific academic information. Please inform Catherine Leidemer or ) of any proposed changes that receive final approval and of any planned implementation timelines. The timing of the final approval for these changes will be a determining factor in our ability to incorporate the new information in a timely fashion in any relevant materials that are on our production schedule. As a general guideline, the Office of University Relations should be notified of any programmatic changes to a scheduled recruitment publication at least two months prior to printing. Specific Feedback: These changes will require updates to the CPA website and to the graduate catalog in addition to any materials that academic advisers may use in advising students. Also, please consider whether or not these changes will impact any specific recruitment materials, and that information should be discussed with the Offices of Admission and with the Office of University Relations.

6 M.S. in Forensic Science - High Technology Crime Description of Program: The Forensic Science program in High Technology crime - housed in the School of Criminal Justice - leads to the Master of Science degree. The program is designed to provide students with a broad based practical understanding of high technology crimes. The core ofthe program exposes students to forensic investigation techniques and skills, computer and digital information crimes, fraudulent activities in financial and health systems, prevention and security management strategies, and legal interventions and resolutions. The degree is a uniquely defined area within the forensic discipline because of its emphasis on high technology crime, particularly that which occurs within the workplace. The program requires the successful completion of 10 core courses. Students will complete a required core of courses that examine the history, theory, and practical application of forensic investigations as it relates to high technology crimes. Students will acquire forensic investigations techniques and skills as they relate to computer and digital information crime, and financial and health care fraud. The proposed program, with its applied pedagogy, features interactive learning not replicable in a virtual environment. Students with a bachelor's degree in the areas of forensic science, criminal justice, science, health care management, nursing, business, and computer science may be interested in the professional pathways this program offers. Courses are taught in the forensic science laboratories. Courses will be taught at University of Baltimore campus locations in Downtown Baltimore. The program is intended for members of private corporations, nonprofit organizations, and governmental agencies who desire to advance their competencies in managing advanced technological resources to combat cyber threats, and related financial crime. It will qualify students for positions such as incident manager, information security manager, cyber investigator, forensic analyst, law enforcement, private investigator, corporate security manager, and fraud manager. If you have not worked in the field, you can gain valuable experience through an optional internship with a corporate or government entity partner.

7 Core Courses (30 credits) # Course Title Hrs. 1 FSCS 601 Legal Issues in High-Technology Crimes 3 2 FSCS 610 Identifying Organizational Liabilities and Crime 3 13 FSCS 615 Information Retrieval-:- {Paper and Electronic} 3 4 FSCS 620 Forensic Investigative Techniques I 3 5 FSCS 630 Introduction to Cryptanalysis 3 6 FSCS 720 Forensic Investigative Techniques II 3 7 FSCS 724 Protection of Data/Information 3 8 FSCS 727 Computer and Digital Forensics 3 9 FSCS 728 Information Systems, Threats, Attacks and Defense Strategies FSCS 730 Incident Responsej 3

8 Course Descriptions: FSCS 601 legal Issues in High Technology Crimes 3 credits Examines the general regulations, general and computer-related law, and ethics and business policies associated with high technology crime. Areas of major focus include description of legal issues facing management and administration, traditional search and seizure as well as privacy issues, manager and supervisor responsibilities, criminal issues and definitions, chain of custody and ethical considerations. Problem-oriented course that focuses on applying the holdings of cases and analyses of statutes to different criminal fact patterns. FSCS 610 Identifying Organizational liabilities and Crime 3 credits Defines problems, logic and theory, research protocols, personal and organizational risks, criminal and civil liabilities, physical security issues, due diligence matters, and environmental concerns and sexual harassment issues. Covers responsibilities of the organization and of the individual. prerequisite: FSCS 601 FSCS 615 Information Retrieval: Paper and Electronic 3 credits Explores gathering of information and data, evidence collection, storage and security of records, personnel records and related issues, privacy issues, security of customer information, duties and obligations of the information technology field. Also focuses on legal access to these records. lab Fees prerequisite: FSCS 601 FSCS 620 Forensic Investigative Techniques I 3 credits Focuses on traditional investigative techniques (interviews and interrogations), simple data collection, physical evidence, fraud detection, data acquisition and computer techniques, reverse engineering and industrial espionage. Also examines administrative process, the role of human resources and accounting, organizational processes and structures and chain of command/management. Intended as an introduction to FSCS 720. lab Fees. prerequisite: FSCS 601 FSCS630 Introduction to Cryptanalysis 3 credits Provides the historical basis for ciphers and encryption techniques and examines the use of codes in government and commercial applications. Also explores decryption techniques as applied to businesses and to government. lab Fees FSCS 720 Forensic Investigative Techniques II 3 credits A continuation of FSCS 620 with special attention on computer systems and network systems. prerequisite: FSCS 620 lab Fee required. prerequisite: FSCS 620

9 FSCS 724 Protection of Data/Information 3 credits Examines prevention of data/information loss by theft, intrusion and natural disaster and assessment of vulnerabilities and their remediation. Also presents protocols for security and for effective data storage and examines assessment of risk. lab Fees. prerequisite: FSCS 615 FSCS 727 Computer and Digital Forensics 3 credits Examines the use of specialized techniques for recovery, authentication and analysis ofelectronic data; reconstruction of computer usage; examination of residual data; and authentication of remaining data. Also, examines the effective manipulation of digital images from digital photographs and videotapes. Discusses identification of authenticity and detection of manipulation in addition to detection offraud and other criminal activity in these digital media. lab Fees. prerequisite: FSCS 601 FSCS 728 Information Systems, Threats, Attacks and Defense Strategies 3 credits Examines information systems and the threats from malicious activities that attempt to collect data from or disrupt, deny or destroy information within a system. Explores origins of such attacks and effective responses to threat. Also, examines the process of Steganography by which information is hidden within other media. Presents tools (software) to detect such hidden information, including files, images, network traffic, disks, etc., that masquerade within any system. Also presents the processes of hiding or encrypting data to inhibit a forensic analysis and of the detection and counter-resolution of hidden information. Lab Fees. prerequisites: FSCS 615 and FSCS 727 FSCS 730 Incident Response 3 credits Explores the development of effective responses to active attacks on computer systems and networks, coupled with analysis of the breakdown of protective measures. Examines the management of emergency situations arising from natural disasters or civil disorder and the development of proper planning. Provides training in the proper maintenance of computer systems and networks that involve both the technical and physical security of systems, physical plant and personnel. prerequisite: FSCS 724

Bachelor of Information Technology (Network Security)

Bachelor of Information Technology (Network Security) Course information for Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank Course Design The Bachelor of Information Technology (Network Security) is a three-year

More information

COMPUTER FORENSICS (CFRS)

COMPUTER FORENSICS (CFRS) Computer Forensics (CFRS) 1 COMPUTER FORENSICS (CFRS) 500 Level Courses CFRS 500: Introduction to Forensic Technology and Analysis. 3 credits. Presents an overview of technologies of interest to forensics

More information

PIONEER TRAINING INSTITUTE

PIONEER TRAINING INSTITUTE PIONEER TRAINING INSTITUTE CENTRE FOR DISTANCE & ONLINE LEARNING DIPLOMA IN SECURITY MANAGEMENT OUTLINE SECURITY MANAGEMENT STUDIES Pioneer Training Institute has specifically identified security management

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

Credit Card Data Compromise: Incident Response Plan

Credit Card Data Compromise: Incident Response Plan Credit Card Data Compromise: Incident Response Plan Purpose It is the objective of the university to maintain secure financial transactions. In order to comply with state law and contractual obligations,

More information

Subject: University Information Technology Resource Security Policy: OUTDATED

Subject: University Information Technology Resource Security Policy: OUTDATED Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

Blending Information Systems Security and Forensics Curricula

Blending Information Systems Security and Forensics Curricula Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2012 Proceedings Midwest (MWAIS) 5-2012 Blending Information Systems Security and Forensics Curricula Jason Ferguson Friends University,

More information

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018 STATE OF IOWA SEPTEMBER 12-13, 2018 REQUEST FOR NEW PROGRAM AT IOWA STATE UNIVERSITY: BACHELOR OF SCIENCE IN CYBER SECURITY ENGINEERING Contact: Rachel Boon Action Requested: Consider approval of the request

More information

CYBERSECURITY: Scholarship and Job Opportunities

CYBERSECURITY: Scholarship and Job Opportunities CYBERSECURITY: Scholarship and Job Opportunities Malware Invasion in Cyberspace Blackhole Malware Exploit Kit (2012) Shamoon Virus (2012) Stuxnet Worm (2010) Operation Aurora (2009) and many others Job

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) Information Systems and Tech (IST) 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey of

More information

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Short courses presented by the NWU Programme in Forensic Accountancy

Short courses presented by the NWU Programme in Forensic Accountancy Short courses presented by the NWU Programme in Forensic Accountancy Certificate in: Commercial Forensic Accounting Commercial Forensic Law Commercial Forensic Investigation Commercial Forensic Information

More information

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER. When Recognition Matters WHITEPAPER CLFE www.pecb.com CONTENT 3 4 5 6 6 7 7 8 8 Introduction So, what is Computer Forensics? Key domains of a CLFE How does a CLFE approach the investigation? What are the

More information

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program Detroit Mercy s Master of Science in Information Assurance with a major in Cybersecurity is a multi-disciplinary 30-credit-hour graduate degree. It is designed to produce a comprehensively knowledgeable

More information

Council on Rehabilitation Education Monitoring Committee Report

Council on Rehabilitation Education Monitoring Committee Report Council on Rehabilitation Education 2013-14 Monitoring Committee Report Institution: University of Kentucky File No. 033 Term of Accreditation: 2013-2021 CONDITIONS AND RECOMMENDATIONS: Conditions: 1.

More information

MODULE SPECIFICATIONS

MODULE SPECIFICATIONS S 1. Title of the module Leading Assurance Engagements PRSN7106 2. School or partner institution which will be responsible for management of the module 3. The level of the module (e.g. Level 4, Level 5,

More information

Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS

Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Optional for Reviews During the 2018-2019 Accreditation Cycle Mandatory for Reviews During the 2019-2020 Accreditation

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner Course Title: Certified Digital Forensics Examiner Duration: 5 days Class Format Options: Instructor-led classroom Live Online Training Prerequisites: A minimum of

More information

Certificate Assessment Plan: Graduate Certificates in Forensic Sciences, Clinical Toxicology and Pharmaceutical Chemistry

Certificate Assessment Plan: Graduate Certificates in Forensic Sciences, Clinical Toxicology and Pharmaceutical Chemistry Certificate Assessment Plan: Graduate Certificates in Forensic Sciences, Clinical Toxicology and Pharmaceutical Chemistry 2012-2013 Office of the Provost University of Florida Institutional Assessment

More information

UTAH VALLEY UNIVERSITY Policies and Procedures

UTAH VALLEY UNIVERSITY Policies and Procedures Page 1 of 5 POLICY TITLE Section Subsection Responsible Office Private Sensitive Information Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Information

More information

Program Approval Form

Program Approval Form For approval of new programs and deletions or X Program Approval Form modifications to an existing program. Action Requested: Type (Check one): Create New (SCHEV approval required except for minors) B.A.

More information

THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA. CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr.

THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA. CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr. THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr.FFa) BROCHURE Contents INTRODUCTION... 3 THE IICFA... 4 Basic Entry qualifications...

More information

FORM 7: Certificate Approval and Modification

FORM 7: Certificate Approval and Modification FORM 7: Certificate Approval and Modification Select Action: New Certificate Modify Existing Certificate Certificate Title: Certificate Level: Undergraduate Graduate College/School/Center or Department

More information

COWLEY COLLEGE & Area Vocational Technical School

COWLEY COLLEGE & Area Vocational Technical School COWLEY COLLEGE & Area Vocational Technical School COURSE PROCEDURE FOR Student Level: This course is open to students on the college level in either the freshman or sophomore year. Catalog Description:

More information

Section 1: Program Abstract

Section 1: Program Abstract Section 1: Program Abstract The Bachelor or Applied s ( ) degree provides students with a critical understanding of the complex and integrated and Communication Technology (ICT) security issues in todayʼs

More information

Cyber Risks in the Boardroom Conference

Cyber Risks in the Boardroom Conference Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks

More information

Legal, Ethical, and Professional Issues in Information Security

Legal, Ethical, and Professional Issues in Information Security Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN

More information

Academic Program Review Cyber Security College of Southern Nevada 2017

Academic Program Review Cyber Security College of Southern Nevada 2017 Academic Program Review Cyber Security College of Southern Nevada 2017 ACADEMIC EVALUATION WORKSHEET PROGRAM ASSESSMENT DATA Date Submitted: Submitted by: Margaret Taylor PROGRAM Assessment Data to be

More information

Program Outcomes and Assessment

Program Outcomes and Assessment Program Outcomes and Assessment Degree Program: Bachelor of Science - Information Technology (BSIT) Contact Person: Larry Booth Program Mission Statement: The IT Program (BIT, BSIT, CSCI) is committed

More information

MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015

MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015 MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015 CATALOG DESCRIPTION ONLINE EEGR.483 INTRODUCTION TO SECURITY MANAGEMENT CREDITS: 3 THIS COURSE IS A

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

CCISO Blueprint v1. EC-Council

CCISO Blueprint v1. EC-Council CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance

More information

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming

More information

Raksha Shakti University

Raksha Shakti University Raksha Shakti University Syllabus MASTER OF SCIENCE IN FORENSIC SCIENCE [Duration: Two years] 1 MASTER OF SCIENCE IN FORENSIC SCIENCE General Guidelines: The Programme shall be a two-year full time academic

More information

GRADUATE CURRICULUM COMMITTEE REPORT

GRADUATE CURRICULUM COMMITTEE REPORT GRADUATE CURRICULUM COMMITTEE REPORT Submitted to the Graduate Council November 15, 2016. For complete curriculum proposal information please see the University s Curriculum Proposal site: registrar.ilstu.edu/curriculumforms/

More information

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities

More information

Cyber Security Incident Response Fighting Fire with Fire

Cyber Security Incident Response Fighting Fire with Fire Cyber Security Incident Response Fighting Fire with Fire Arun Perinkolam, Senior Manager Deloitte & Touche LLP Professional Techniques T21 CRISC CGEIT CISM CISA AGENDA Companies like yours What is the

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Bachelor of Science in Information Technology BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Description and Outcomes The objective of the Bachelor of Science in Information Technology program is to help

More information

The CERT Top 10 List for Winning the Battle Against Insider Threats

The CERT Top 10 List for Winning the Battle Against Insider Threats The CERT Top 10 List for Winning the Battle Against Insider Threats Dawn Cappelli CERT Insider Threat Center Software Engineering Institute Carnegie Mellon University Session ID: STAR-203 Session Classification:

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

Unit code: D/601/1939 QCF Level 5: BTEC Higher National Credit value: 15

Unit code: D/601/1939 QCF Level 5: BTEC Higher National Credit value: 15 Unit 49: Digital Forensics Unit code: D/601/1939 QCF Level 5: BTEC Higher National Credit value: 15 Aim To provide learners with an understanding of the principles of digital forensics and the impact on

More information

The GenCyber Program. By Chris Ralph

The GenCyber Program. By Chris Ralph The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest

More information

NYDFS Cybersecurity Regulations

NYDFS Cybersecurity Regulations SPEAKERS NYDFS Cybersecurity Regulations Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 lsotto@hunton.com www.huntonprivacyblog.com March 9, 2017 The Privacy Team at Hunton & Williams Over 30 privacy

More information

Information Technology General Control Review

Information Technology General Control Review Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor

More information

E-guide Getting your CISSP Certification

E-guide Getting your CISSP Certification Getting your CISSP Certification Intro to the 10 CISSP domains of the Common Body of Knowledge : The Security Professional (CISSP) is an information security certification that was developed by the International

More information

Requirements for Forensic Photography & Imaging Certification (08/2017)

Requirements for Forensic Photography & Imaging Certification (08/2017) Requirements for Forensic Photography & Imaging Certification (08/2017) A. General Requirements 1. An applicant for certification must possess a high ethical and professional standing. 2. All applicants

More information

MASTER OF SCIENCE IN ACCOUNTANCY

MASTER OF SCIENCE IN ACCOUNTANCY MASTER OF SCIENCE IN ACCOUNTANCY FACULTY Department Chair: Gerald D. Healy, M.B.A. Administrative Assistant: Carmen Diaz Department Office: Wilson 414 Department Telephone: (413) 572-5590 Graduate Advisor:

More information

ACADEMIC AFFAIRS COUNCIL ******************************************************************************

ACADEMIC AFFAIRS COUNCIL ****************************************************************************** ACADEMIC AFFAIRS COUNCIL AGENDA ITEM: 4.D.4 DATE: February 25, 2010 ****************************************************************************** SUBJECT: Intent to Plan Joint Proposal, DSU & SDSU MS

More information

Red Flags Program. Purpose

Red Flags Program. Purpose Red Flags Program Purpose The purpose of this Red Flags Rules Program is to document the protocol adopted by the University of Memphis in compliance with the Red Flags Rules. Many offices at the University

More information

Master of Cyber Security, Strategy and Risk Management. CECS PG Information Session April 17, 2018

Master of Cyber Security, Strategy and Risk Management. CECS PG Information Session April 17, 2018 Master of Cyber Security, Strategy and Risk Management CECS PG Information Session April 17, 2018 2 Program Purpose Provide a working understanding of information, network and software security, across

More information

FORENSIC LABORATORY DEVELOPMENT AND MANAGEMENT: INTERNATIONAL BEST PRACTICES BY AGWEYE, BENEDICT HEAD OF FORENSICS, EFCC

FORENSIC LABORATORY DEVELOPMENT AND MANAGEMENT: INTERNATIONAL BEST PRACTICES BY AGWEYE, BENEDICT HEAD OF FORENSICS, EFCC FORENSIC LABORATORY DEVELOPMENT AND MANAGEMENT: INTERNATIONAL BEST PRACTICES BY AGWEYE, BENEDICT HEAD OF FORENSICS, EFCC DISCLAIMER THIS PAPER IS NOT A LEGAL ADVISE OR OPINION IT DOES NOT SPEAK FOR OR

More information

Effective: 12/31/17 Last Revised: 8/28/17. Responsible University Administrator: Vice Chancellor for Information Services & CIO

Effective: 12/31/17 Last Revised: 8/28/17. Responsible University Administrator: Vice Chancellor for Information Services & CIO Effective: 12/31/17 Last Revised: 8/28/17 Responsible University Administrator: Vice Chancellor for Information Services & CIO Responsible University Office: Information Technology Services Policy Contact:

More information

Initial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020.

Initial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020. PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Forensics Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University

More information

Responsible Officer Approved by

Responsible Officer Approved by Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT

More information

NYDFS Cybersecurity Regulations: What do they mean? What is their impact?

NYDFS Cybersecurity Regulations: What do they mean? What is their impact? June 13, 2017 NYDFS Cybersecurity Regulations: What do they mean? What is their impact? Gus Coldebella Principal, Boston Caroline Simons Principal, Boston Agenda 1) Overview of the new regulations 2) Assessing

More information

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Cybercrime Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Organizations can prevent cybercrime from occurring through the proper use of personnel, resources,

More information

Law Enforcement Commercial Price List ManTech International Corporation August 2017

Law Enforcement Commercial Price List ManTech International Corporation August 2017 Law Enforcement Commercial Price List ManTech International Corporation August 2017 Table of Contents Rates and Description... 3 General Guidelines... 54 Contact Information... 56 Page - 2 Rates and Description

More information

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES 1. INTRODUCTION If you are responsible for maintaining or using

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

DIS10.3:CYBER FORENSICS AND INVESTIGATION

DIS10.3:CYBER FORENSICS AND INVESTIGATION DIS10.3:CYBER FORENSICS AND INVESTIGATION ABOUT DIS Why choose Us. Data and internet security council is the worlds top most information security certification body. Our uniquely designed course for information

More information

College of Arts and Letters Interdisciplinary Studies. Program Guide. Version 4 May Program Description and Course Requirements

College of Arts and Letters Interdisciplinary Studies. Program Guide. Version 4 May Program Description and Course Requirements College of Arts and Letters Interdisciplinary Studies Program Guide Cybersecurity Major Version 4 May 2016 Contents 1. Program Description and Course Requirements 2. Sample 4-year Course Plan. Pre-requisites

More information

OVERVIEW OF SUBJECT REQUIREMENTS

OVERVIEW OF SUBJECT REQUIREMENTS Course Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document is intended as a guide only. Enrolling students

More information

NIGERIA SECURITY AND CIVIL DEFENCE CORPS INSTITUTE OF SECURITY OF NIGERIA

NIGERIA SECURITY AND CIVIL DEFENCE CORPS INSTITUTE OF SECURITY OF NIGERIA NIGERIA SECURITY AND CIVIL DEFENCE CORPS IN COLLABORATION WITH THE INSTITUTE OF SECURITY OF NIGERIA 2015/2016 ADMISSION INTO MANDATORY BASIC PROFESSIONAL CERTIFICATE COURSES FOR PRIVATE AND PUBLIC SECURITY

More information

NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in

NEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in NEW JERSEY INSTITUTE OF TECHNOLOGY Initiation of Cyber Defense Option for the Master of Science in Cyber Security and Privacy (MS CSP) Degree Program With the approval of the Faculty Senate (and its Committee

More information

Cleveland State University General Policy for University Information and Technology Resources

Cleveland State University General Policy for University Information and Technology Resources Cleveland State University General Policy for University Information and Technology Resources 08/13/2007 1 Introduction As an institution of higher learning, Cleveland State University both uses information

More information

Constitution Towson University Sport Clubs Organization Campus Recreation Services. Article I Name. Article II Membership

Constitution Towson University Sport Clubs Organization Campus Recreation Services. Article I Name. Article II Membership Constitution Towson University Sport Clubs Organization Campus Recreation Services The organization shall be classified as the Sport Clubs Organization and shall be open to men and women alike. The organization

More information

Bachelor of Science Information Studies School of Information Program Summary

Bachelor of Science Information Studies School of Information Program Summary Bachelor of Science Information Studies School of Information Program Summary Students admitted to the program beginning the Summer 2011 semester follow the proposed catalog guidelines below. Program Pre-Requisites

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

PROVIDING INVESTIGATIVE SOLUTIONS

PROVIDING INVESTIGATIVE SOLUTIONS PROVIDING INVESTIGATIVE SOLUTIONS Experienced Professionals Northeast Intelligence Group, Inc. (NEIG) has been helping clients meet challenges for more than twenty years. By providing meaningful and timely

More information

Check with your counselor for any school-specific program prerequisites Open to both Juniors and Seniors

Check with your counselor for any school-specific program prerequisites Open to both Juniors and Seniors Course Description: This program introduces students to the skills needed to inspect, maintain, and repair automobiles and light trucks with internal combustion engines. Instructional units include: Automotive

More information

Building the IA Workforce

Building the IA Workforce Building the IA Workforce Julie Ryan Assistant Professor The George Washington University Washington, DC http://www.seas.gwu.edu/~infosec/ 1 The First Question What s an IA Professional? The IA field is

More information

Policies and Procedures Date: February 28, 2012

Policies and Procedures Date: February 28, 2012 No. 5200 Rev.: 1 Policies and Procedures Date: February 28, 2012 Subject: Information Technology Security Program 1. Purpose... 1 2. Policy... 1 2.1. Program Elements... 1 2.2. Applicability and Scope...

More information

Standard Course Outline IS 656 Information Systems Security and Assurance

Standard Course Outline IS 656 Information Systems Security and Assurance Standard Course Outline IS 656 Information Systems Security and Assurance I. General Information s Course number: IS 656 s Title: Information Systems Security and Assurance s Units: 3 s Prerequisites:

More information

INF - INFORMATION SCIENCES

INF - INFORMATION SCIENCES INF - INFORMATION SCIENCES INF 6000 Introduction to Information Management Cr. 3 Introduction to current data/information management from an interdisciplinary perspective, incorporating the latest ideas,

More information

Computer Forensics US-CERT

Computer Forensics US-CERT Computer Forensics US-CERT Overview This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further

More information

Homeland Security Graduate Programs

Homeland Security Graduate Programs Homeland Security Graduate Programs TA B L E O F C O N T E N T S Online Homeland Security Graduate Programs 3 Cyber Threat Analytics and Prevention 10 Homeland Security Base Program 4 5 Information Security

More information

DETAILED POLICY STATEMENT

DETAILED POLICY STATEMENT Applies To: HSC Responsible Office: HSC Information Security Office Revised: New 12/2010 Title: HSC-200 Security and Management of HSC IT Resources Policy POLICY STATEMENT The University of New Mexico

More information

Computer Science & IT

Computer Science & IT Computer Science & IT TIDEWATER COMMUNITY COLLEGE CLOUD COMPUTING The Career Studies Certificate program in Cloud Computing prepares students to install, deploy, configure, manage, secure, and analyze

More information

Course Curriculum for Master Degree in Network Engineering and Security

Course Curriculum for Master Degree in Network Engineering and Security Course Curriculum for Master Degree in Network Engineering and Security The Master Degree in Network Engineering and Security is awarded by the Faculty of Graduate Studies at Jordan University of Science

More information

CURRICULUM MASTER OF DISASTER MANAGEMENT

CURRICULUM MASTER OF DISASTER MANAGEMENT CURRICULUM MASTER OF DISASTER MANAGEMENT Applicable to students enrolling in one or more of the below components of the Master of Disaster Management (MDMa) as of September 1 st 2013 The programme is delivered

More information

CIS 444: Computer. Networking. Courses X X X X X X X X X

CIS 444: Computer. Networking. Courses X X X X X X X X X 4012 Points Courses * = Can include a summary justification for that section. FUNCTION 1 - GRANT FINAL ATO A. Responsibilities 1. Aspects of Security *Explain the importance of SSM role in (IA) 2. Accreditation

More information

The Insider Threat Center: Thwarting the Evil Insider

The Insider Threat Center: Thwarting the Evil Insider The Insider Threat Center: Thwarting the Evil Insider The CERT Top 10 List for Winning the Battle Against Insider Threats Randy Trzeciak 14 June 2012 2007-2012 Carnegie Mellon University Notices 2011 Carnegie

More information

Student Handbook Master of Information Systems Management (MISM)

Student Handbook Master of Information Systems Management (MISM) Student Handbook 2018-2019 Master of Information Systems Management (MISM) Table of Contents Contents 1 Masters of Information Systems Management (MISM) Curriculum... 3 1.1 Required Courses... 3 1.2 Analytic

More information

Professional Training Course - Cybercrime Investigation Body of Knowledge -

Professional Training Course - Cybercrime Investigation Body of Knowledge - Overview The expanded use of the Internet has facilitated rapid advances in communications, systems control, and information sharing. Those advances have created enormous opportunities for society, commerce

More information

Developing Career-Relevant Academic Programs

Developing Career-Relevant Academic Programs 2016 USENIX Summit for Educators in System Administration Developing Career-Relevant Academic Programs A Case Study: UMUC s B.S. Program in Computer Networks & Cybersecurity S. K. Bhaskar (S.Bhaskar@umuc.edu)

More information

PROGRAMME SYLLABUS Information Architecture and Innovation (Two Years), 120

PROGRAMME SYLLABUS Information Architecture and Innovation (Two Years), 120 PROGRAMME SYLLABUS Information Architecture and Innovation (Two Years), 120 credits Programmestart: Autumn 2018 Jönköping International Business School, Box 1026, SE-551 11 Jönköping VISIT Gjuterigatan

More information

Health Education Community Health Education

Health Education Community Health Education + Master of Science Program Health Education Community Health Education CECH 2014 Primary Faculty: Keith King, PhD, MCHES 513-556-3859 keith.king@uc.edu I. Program Overview The Master of Science (MS) in

More information

New Zealand Certificate in Regulatory Compliance (Core Knowledge) (Level 3)

New Zealand Certificate in Regulatory Compliance (Core Knowledge) (Level 3) New Zealand Certificate in Regulatory Compliance (Core Knowledge) (Level 3) If your staff need to learn the basics about regulatory compliance in New Zealand, then this is the paper for them. This qualification

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner ACCREDITATIONS EXAM INFORMATION The Certified Digital Forensics Examiner exam is taken online through Mile2 s Assessment and Certification System ( MACS ), which is

More information

Teaching cybersecurity across the disciplines. Debasis Bhattacharya maui.hawaii.edu/cybersecurity 3CS Prince George s CC, 2017

Teaching cybersecurity across the disciplines. Debasis Bhattacharya maui.hawaii.edu/cybersecurity 3CS Prince George s CC, 2017 Teaching cybersecurity across the disciplines Debasis Bhattacharya debasisb@hawaii.edu maui.hawaii.edu/cybersecurity 3CS Prince George s CC, 2017 Agenda Background Cybersecurity Education - Traditional

More information

INFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity

INFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity INFORMATION SESSION MS Software Engineering, specialization in Cybersecurity Presenter Afifa Hamad Program Specialist Graduate & Extended Studies Charles W. Davidson College of Engineering San Jose State

More information

Hacking and Cyber Espionage

Hacking and Cyber Espionage Hacking and Cyber Espionage September 19, 2013 Prophylactic and Post-Breach Concerns for In-House Counsel Raymond O. Aghaian, McKenna Long & Aldridge LLP Elizabeth (Beth) Ferrell, McKenna Long & Aldridge

More information

OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE

OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE I. Description of Course: 1. Department/Course: CNET - 174 2. Title: Computer Forensics 3. Cross Reference: 4. Units: 3 Lec Hrs:

More information

716 West Ave Austin, TX USA

716 West Ave Austin, TX USA Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA TABLE OF CONTENTS I. INTRODUCTION What Is Computer Crime?... 2 Computer Fraud

More information

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Purdue University Global 208-209 Catalog BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Description and Outcomes The objective of the Bachelor of Science in Information Technology program is to help you

More information

COMPUTER HACKING Forensic Investigator

COMPUTER HACKING Forensic Investigator COMPUTER HACKING Forensic Investigator H.H. Sheik Sultan Tower (0) Floor Corniche Street Abu Dhabi U.A.E www.ictd.ae ictd@ictd.ae Course Introduction: CHFIv8 presents a detailed methodological approach

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information