See Course and Program Development Policy and Procedures Iwww.ubalt.edu/Provostl for instructions. C5)PROGRAM ACTIONS. Original Program ntle:
|
|
- Veronica Davis
- 5 years ago
- Views:
Transcription
1 alb Document N: Course and Program Development: IMPACT AND APPROVAL SIGNATURES See Course and Program Development Policy and Procedures Iwww.ubalt.edu/Provostl for instructions. SCHOOL: o LAW OMSB o CAS (!)CPA CONTACT NAME: IDebra Stanley 1 PHONE: DEPARTMENT/DIVISION: ISchool of Criminal Justice IDATE PREPARED: 14/8/14 PROPOSED SEMESTER OF IMPLEMENTAnON: 0 fa" o spring YEAR: TYPE OF ACTION: o add (new) o deactivate modify o other LEVEL OF ACTION: o noncredit o undergraduate graduate o other ACTION BEING REQUESTED (select one category, either Course Actions or Program Actions): OCOURSE ACTIONS Original Subject Code/Course Number: eou...tltl., C5)PROGRAM ACTIONS Original Program ntle: Master of Science in ForensiC Science - High Technology Crime Select one or multiple actions from one of the lists below (review the list ofnecessary documents and signatures); I i I 1. Experimental Course 2. Course Title 3. Course Credits 4. Course Number S. Course level 6. Pre- and Co-Requisite 7. Course Description 8. New Course 9. Deactivate Course 22. Other ",.{ 10. Program Requirements lla. Undergraduate Specialization (24 credits or fewer) llb. Masters Specialization (12 credits or fewer) 11c. Doctoral Specialization (18 credits or fewer) 12. Minor (add or delete) i 13. Closed Site Program 14. Program Suspension! 15. Program Reactivation 16a. Certificate Program (UG/G) exclusively within existing degree program! 16b. Certificate Program (UG/G) outside of or across degree programs (12 or more credits) 17. Off-Campus Delivery of Existing Programs 18a. Undergraduate Concentration (exceeds 24 credits) 18b. Masters Concentration (exceeds 12 credits) 18c. Doctoral Concentration (exceeds 18 credits) 19. Program Title Change! 20. Program Termination 21. New Degree Program ~ 22. Other ADDITIONAL DOCUMENTATION (check all appropriate boxes of documents included; review the list ofnecessarv documents): \iii summary proposal (0) (J course definition document (P) (J full five-page MHEC proposal (Q) (J financial tables (MHEC) (R) (J other documents as may be required by MHEC/U5M (5) (J other (T) Summer
2 IMPACT REVIEW (review the list ofnecessary signatures): Q impact statement attached APPROVAL SEQUENCE (review the list ofnecessarv signatures): B. General Education (for No.7, 8) C. Final Faculty Review Body Within Each School (Chair) D.Dean E. University Faculty Senate (Chair) F. University Council (Chair)l G. Provost and Senior Vice President for Academic Affairs /L-- H. President I. Board of Regents (notification only) J. Board of Regents (approval) K. MHEC (notification only) L MHEC (approval) M. Middle States Association notification Required only if the University's mission is changed by the action 1 University Council review (for recommendation to the president or back to the provost) shall be limited to curricular or academic policy issues that may potentially affect the University's mission and strategic planning, or have a significant impact on the generation or allocation of its financial resources. Summer
3 Ub Document 0: Course and Program Development: SUMMARY PROPOSAL See Course and Program Development Policy and Procedures ( for instructions. SCHOOL: o LAW OMSB o CAS 0CPA CONTACT NAME: \ Debra Stanley I PHONE: \4l DEPARTMENT/DIVISION: Ischool of Criminal Justice IDATE PREPARED: 14/8/14 PROPOSED SEMESTER OF IMPLEMENTATION: o fall o spring YEAR: \2014 ACTION BEING REQUESTED (select one category, either Course Actions or Program Actions): o COURSE ACTIONS e PROGRAM ACTIONS Original Subject Code/Course Number:,CO T r , Original Program Title: Master of Science in Forensic Science - High Technology Crime Select one or multiple actionsfrom one ofthe lists below (review the list ofnecessarv documents and signatures}: I! 1. Experimental Course 2. Course Title 3. Course Credits 4. Course Number 5. Course Level 6. Pre- and Co-Requisite 7. Course Description 8. New Course 9. Deactivate Course 22. Other.. of 10. Program Requirements 11a. Undergraduate Specialization (24 credits or fewer) i 11b. Master's Specialization (12 credits or fewer) 11c. Doctoral Specialization (18 credits or fewer) 12. Minor (add or delete) 13. Closed Site Program 14. Program Suspension ls. Program Reactivation 16a. Certificate Program lug/g) exclusively within existing degree program 16b. Certificate Program lug/g) outside of or across degree programs (12 or more credits) 17. Off-Campus Delivery of Existing Programs 18a. Undergraduate Concentration (exceeds 24 credits) 18b. Master's Concentration (exceeds 12 credits) 18c. Doctoral Concentration (exceeds 18 creditsl 19. Program Title Change 20. Program Temninatlon I 21. New Degree Program I 22. Other -_..._--_..._- - For changes to existing courses: OLDmLE I SUBJECT CODE/COURSE No 1 ICREDITS IL--_...I?=======================~ NEwTrrLEIL- ~ SUBJECT CODE/COURSE No 1 ICREDITS _...1 Summer
4 DESCRIBE THE REQUESTED COURSE/PROGRAM ACTION (additional pages may be attached if necessary): Request that the requirements of the MSFS High Technology Crime program be decreased from 42 credits to 30 credits. The requested changes impact less than 33% of the total program requirements. The core courses will remain at 10 courses. The program changes would reduce the 42 credit program to 30 credits as a result of the following changes: 1) Eliminate the 3 course concentration requirements (-9 credits) 2) Reduce the three 4 credit courses to 3 credits (-3 credits) 3) Eliminate the 2nd section of Incident Response and now require Intro to Cryptanalysis 4) Merge course content from two of the concentration courses into two of the existing core courses 5) Integrate material from a 4th concentration course into all core courses. Two courses will integrate material from courses that are no longer required in the program. The two revised courses will require course description revisions, please see attached course curriculum forms. (Please see the attached document with a complete list of all courses in the revised program) SET FORTH THE RATIONALE FOR THIS PROPOSAL: The first year of administering this degree program has suggested a number of changes to improve the program. The proposed program changes will increase the efficiency of the program by consolidation of the appropriate courses and material. The program changes will simply the program schedule to enable students to complete the degree in two years. Students will be well prepared to move into high demand computer security positions within the federal, state, and local government, corporate security financial institutions and other security related positions. Summer
5 Impact Statement From the Office of University Relations Regarding Changes to Program Requirements for the M.S. in Forensic Science-High-Technology Crime General Impact: Please be advised that any programmatic changes are likely to affect recruitment and other publications as well as Web content produced and/or managed by the Office of University Relations that contain this type of specific academic information. Please inform Catherine Leidemer or ) of any proposed changes that receive final approval and of any planned implementation timelines. The timing of the final approval for these changes will be a determining factor in our ability to incorporate the new information in a timely fashion in any relevant materials that are on our production schedule. As a general guideline, the Office of University Relations should be notified of any programmatic changes to a scheduled recruitment publication at least two months prior to printing. Specific Feedback: These changes will require updates to the CPA website and to the graduate catalog in addition to any materials that academic advisers may use in advising students. Also, please consider whether or not these changes will impact any specific recruitment materials, and that information should be discussed with the Offices of Admission and with the Office of University Relations.
6 M.S. in Forensic Science - High Technology Crime Description of Program: The Forensic Science program in High Technology crime - housed in the School of Criminal Justice - leads to the Master of Science degree. The program is designed to provide students with a broad based practical understanding of high technology crimes. The core ofthe program exposes students to forensic investigation techniques and skills, computer and digital information crimes, fraudulent activities in financial and health systems, prevention and security management strategies, and legal interventions and resolutions. The degree is a uniquely defined area within the forensic discipline because of its emphasis on high technology crime, particularly that which occurs within the workplace. The program requires the successful completion of 10 core courses. Students will complete a required core of courses that examine the history, theory, and practical application of forensic investigations as it relates to high technology crimes. Students will acquire forensic investigations techniques and skills as they relate to computer and digital information crime, and financial and health care fraud. The proposed program, with its applied pedagogy, features interactive learning not replicable in a virtual environment. Students with a bachelor's degree in the areas of forensic science, criminal justice, science, health care management, nursing, business, and computer science may be interested in the professional pathways this program offers. Courses are taught in the forensic science laboratories. Courses will be taught at University of Baltimore campus locations in Downtown Baltimore. The program is intended for members of private corporations, nonprofit organizations, and governmental agencies who desire to advance their competencies in managing advanced technological resources to combat cyber threats, and related financial crime. It will qualify students for positions such as incident manager, information security manager, cyber investigator, forensic analyst, law enforcement, private investigator, corporate security manager, and fraud manager. If you have not worked in the field, you can gain valuable experience through an optional internship with a corporate or government entity partner.
7 Core Courses (30 credits) # Course Title Hrs. 1 FSCS 601 Legal Issues in High-Technology Crimes 3 2 FSCS 610 Identifying Organizational Liabilities and Crime 3 13 FSCS 615 Information Retrieval-:- {Paper and Electronic} 3 4 FSCS 620 Forensic Investigative Techniques I 3 5 FSCS 630 Introduction to Cryptanalysis 3 6 FSCS 720 Forensic Investigative Techniques II 3 7 FSCS 724 Protection of Data/Information 3 8 FSCS 727 Computer and Digital Forensics 3 9 FSCS 728 Information Systems, Threats, Attacks and Defense Strategies FSCS 730 Incident Responsej 3
8 Course Descriptions: FSCS 601 legal Issues in High Technology Crimes 3 credits Examines the general regulations, general and computer-related law, and ethics and business policies associated with high technology crime. Areas of major focus include description of legal issues facing management and administration, traditional search and seizure as well as privacy issues, manager and supervisor responsibilities, criminal issues and definitions, chain of custody and ethical considerations. Problem-oriented course that focuses on applying the holdings of cases and analyses of statutes to different criminal fact patterns. FSCS 610 Identifying Organizational liabilities and Crime 3 credits Defines problems, logic and theory, research protocols, personal and organizational risks, criminal and civil liabilities, physical security issues, due diligence matters, and environmental concerns and sexual harassment issues. Covers responsibilities of the organization and of the individual. prerequisite: FSCS 601 FSCS 615 Information Retrieval: Paper and Electronic 3 credits Explores gathering of information and data, evidence collection, storage and security of records, personnel records and related issues, privacy issues, security of customer information, duties and obligations of the information technology field. Also focuses on legal access to these records. lab Fees prerequisite: FSCS 601 FSCS 620 Forensic Investigative Techniques I 3 credits Focuses on traditional investigative techniques (interviews and interrogations), simple data collection, physical evidence, fraud detection, data acquisition and computer techniques, reverse engineering and industrial espionage. Also examines administrative process, the role of human resources and accounting, organizational processes and structures and chain of command/management. Intended as an introduction to FSCS 720. lab Fees. prerequisite: FSCS 601 FSCS630 Introduction to Cryptanalysis 3 credits Provides the historical basis for ciphers and encryption techniques and examines the use of codes in government and commercial applications. Also explores decryption techniques as applied to businesses and to government. lab Fees FSCS 720 Forensic Investigative Techniques II 3 credits A continuation of FSCS 620 with special attention on computer systems and network systems. prerequisite: FSCS 620 lab Fee required. prerequisite: FSCS 620
9 FSCS 724 Protection of Data/Information 3 credits Examines prevention of data/information loss by theft, intrusion and natural disaster and assessment of vulnerabilities and their remediation. Also presents protocols for security and for effective data storage and examines assessment of risk. lab Fees. prerequisite: FSCS 615 FSCS 727 Computer and Digital Forensics 3 credits Examines the use of specialized techniques for recovery, authentication and analysis ofelectronic data; reconstruction of computer usage; examination of residual data; and authentication of remaining data. Also, examines the effective manipulation of digital images from digital photographs and videotapes. Discusses identification of authenticity and detection of manipulation in addition to detection offraud and other criminal activity in these digital media. lab Fees. prerequisite: FSCS 601 FSCS 728 Information Systems, Threats, Attacks and Defense Strategies 3 credits Examines information systems and the threats from malicious activities that attempt to collect data from or disrupt, deny or destroy information within a system. Explores origins of such attacks and effective responses to threat. Also, examines the process of Steganography by which information is hidden within other media. Presents tools (software) to detect such hidden information, including files, images, network traffic, disks, etc., that masquerade within any system. Also presents the processes of hiding or encrypting data to inhibit a forensic analysis and of the detection and counter-resolution of hidden information. Lab Fees. prerequisites: FSCS 615 and FSCS 727 FSCS 730 Incident Response 3 credits Explores the development of effective responses to active attacks on computer systems and networks, coupled with analysis of the breakdown of protective measures. Examines the management of emergency situations arising from natural disasters or civil disorder and the development of proper planning. Provides training in the proper maintenance of computer systems and networks that involve both the technical and physical security of systems, physical plant and personnel. prerequisite: FSCS 724
Bachelor of Information Technology (Network Security)
Course information for Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank Course Design The Bachelor of Information Technology (Network Security) is a three-year
More informationCOMPUTER FORENSICS (CFRS)
Computer Forensics (CFRS) 1 COMPUTER FORENSICS (CFRS) 500 Level Courses CFRS 500: Introduction to Forensic Technology and Analysis. 3 credits. Presents an overview of technologies of interest to forensics
More informationPIONEER TRAINING INSTITUTE
PIONEER TRAINING INSTITUTE CENTRE FOR DISTANCE & ONLINE LEARNING DIPLOMA IN SECURITY MANAGEMENT OUTLINE SECURITY MANAGEMENT STUDIES Pioneer Training Institute has specifically identified security management
More informationInformation Security Incident Response Plan
Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,
More informationCredit Card Data Compromise: Incident Response Plan
Credit Card Data Compromise: Incident Response Plan Purpose It is the objective of the university to maintain secure financial transactions. In order to comply with state law and contractual obligations,
More informationSubject: University Information Technology Resource Security Policy: OUTDATED
Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from
More informationInformation Security Incident Response Plan
Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,
More informationBlending Information Systems Security and Forensics Curricula
Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2012 Proceedings Midwest (MWAIS) 5-2012 Blending Information Systems Security and Forensics Curricula Jason Ferguson Friends University,
More informationBOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018
STATE OF IOWA SEPTEMBER 12-13, 2018 REQUEST FOR NEW PROGRAM AT IOWA STATE UNIVERSITY: BACHELOR OF SCIENCE IN CYBER SECURITY ENGINEERING Contact: Rachel Boon Action Requested: Consider approval of the request
More informationCYBERSECURITY: Scholarship and Job Opportunities
CYBERSECURITY: Scholarship and Job Opportunities Malware Invasion in Cyberspace Blackhole Malware Exploit Kit (2012) Shamoon Virus (2012) Stuxnet Worm (2010) Operation Aurora (2009) and many others Job
More informationInformation Systems and Tech (IST)
Information Systems and Tech (IST) 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey of
More informationIntroducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security
Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And
More informationCertified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
More informationShort courses presented by the NWU Programme in Forensic Accountancy
Short courses presented by the NWU Programme in Forensic Accountancy Certificate in: Commercial Forensic Accounting Commercial Forensic Law Commercial Forensic Investigation Commercial Forensic Information
More informationWhen Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.
When Recognition Matters WHITEPAPER CLFE www.pecb.com CONTENT 3 4 5 6 6 7 7 8 8 Introduction So, what is Computer Forensics? Key domains of a CLFE How does a CLFE approach the investigation? What are the
More informationM.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program
Detroit Mercy s Master of Science in Information Assurance with a major in Cybersecurity is a multi-disciplinary 30-credit-hour graduate degree. It is designed to produce a comprehensively knowledgeable
More informationCouncil on Rehabilitation Education Monitoring Committee Report
Council on Rehabilitation Education 2013-14 Monitoring Committee Report Institution: University of Kentucky File No. 033 Term of Accreditation: 2013-2021 CONDITIONS AND RECOMMENDATIONS: Conditions: 1.
More informationMODULE SPECIFICATIONS
S 1. Title of the module Leading Assurance Engagements PRSN7106 2. School or partner institution which will be responsible for management of the module 3. The level of the module (e.g. Level 4, Level 5,
More informationComputing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS
Computing Accreditation Commission Version 2.0 CRITERIA FOR ACCREDITING COMPUTING PROGRAMS Optional for Reviews During the 2018-2019 Accreditation Cycle Mandatory for Reviews During the 2019-2020 Accreditation
More informationCertified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Title: Certified Digital Forensics Examiner Duration: 5 days Class Format Options: Instructor-led classroom Live Online Training Prerequisites: A minimum of
More informationCertificate Assessment Plan: Graduate Certificates in Forensic Sciences, Clinical Toxicology and Pharmaceutical Chemistry
Certificate Assessment Plan: Graduate Certificates in Forensic Sciences, Clinical Toxicology and Pharmaceutical Chemistry 2012-2013 Office of the Provost University of Florida Institutional Assessment
More informationUTAH VALLEY UNIVERSITY Policies and Procedures
Page 1 of 5 POLICY TITLE Section Subsection Responsible Office Private Sensitive Information Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Information
More informationProgram Approval Form
For approval of new programs and deletions or X Program Approval Form modifications to an existing program. Action Requested: Type (Check one): Create New (SCHEV approval required except for minors) B.A.
More informationTHE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA. CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr.
THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr.FFa) BROCHURE Contents INTRODUCTION... 3 THE IICFA... 4 Basic Entry qualifications...
More informationFORM 7: Certificate Approval and Modification
FORM 7: Certificate Approval and Modification Select Action: New Certificate Modify Existing Certificate Certificate Title: Certificate Level: Undergraduate Graduate College/School/Center or Department
More informationCOWLEY COLLEGE & Area Vocational Technical School
COWLEY COLLEGE & Area Vocational Technical School COURSE PROCEDURE FOR Student Level: This course is open to students on the college level in either the freshman or sophomore year. Catalog Description:
More informationSection 1: Program Abstract
Section 1: Program Abstract The Bachelor or Applied s ( ) degree provides students with a critical understanding of the complex and integrated and Communication Technology (ICT) security issues in todayʼs
More informationCyber Risks in the Boardroom Conference
Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks
More informationLegal, Ethical, and Professional Issues in Information Security
Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN
More informationAcademic Program Review Cyber Security College of Southern Nevada 2017
Academic Program Review Cyber Security College of Southern Nevada 2017 ACADEMIC EVALUATION WORKSHEET PROGRAM ASSESSMENT DATA Date Submitted: Submitted by: Margaret Taylor PROGRAM Assessment Data to be
More informationProgram Outcomes and Assessment
Program Outcomes and Assessment Degree Program: Bachelor of Science - Information Technology (BSIT) Contact Person: Larry Booth Program Mission Statement: The IT Program (BIT, BSIT, CSCI) is committed
More informationMORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015
MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015 CATALOG DESCRIPTION ONLINE EEGR.483 INTRODUCTION TO SECURITY MANAGEMENT CREDITS: 3 THIS COURSE IS A
More informationRed Flags/Identity Theft Prevention Policy: Purpose
Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and
More informationCCISO Blueprint v1. EC-Council
CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance
More informationCourse 832 EC-Council Computer Hacking Forensic Investigator (CHFI)
Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming
More informationRaksha Shakti University
Raksha Shakti University Syllabus MASTER OF SCIENCE IN FORENSIC SCIENCE [Duration: Two years] 1 MASTER OF SCIENCE IN FORENSIC SCIENCE General Guidelines: The Programme shall be a two-year full time academic
More informationGRADUATE CURRICULUM COMMITTEE REPORT
GRADUATE CURRICULUM COMMITTEE REPORT Submitted to the Graduate Council November 15, 2016. For complete curriculum proposal information please see the University s Curriculum Proposal site: registrar.ilstu.edu/curriculumforms/
More informationNew York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines
New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities
More informationCyber Security Incident Response Fighting Fire with Fire
Cyber Security Incident Response Fighting Fire with Fire Arun Perinkolam, Senior Manager Deloitte & Touche LLP Professional Techniques T21 CRISC CGEIT CISM CISA AGENDA Companies like yours What is the
More information"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary
Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business
More informationBACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY
Bachelor of Science in Information Technology BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Description and Outcomes The objective of the Bachelor of Science in Information Technology program is to help
More informationThe CERT Top 10 List for Winning the Battle Against Insider Threats
The CERT Top 10 List for Winning the Battle Against Insider Threats Dawn Cappelli CERT Insider Threat Center Software Engineering Institute Carnegie Mellon University Session ID: STAR-203 Session Classification:
More informationComputer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers
Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,
More informationUnit code: D/601/1939 QCF Level 5: BTEC Higher National Credit value: 15
Unit 49: Digital Forensics Unit code: D/601/1939 QCF Level 5: BTEC Higher National Credit value: 15 Aim To provide learners with an understanding of the principles of digital forensics and the impact on
More informationThe GenCyber Program. By Chris Ralph
The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest
More informationNYDFS Cybersecurity Regulations
SPEAKERS NYDFS Cybersecurity Regulations Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 lsotto@hunton.com www.huntonprivacyblog.com March 9, 2017 The Privacy Team at Hunton & Williams Over 30 privacy
More informationInformation Technology General Control Review
Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor
More informationE-guide Getting your CISSP Certification
Getting your CISSP Certification Intro to the 10 CISSP domains of the Common Body of Knowledge : The Security Professional (CISSP) is an information security certification that was developed by the International
More informationRequirements for Forensic Photography & Imaging Certification (08/2017)
Requirements for Forensic Photography & Imaging Certification (08/2017) A. General Requirements 1. An applicant for certification must possess a high ethical and professional standing. 2. All applicants
More informationMASTER OF SCIENCE IN ACCOUNTANCY
MASTER OF SCIENCE IN ACCOUNTANCY FACULTY Department Chair: Gerald D. Healy, M.B.A. Administrative Assistant: Carmen Diaz Department Office: Wilson 414 Department Telephone: (413) 572-5590 Graduate Advisor:
More informationACADEMIC AFFAIRS COUNCIL ******************************************************************************
ACADEMIC AFFAIRS COUNCIL AGENDA ITEM: 4.D.4 DATE: February 25, 2010 ****************************************************************************** SUBJECT: Intent to Plan Joint Proposal, DSU & SDSU MS
More informationRed Flags Program. Purpose
Red Flags Program Purpose The purpose of this Red Flags Rules Program is to document the protocol adopted by the University of Memphis in compliance with the Red Flags Rules. Many offices at the University
More informationMaster of Cyber Security, Strategy and Risk Management. CECS PG Information Session April 17, 2018
Master of Cyber Security, Strategy and Risk Management CECS PG Information Session April 17, 2018 2 Program Purpose Provide a working understanding of information, network and software security, across
More informationFORENSIC LABORATORY DEVELOPMENT AND MANAGEMENT: INTERNATIONAL BEST PRACTICES BY AGWEYE, BENEDICT HEAD OF FORENSICS, EFCC
FORENSIC LABORATORY DEVELOPMENT AND MANAGEMENT: INTERNATIONAL BEST PRACTICES BY AGWEYE, BENEDICT HEAD OF FORENSICS, EFCC DISCLAIMER THIS PAPER IS NOT A LEGAL ADVISE OR OPINION IT DOES NOT SPEAK FOR OR
More informationEffective: 12/31/17 Last Revised: 8/28/17. Responsible University Administrator: Vice Chancellor for Information Services & CIO
Effective: 12/31/17 Last Revised: 8/28/17 Responsible University Administrator: Vice Chancellor for Information Services & CIO Responsible University Office: Information Technology Services Policy Contact:
More informationInitial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020.
PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Forensics Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University
More informationResponsible Officer Approved by
Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT
More informationNYDFS Cybersecurity Regulations: What do they mean? What is their impact?
June 13, 2017 NYDFS Cybersecurity Regulations: What do they mean? What is their impact? Gus Coldebella Principal, Boston Caroline Simons Principal, Boston Agenda 1) Overview of the new regulations 2) Assessing
More informationQuestion 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:
Cybercrime Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Organizations can prevent cybercrime from occurring through the proper use of personnel, resources,
More informationLaw Enforcement Commercial Price List ManTech International Corporation August 2017
Law Enforcement Commercial Price List ManTech International Corporation August 2017 Table of Contents Rates and Description... 3 General Guidelines... 54 Contact Information... 56 Page - 2 Rates and Description
More informationINFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES
INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES 1. INTRODUCTION If you are responsible for maintaining or using
More informationCYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018
CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,
More informationDIS10.3:CYBER FORENSICS AND INVESTIGATION
DIS10.3:CYBER FORENSICS AND INVESTIGATION ABOUT DIS Why choose Us. Data and internet security council is the worlds top most information security certification body. Our uniquely designed course for information
More informationCollege of Arts and Letters Interdisciplinary Studies. Program Guide. Version 4 May Program Description and Course Requirements
College of Arts and Letters Interdisciplinary Studies Program Guide Cybersecurity Major Version 4 May 2016 Contents 1. Program Description and Course Requirements 2. Sample 4-year Course Plan. Pre-requisites
More informationOVERVIEW OF SUBJECT REQUIREMENTS
Course Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document is intended as a guide only. Enrolling students
More informationNIGERIA SECURITY AND CIVIL DEFENCE CORPS INSTITUTE OF SECURITY OF NIGERIA
NIGERIA SECURITY AND CIVIL DEFENCE CORPS IN COLLABORATION WITH THE INSTITUTE OF SECURITY OF NIGERIA 2015/2016 ADMISSION INTO MANDATORY BASIC PROFESSIONAL CERTIFICATE COURSES FOR PRIVATE AND PUBLIC SECURITY
More informationNEW JERSEY INSTITUTE OF TECHNOLOGY. Initiation of Cyber Defense Option. for the Master of Science in
NEW JERSEY INSTITUTE OF TECHNOLOGY Initiation of Cyber Defense Option for the Master of Science in Cyber Security and Privacy (MS CSP) Degree Program With the approval of the Faculty Senate (and its Committee
More informationCleveland State University General Policy for University Information and Technology Resources
Cleveland State University General Policy for University Information and Technology Resources 08/13/2007 1 Introduction As an institution of higher learning, Cleveland State University both uses information
More informationConstitution Towson University Sport Clubs Organization Campus Recreation Services. Article I Name. Article II Membership
Constitution Towson University Sport Clubs Organization Campus Recreation Services The organization shall be classified as the Sport Clubs Organization and shall be open to men and women alike. The organization
More informationBachelor of Science Information Studies School of Information Program Summary
Bachelor of Science Information Studies School of Information Program Summary Students admitted to the program beginning the Summer 2011 semester follow the proposed catalog guidelines below. Program Pre-Requisites
More informationCriminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud
Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains
More informationPROVIDING INVESTIGATIVE SOLUTIONS
PROVIDING INVESTIGATIVE SOLUTIONS Experienced Professionals Northeast Intelligence Group, Inc. (NEIG) has been helping clients meet challenges for more than twenty years. By providing meaningful and timely
More informationCheck with your counselor for any school-specific program prerequisites Open to both Juniors and Seniors
Course Description: This program introduces students to the skills needed to inspect, maintain, and repair automobiles and light trucks with internal combustion engines. Instructional units include: Automotive
More informationBuilding the IA Workforce
Building the IA Workforce Julie Ryan Assistant Professor The George Washington University Washington, DC http://www.seas.gwu.edu/~infosec/ 1 The First Question What s an IA Professional? The IA field is
More informationPolicies and Procedures Date: February 28, 2012
No. 5200 Rev.: 1 Policies and Procedures Date: February 28, 2012 Subject: Information Technology Security Program 1. Purpose... 1 2. Policy... 1 2.1. Program Elements... 1 2.2. Applicability and Scope...
More informationStandard Course Outline IS 656 Information Systems Security and Assurance
Standard Course Outline IS 656 Information Systems Security and Assurance I. General Information s Course number: IS 656 s Title: Information Systems Security and Assurance s Units: 3 s Prerequisites:
More informationINF - INFORMATION SCIENCES
INF - INFORMATION SCIENCES INF 6000 Introduction to Information Management Cr. 3 Introduction to current data/information management from an interdisciplinary perspective, incorporating the latest ideas,
More informationComputer Forensics US-CERT
Computer Forensics US-CERT Overview This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further
More informationHomeland Security Graduate Programs
Homeland Security Graduate Programs TA B L E O F C O N T E N T S Online Homeland Security Graduate Programs 3 Cyber Threat Analytics and Prevention 10 Homeland Security Base Program 4 5 Information Security
More informationDETAILED POLICY STATEMENT
Applies To: HSC Responsible Office: HSC Information Security Office Revised: New 12/2010 Title: HSC-200 Security and Management of HSC IT Resources Policy POLICY STATEMENT The University of New Mexico
More informationComputer Science & IT
Computer Science & IT TIDEWATER COMMUNITY COLLEGE CLOUD COMPUTING The Career Studies Certificate program in Cloud Computing prepares students to install, deploy, configure, manage, secure, and analyze
More informationCourse Curriculum for Master Degree in Network Engineering and Security
Course Curriculum for Master Degree in Network Engineering and Security The Master Degree in Network Engineering and Security is awarded by the Faculty of Graduate Studies at Jordan University of Science
More informationCURRICULUM MASTER OF DISASTER MANAGEMENT
CURRICULUM MASTER OF DISASTER MANAGEMENT Applicable to students enrolling in one or more of the below components of the Master of Disaster Management (MDMa) as of September 1 st 2013 The programme is delivered
More informationCIS 444: Computer. Networking. Courses X X X X X X X X X
4012 Points Courses * = Can include a summary justification for that section. FUNCTION 1 - GRANT FINAL ATO A. Responsibilities 1. Aspects of Security *Explain the importance of SSM role in (IA) 2. Accreditation
More informationThe Insider Threat Center: Thwarting the Evil Insider
The Insider Threat Center: Thwarting the Evil Insider The CERT Top 10 List for Winning the Battle Against Insider Threats Randy Trzeciak 14 June 2012 2007-2012 Carnegie Mellon University Notices 2011 Carnegie
More informationStudent Handbook Master of Information Systems Management (MISM)
Student Handbook 2018-2019 Master of Information Systems Management (MISM) Table of Contents Contents 1 Masters of Information Systems Management (MISM) Curriculum... 3 1.1 Required Courses... 3 1.2 Analytic
More informationProfessional Training Course - Cybercrime Investigation Body of Knowledge -
Overview The expanded use of the Internet has facilitated rapid advances in communications, systems control, and information sharing. Those advances have created enormous opportunities for society, commerce
More informationDeveloping Career-Relevant Academic Programs
2016 USENIX Summit for Educators in System Administration Developing Career-Relevant Academic Programs A Case Study: UMUC s B.S. Program in Computer Networks & Cybersecurity S. K. Bhaskar (S.Bhaskar@umuc.edu)
More informationPROGRAMME SYLLABUS Information Architecture and Innovation (Two Years), 120
PROGRAMME SYLLABUS Information Architecture and Innovation (Two Years), 120 credits Programmestart: Autumn 2018 Jönköping International Business School, Box 1026, SE-551 11 Jönköping VISIT Gjuterigatan
More informationHealth Education Community Health Education
+ Master of Science Program Health Education Community Health Education CECH 2014 Primary Faculty: Keith King, PhD, MCHES 513-556-3859 keith.king@uc.edu I. Program Overview The Master of Science (MS) in
More informationNew Zealand Certificate in Regulatory Compliance (Core Knowledge) (Level 3)
New Zealand Certificate in Regulatory Compliance (Core Knowledge) (Level 3) If your staff need to learn the basics about regulatory compliance in New Zealand, then this is the paper for them. This qualification
More informationCertified Digital Forensics Examiner
Certified Digital Forensics Examiner ACCREDITATIONS EXAM INFORMATION The Certified Digital Forensics Examiner exam is taken online through Mile2 s Assessment and Certification System ( MACS ), which is
More informationTeaching cybersecurity across the disciplines. Debasis Bhattacharya maui.hawaii.edu/cybersecurity 3CS Prince George s CC, 2017
Teaching cybersecurity across the disciplines Debasis Bhattacharya debasisb@hawaii.edu maui.hawaii.edu/cybersecurity 3CS Prince George s CC, 2017 Agenda Background Cybersecurity Education - Traditional
More informationINFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity
INFORMATION SESSION MS Software Engineering, specialization in Cybersecurity Presenter Afifa Hamad Program Specialist Graduate & Extended Studies Charles W. Davidson College of Engineering San Jose State
More informationHacking and Cyber Espionage
Hacking and Cyber Espionage September 19, 2013 Prophylactic and Post-Breach Concerns for In-House Counsel Raymond O. Aghaian, McKenna Long & Aldridge LLP Elizabeth (Beth) Ferrell, McKenna Long & Aldridge
More informationOHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE
OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE I. Description of Course: 1. Department/Course: CNET - 174 2. Title: Computer Forensics 3. Cross Reference: 4. Units: 3 Lec Hrs:
More information716 West Ave Austin, TX USA
Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA TABLE OF CONTENTS I. INTRODUCTION What Is Computer Crime?... 2 Computer Fraud
More informationBACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY
Purdue University Global 208-209 Catalog BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Description and Outcomes The objective of the Bachelor of Science in Information Technology program is to help you
More informationCOMPUTER HACKING Forensic Investigator
COMPUTER HACKING Forensic Investigator H.H. Sheik Sultan Tower (0) Floor Corniche Street Abu Dhabi U.A.E www.ictd.ae ictd@ictd.ae Course Introduction: CHFIv8 presents a detailed methodological approach
More informationComputer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers
Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,
More information