Master of Science (MS) in Information Assurance and Cybersecurity with a specialization in. Digital Forensics

Similar documents
Digital Forensics. Graduate Certificate

Master of Science (MS) in Information Assurance and Cybersecurity with a specialization in. Health Care Security

Network Technology: Cisco. Undergraduate Certificate

Network Technology: Microsoft. Undergraduate Certificate

Bachelor of Science (BS) in Information Technology with a minor in. Data Analytics

Bachelor of Science (BS) in Information Technology with a specialization in. Health Information Management

cimc Information Brochure Chartered Institute of Management Consultants

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Building the Cybersecurity Workforce. November 2017

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program

Government-Industry-Academic Partnerships UW Bothell Cybersecurity Pilot

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

Bachelor of Applied Science Degree IT NETWORKING

a PennState A leader in online learning since 1998 Programs in Enterprise Architecture ~ World Campus A world of possibilities. Online.

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Academic Program Review Cyber Security College of Southern Nevada 2017

GRADUATE CERTIFICATE IN MANAGEMENT SYSTEMS ADMINISTRATION

College Of. Technological Innovation

PART-TIME MASTER S DEGREE PROGRAM. Information Systems. Choose from seven specializations study on campus and online.

ENROLL NOW. for classes! FIRST COME FIRST SERVED SEATING IS LIMITED program includes:

Computer Information Science xxx

BOARD OF REGENTS ACADEMIC AFFAIRS COMMITTEE 4 STATE OF IOWA SEPTEMBER 12-13, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

Certification. What: Who: Where:

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

The fast track to top skills and top jobs in cyber. Guaranteed.

QUALITY IMPROVEMENT PLAN (QIP) FOR THE CONSTRUCTION MANAGEMENT DEGREE PROGRAM

PECB UNIVERSITY PECB UNIVERSITY

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

Blending Information Systems Security and Forensics Curricula

Academic Program Review Networking College of Southern Nevada 2017

CYBERSECURITY: Scholarship and Job Opportunities

Several factors will be considered when matching instructors with training opportunities identified by Corporate Solutions.

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

Information Systems and Tech (IST)

School of Engineering & Built Environment

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

CPA Exam and Licensure Information and FAQs

Developing Career-Relevant Academic Programs

GRADUATE CERTIFICATE IN BUSINESS CONTINUITY MANAGEMENT

PROFESSIONAL MASTER S IN

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

DIABLO VALLEY COLLEGE CATALOG

Updated with information about the new certificate programs THE KU MSIT HANDBOOK 1

Initial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020.

The fast track to top skills and top jobs in cyber. FREE TO TRANSITIONING VETERANS

ROJECT ANAGEMENT PROGRAM AND COURSE GUIDE

ENGINEERING AND TECHNOLOGY MANAGEMENT

Make Your Statement. Master of Management in Library and Information Science online. Graduate Certificate in Library and Information Management online

Department of Business Information Technology

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

PRODUCT SAFETY PROFESSIONAL CERTIFICATION PROGRAM DETAILS. Overview

Cybersecurity Defense Master of Science Degree (For students entering their program October or later)

National Defense University and IRMC. National Defense University

INFORMATION TECHNOLOGY, BS

Opening Doors to Cyber and Homeland Security Careers

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

BSc/MSci Professional Accounting in Business Programme Structure

Strengthening Capacity in Cyber Talent sans.org/cybertalent

PROGRAMME SPECIFICATION

The Widening Talent Gap: The greatest security challenge of our time

Bachelor of Information Technology (Network Security)

Full-Time: 4 Years, Sandwich Thick: 5 Years All LJMU programmes are delivered and assessed in English

ADMINISTRATIVE REGULATION Milwaukee Area Technical College Title: PROFESSIONAL GROWTH CREDIT EVALUATION FOR CERTIFIED POSITIONS

School of Engineering and Computational Sciences

School of Engineering & Computational Sciences

An Overview of Mobile Security

Article II - Standards Section V - Continuing Education Requirements

Log in to a Distinguished Tradition. Since MASTER OF SCIENCE IN. Information Security & Assurance. Online

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

Programme Specification

PROGRAMME SPECIFICATION

A United States Cyber Academy Program

INFORMATION SESSION. MS Software Engineering, specialization in Cybersecurity

Computer Networking Technologies and Information Assurance & Cybersecurity

Accounting Ethics and Auditing

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

SCHOOL OF APPLIED HANDS ON. HIGH VALUE. TECHNOLOGY LIVE AND ONLINE COURSES

CYBER APPRENTICESHIP. Dr. Leigh Armistead, President

PIONEER TRAINING INSTITUTE

Gujarat Forensic Sciences University

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

Standard Course Outline IS 656 Information Systems Security and Assurance

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

ACCOUNTING. Iowa State University

Solutions Technology, Inc. (STI) Corporate Capability Brief

IS305 Managing Risk in Information Systems [Onsite and Online]

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security

CYBERSECURITY. The Intersection of Policy and Technology YOU RE HERE TO MAKE A DIFFERENCE ṢM

Accounting MAcc/MSA/Certificate Information Session

KEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University. Faculty responsible for the programme Faculty of Science and Technology

What Makes PMI Certifications Stand Apart?

PARALEGAL CERTIFICATIONS. National Professional Standard for Paralegals

PARALEGAL CERTIFICATIONS. National Professional Standard for Paralegals

Associate in Science and Bachelor of Science in Information Technology

Accounting Major (Last Revised 03/2019)

GRADUATE CERTIFICATE IN RISK MANAGEMENT

Transcription:

Master of Science (MS) in Information Assurance and Cybersecurity with a specialization in Digital Forensics Effective January 8, 2018

Master of Science (MS) in Information Assurance and Cybersecurity with a specialization in Digital Forensics Capella University has been designated by the National Security Agency (NSA) and the Department of Homeland Security (DHS) as a National Center of Academic Excellence in Information Assurance/ Cyber Defense (CAE IA/CD) for academic years 2014-2021. Knowledge gained through work experience and industry certifications may help you earn academic credit toward your degree through Capella s Prior Learning Assessment process, offering you potential savings on tuition and time to completion.* The Digital Forensics master s specialization prepares information security professionals for successful performance-effective computer forensics and the legal challenges associated with conducting computer forensics investigations. Learners examine the ways data can be hidden on a computer, evaluate computer forensics investigation tools and procedures, apply methods of handling and transporting uncovered data, and create the reports necessary for presentation of digital forensic evidence at trial. A University on Top of IT Industry Trends With the emergence of globalization and outsourcing, the field of information technology poses new challenges to IT professionals who want to advance in their careers. Previously it was enough simply to stay focused on hard skills through IT certifications and training. Today, organizations are looking for IT professionals who also understand the business needs of the enterprise, the creative possibilities of technology, and how to integrate that technology into complex enterprise-wide systems. Capella is aware of these trends and continues to adjust its curricula to keep up with the needs of this rapidly changing, dynamic field. In this specialization, you have the option to earn a Digital Forensics graduate certificate as well as NSA Focus Area digital badges in Digital Forensics and Security Incident Analysis and Response. 2 *Residents of Washington may receive credit for prior learning only in the bachelor s and MBA programs. This guide is intended to provide an overview of the specialization and is subject to change. Your enrollment counselor can provide updates, details, and Capella s official University Catalog that specifies your program requirements.

Capella s Career Center proactively assists learners and alumni in developing and implementing their unique career management goals. The Career Center staff is committed to helping you move forward in your career. Career Information RELATED EMPLOYMENT SETTINGS TO EXPLORE Government agencies (such as National Security Agency and US Cyber Command) Government system integrators Defense contractors Military Consulting firms Corporations in the following industries: Technology Finance Health care Retail Local law enforcement Land-based or online college or university Community college RELATED JOB TITLES TO EXPLORE* Senior digital forensic examiner Information security analyst Digital forensics analyst Computer forensics analyst Information risk consultant - digital forensics Cyber security forensic specialist Cybercrime forensics analyst Cyber security manager Computer forensic and malware analyst Consultant (forensics/cyber security) Chief security officer Chief information security officer Adjunct or part-time faculty SPECIALIZATION OUTCOMES Analyze common data structures and data formats for storing data in a computer system Apply basic procedures such as probing, measuring, and data collection to identify functionality and to affect modifications in the prevention of unauthorized Malware and reverse engineering, which threaten information security Apply a common reverse engineering software tool to the safe static and dynamic analysis of software (or Malware) of unknown origin for the purposes of recovering the original implementation and/or understanding the software functionality Analyze methods for the acquisition and analysis of mobile devices in digital forensics investigations Analyze what can and cannot be retrieved from various operating systems in digital forensic investigations, employing best practice methodologies used in host/ network digital forensics Analyze methods and approaches for forensic analysis on specified media Analyze the methods used in digital forensics network investigations 3 * Many positions require/prefer a certification (e.g. CISSP, CCSA) along with an advanced degree. We encourage you to research requirements for your job target and career goals.

Curriculum TRANSFER CREDIT A maximum of 12 quarter credits from previous graduate coursework may be transferred and applied to your program s requirements. ADMISSION REQUIREMENTS Bachelor s degree from an institution accredited by a U.S. Department of Education-recognized accrediting agency or an internationally recognized institution Grade point average of 2.3 or higher on a 4.0 scale This specialization is offered in the GuidedPath delivery model. 12 required courses Total program credits: 48 quarter credits CORE COURSES IAS5002 IAS5010 IAS5015* IAS5020* IAS5025* IAS5030* SPECIALIZATION COURSES IAS5100 IAS5110 IAS5120 IAS5130 IAS5200 CAPSTONE COURSE Communication Skills for Today s Information Security Professional...4 quarter credits Information Technology Security Fundamentals...4 quarter credits Network Security Fundamentals and Cryptography...4 quarter credits Information Security Regulatory and Legal Environment...4 quarter credits Network and Operating System Defense...4 quarter credits Identifying and Managing Risk...4 quarter credits Data Engineering...4 quarter credits Digital Forensics Processes...4 quarter credits Digital Forensics Tools...4 quarter credits Programming for Security Professionals...4 quarter credits Network Architecture and Cyberoperations...4 quarter credits Taken during the learner s final quarter: IAS5900* IAS Capstone.................................... 4 quarter credits * Denotes courses that have prerequisite(s). Refer to the course descriptions for further details. The core curriculum in this program includes and expands on the International Organization for Standardization ISO 27001 and includes the domains of knowledge represented in several leading security certifications, including CISSP. Learners in this specialization gain the knowledge required to sit for the Certified Cyber Forensics Professional (CCFP) and Certified Hacking Forensics Investigator (CHFI) exams. 4 The courses in this program may require live web conferencing activities and/or learner audio/video recordings. Learners who require assistive technology or alternative communication methods to participate in these activities should contact Disability Services to request accommodations.

Learners enrolled in the Master of Science in Information Assurance and Cybersecurity degree program have the option to complete multiple specializations in IAC. Core Course Descriptions IAS5002 Communication Skills for Today s Information Security Professional This course establishes foundational knowledge of the methodologies, nomenclature, communication skills, principles, and practices related to information assurance and security. This course also introduces current and future technological tools and practices designed to assess vulnerabilities while protecting information technology assets and intellectual property. Must be taken during the first quarter by learners who have been admitted to the MS in Information Assurance and Cybersecurity degree program. Cannot be fulfilled by transfer or prior learning assessment. IAS5010 Information Technology Security Fundamentals In this course, learners examine the technology life cycle and identify the security principles that apply throughout system and product lifecycles. Learners identify the basic and network components in an information technology system, how they interact, and their role in system operation. Learners explore the basic role and function of network devices including routers, switches, firewalls, VPNs, and intrusion detection, and the underlying protocols and controls that contribute to their operation. Learners demonstrate skill using network security tools including operating system installation and setup and network mapping through the use of hands-on activities. IAS5015 Network Security Fundamentals and Cryptography Learners apply foundational concepts of cyber-defense and information assurance to select the appropriate information security policies, procedures and controls. Learners assess specific points of vulnerability that are mitigated through the use of information security tools and policies Finally, learners examine the mathematical theory behind cryptography and the range of information security controls and methods that use cryptography or encryption as a factor in how they function. Prerequisite(s): IAS5010 or ITEC5010. IAS5020 Information Security Regulatory and Legal Environment Learners apply cyber-defense and information assurance controls in context of the rules and guidelines that influence them and with an understanding of the security standards, responsibilities, rules, regulations, and issues that impact a particular organization. Learners identify laws and policies related to cyber-defense and how they relate to the storage and transmission of data. Learners also study basic concepts of audit, evidence collection, and chain of custody rules. Prerequisite(s): IAS5015. IAS5025 Network and Operating System Defense Learners identify the basic security issues in operating system (OS) design and implementation. Learners articulate the steps necessary for hardening the OS with respect to various applications and describe the various concepts in network defense. Finally, learners demonstrate network security defense techniques through hands-on activities. Prerequisite(s): IAS5015. IAS5030 Identifying and Managing Risk Learners identify common information security risk analysis methodologies, their characteristics, pros and cons, and applications by selecting an appropriate methodology to apply to a specific organization. Learners examine the qualities, characteristics, and motivation of hackers and cyber-criminals and their attacks on information assets, with an emphasis on malware. Learners also identify vulnerabilities in hardware, software, locations, and procedures that provide an opening to criminals and create risk to organizations that collect and store data. Learners demonstrate risk assessment techniques through hands on application of software vulnerability testing tools. Prerequisite(s): IAS5015. 5

In this specialization, you will have access to Encase, a state-of-the-art technology used by law enforcement and federal investigators, through Capella s secure virtual lab environment. Specialization Course Descriptions IAS5100 Data Engineering Learners in this course gain an understanding of basic abstract data types and associated database operations by applying them to the solution of information security problems and performing reverse engineering of hardware components to determine their functionality, inputs, outputs, and stored data. IAS5110 Digital Forensics Processes Learners in this course apply forensics techniques to respond to and investigate financial incidents, and investigate and analyze devices on a variety of operating systems. IAS5120 Digital Forensics Tools Learners apply forensics techniques to investigate and analyze digital devices and constructs, including personal digital devices, network hosts, network traffic, various types of media such as thumb drives or other removable storage devices. IAS5130 Programming for Security Professionals Learners in this course create scripts and programs to automate and perform simple operations, including basic security practices. Learners develop and demonstrate the skills necessary to program low level languages, perform low level operations, and develop complex, low level software, typically in the C or assembly programming language. Learners apply these skills by programming and testing assembly-based, stand-alone, secure network management tools. IAS5200 Network Architecture and Cyberoperations Learners in this course study common security architectures to help identify potential vulnerabilities in architectures, and learn to design secure architectures. Learners identify issues related to the design and implementation of operating system concepts, components and interfaces, and design and implement significant architectural changes to an existing operating system. Learners also examine the authorities, roles, and steps associated with cyber operations, and develop a working knowledge regarding the security issues associated with building complex systems out of third-party components of unknown origin. Capstone Course Description IAS5900 IAS Capstone Learners demonstrate their mastery of the program and specialization objectives through application of information security and assurance tools and methodologies. For MS in Information Assurance and Cybersecurity learners only. Must be taken during the learner s final quarter. Prerequisite(s): Completion of all required coursework. Cannot be fulfilled by transfer or prior learning assessment. 6

Recommended Course Sequence This recommended course sequence assumes learners take two courses per quarter. Some learners elect to take fewer or more based on workload and the amount of time available for graduate study. YEAR 1 COURSES Q1 IAS5002 Communication Skills for Today s Information Security Professional Q2 IAS5010 IAS5015 Information Technology Security Fundamentals Network Security Fundamentals and Cryptography Q3 IAS5020 IAS5025 Information Security Regulatory and Legal Environment Network and Operating System Defense Q4 IAS5030 IAS5200 Identifying and Managing Risk Network Architecture and Cyberoperations MBA6018 YEAR 2 COURSES Q5 IAS5100 IAS5110 Data Engineering Digital Forensics Processes Q6 IAS5120 IAS5130 Digital Forensics Tools Programming for Security Professionals Q7 IAS5900 IAS Capstone MBA6024 Organizational Strategy 7

Digital course materials covered by the quarterly resource kit fee offer advantages such as immediate mobile access to books; fast, easy full-text search of materials; digital note-taking; and peer collaboration through note sharing. Tuition and Fees This tuition estimate is effective July 10, 2017, and is subject to change. For current pricing, visit the Capella University website at www.capella.edu. TUITION/FEE Tuition per credit $682 Resource kit per quarter $175 There are many financial aid options available to help you offset tuition costs. Contact an enrollment counselor at 1.888.CAPELLA (227.3552) to discuss your financial aid opportunities. Financial Aid Capella University offers assistance to learners who qualify and would like to secure educational funding to help finance their academic program. A number of options are available, given the diverse needs and backgrounds of prospective learners. Options include: Federal Direct Stafford Loan Program Federal Direct PLUS Loan Program Non-federal loans through preferred lenders and financial institutions Capella scholarships External scholarships Veterans educational benefits and U.S. armed forces discounts Corporate and higher education alliances Employer tuition reimbursement Regarding loan programs, interest rates for Stafford student loans are low compared to other types of consumer loans, and repayment can be deferred until after graduation. In compliance with federal and state laws, Capella University has established policies for all learners regarding satisfactory academic progress, which is necessary for financial aid eligibility. 8

Academic Leadership Rhonda Capron, EdD Dean Dr. Rhonda Capron is an accomplished leader with remarkable business acumen, extensive academic experience and professional relevance within the confluence of today s transformative marketplace. She brings a unique blend of background and experience to Capella as a seasoned executive and higher education leader with more than 15 years of experience successfully leading strategic initiatives and operations within high-tech businesses. She also has 10 years in higher education, including extensive, hands-on experience teaching; faculty and staff leadership; academic programming; curriculum development; and strategic planning. Dr. Capron joined Capella in 2016. She was previously the academic dean of the School of Business at University of Phoenix. Prior to that position, she held a number of academic leadership roles at William Jessup University in Rocklin, California. In addition she has an extensive background in both the business sector and the military. Rhonda was vice president of support services and software as a service at Oracle Corporation, and she served as the deputy director for operations within the Departments of Army and Energy. Bill Dafnis, PhD Associate Dean Dr. Bill Dafnis is the associate dean of technology in Capella University s School of Business and Technology and faculty chair for undergraduate technology. Bill joined Capella in 2014 to serve as faculty chair in the ABET-accredited BS in IT program. Prior to joining Capella, Bill served in faculty and academic leadership roles at other academic institutions. Preceding his academic career, Bill traversed a distinguished 20-year profession with the Chicago-based media conglomerate Tribune Company in leadership roles inclusive of information technology, project management, and operations management. Bill holds a PhD in Information Systems from Nova Southeastern University, Master of Science in Information Technology with a security focus from Carnegie Mellon University, Master of Business Administration from Lake Forest College, and Bachelor of Arts from the University of Illinois and is certified as a Project Management Professional (PMP). His research interests include the intersection of disruptive change and innovation planning, cloud computing economic models, business process modeling, project management, and information security. 9 Melissa Zgola, MS Faculty Chair Melissa Zgola joined Capella University in 2007 as an adjunct faculty member for the School of Technology and became a core faculty member in 2008, teaching courses in networking technology and software architecture. In 2012, she was named faculty chair for the Bachelor of Science in Information Technology program in the School of Business and Technology and served in that role until 2014 when she became faculty chair for the Master of Science in Information Systems and Technology Management and the MS in Analytics programs. Prior to joining Capella, Melissa spent several years as an online facilitator, instructor, and program director with The Art Institute Online, the Pittsburgh Technical Institute and ITT Technical Institute. She also served as an engineering technician for the Department of Labor, and senior system analyst for the University of Pittsburgh. She holds a BA in Psychology and an MA in Counseling from West Virginia University, and an MS in Information Science from the University of Pittsburgh.

Move Forward with Capella University Important Information about the educational debt, earnings, and completion rates of students who attended this program: http://capellaresults. com/assets/includes/ gainfulemployment/cta/ge/ GE15/masters/MS_IAS_Digital_ Forensics_gedt.html. WORKING SCHOLARS Capella provides an online, flexible learning environment for working adults who are also determined scholars. That connection between academic and professional work infuses the entire Capella experience from the faculty we recruit to the course projects you complete. The theories discussed in the courseroom are designed to develop working knowledge for everyday situations. AN ACCREDITED UNIVERSITY Our accreditation* is an assurance to students, employers, and the public that Capella University meets established standards for quality of faculty, curriculum, and learner services. It is also an important factor in the ability to transfer credits among higher education institutions. Regional accreditation, the type held by Capella, is the most common type for major public, state, and private institutions in the United States. VALUING YOUR KNOWLEDGE AND EXPERIENCE Adults bring a wealth of experience and learning to their education. Capella courses are designed to bring out your perspectives just as you gain from others ideas. Your knowledge can also be worth time and money: An enrollment counselor can help you estimate how much of your prior learning may apply toward your Capella degree program. Capella Tower 225 South Sixth Street, Ninth Floor Minneapolis, MN 55402 1.888.CAPELLA (227.3552) www.capella.edu *ACCREDITATION Capella University is accredited by the Higher Learning Commission. HIGHER LEARNING COMMISSION https://www.hlcommission.org 800.621.7440 2018 Capella University. All rights reserved.