Your browser does not support JavaScript! or JavaScript is currently disabled.
Skip to main section

Information Technology Graduate Certificate, Digital Forensics

School of Business and Technology

The Digital Forensics graduate certificate prepares information security professionals for successful computer forensics activities and the legal challenges associated with conducting computer forensics investigations. Learners examine the ways data can be hidden on a computer, evaluate computer forensics investigation tools and procedures, apply methods of handling and transporting uncovered data, and create the reports necessary for presentation of digital forensic evidence at trial.

Show course with description

 

 

Five Required Courses

 

 

20 quarter credits

IAS5100
Data Engineering

Learners in this course gain an understanding of basic abstract data structures and the role that data structures play in secure software development. Learners apply data structure concepts to information security problems and perform reverse engineering of data structures, databases, software, and hardware components to determine their functionality, inputs, outputs, and stored data.  Prerequisite(s): IAS5130.

4 quarter credits
IAS5110 *
Digital Forensics Processes

Learners in this course apply forensics tools and techniques to investigate incidents, analyze devices, and conduct forensics reporting. Prerequisite(s): IAS5030.

4 quarter credits
IAS5120
Digital Forensics Tools

Learners explore and apply forensics tools and techniques to investigate and analyze digital devices and constructs such as personal digital devices, storage media, and network hosts and traffic.

4 quarter credits
IAS5130
Programming for Security Professionals

Learners in this course examine core programming concepts such as variables, iteration structures, decision structures, data structures (such as arrays), and how to combine these core concepts to write simple scripts and programs. Additionally, learners apply secure coding practices using C and the Python scripting language in their associated integrated development environments. In working with the C language, learners apply defensive coding practices designed to prevent many security vulnerabilities. Using Python, learners write scripts that perform important network administration tasks such as monitoring network traffic.

4 quarter credits
IAS5200
Network Architecture and Cyberoperations

Learners in this course study common security architectures to help identify potential vulnerabilities in architectures, and learn to design secure architectures. Learners identify issues related to the design and implementation of operating system concepts, components and interfaces, and design and implement significant architectural changes to an existing operating system. Learners also examine the authorities, roles, and steps associated with cyber operations, and develop a working knowledge regarding the security issues associated with building complex systems out of third-party components of unknown origin.

4 quarter credits

 

 

Total

 

 

20 quarter credits