Information Technology Graduate Certificate, Digital Forensics
School of Business and Technology
The Digital Forensics graduate certificate prepares information
security professionals for successful computer forensics activities
and the legal challenges associated with conducting computer forensics
investigations. Learners examine the ways data can be hidden on a
computer, evaluate computer forensics investigation tools and
procedures, apply methods of handling and transporting uncovered data,
and create the reports necessary for presentation of digital forensic
evidence at trial.
Five Required Courses
20 quarter credits
IAS5100 |
Data Engineering
Learners in this course gain an understanding of basic abstract data structures and the role that data structures play in secure software development. Learners apply data structure concepts to information security problems and perform reverse engineering of data structures, databases, software, and hardware components to determine their functionality, inputs, outputs, and stored data. Prerequisite(s): IAS5130. | 4 quarter credits |
---|---|---|
IAS5110 * |
Digital Forensics Processes
Learners in this course apply forensics tools and techniques to investigate incidents, analyze devices, and conduct forensics reporting. Prerequisite(s): IAS5030. | 4 quarter credits |
IAS5120 |
Digital Forensics Tools
Learners explore and apply forensics tools and techniques to investigate and analyze digital devices and constructs such as personal digital devices, storage media, and network hosts and traffic. | 4 quarter credits |
IAS5130 |
Programming for Security Professionals
Learners in this course examine core programming concepts such as variables, iteration structures, decision structures, data structures (such as arrays), and how to combine these core concepts to write simple scripts and programs. Additionally, learners apply secure coding practices using C and the Python scripting language in their associated integrated development environments. In working with the C language, learners apply defensive coding practices designed to prevent many security vulnerabilities. Using Python, learners write scripts that perform important network administration tasks such as monitoring network traffic. | 4 quarter credits |
IAS5200 |
Network Architecture and Cyberoperations
Learners in this course study common security architectures to help
identify potential vulnerabilities in architectures, and learn to
design secure architectures. Learners identify issues related to the
design and implementation of operating system concepts, components and
interfaces, and design and implement significant architectural changes
to an existing operating system. Learners also examine the
authorities, roles, and steps associated with cyber operations, and
develop a working knowledge regarding the security issues associated
with building complex systems out of third-party components of unknown
origin. | 4 quarter credits |
Total
20 quarter credits