This certificate focuses on organizational issues that face corporate security staff in the informational technology environment. Training is provided in identification of cyber crime issues, foundational learning in investigating these crimes, and practical application of security measures to reduce the risk of crime within an organization’s enterprise network.
||Introduction to Computer Security
|CSCI 1072/LAWE 1072
||E-Crime Detection and Prosecution Issues
||Business Continuity Planning
||Advanced Computer Security
||Tools and Tactics of the Black Hat Hacker
|Total credits required: 17
CSCI 1070 Introduction to Computer Security
This is an introductory course in computer security that will provide students with an understanding of the issues corporate security officers face every day. The course will cover the information warfare that exists in the corporate environment today and what measures are taken to reduce the risk of attack and exposure. This course is a prerequisite for most of the other computer crime courses offered.
CSCI 1072/LAWE 1072 E-Crime: Detection and Prosecution Issues
This course is an introduction to the current topics in computer crime, the issues involved in investigation of these crimes, and the corporate perspective of these crimes-how corporate America views them and investigates them. all of the issues involved in business planning and disaster recovery, primarily in connection with serious breaches of an organization's computer and network security.
CSCI 1078 Business Continuity Planning
This course is designed to consider all of the issues involved in business planning and disaster recovery, primarily in connection with serious breaches of an organization's computer and network security.
CSCI 2070 Advanced Computer Security
This course will provide the person having taken the Introduction to Computer Security course a deeper look at how security is handled in the corporate environment. Topics covered include development of security policies, cryptography, access control mechanisms, vulnerability analysis, network intrusion, and security auditing.
CSCI 2072 Cybersleuthing
This course will cover what to do if a network has been compromised, from data recovery techniques to reconstructing the events. It will assist the student in laying out the facts for a law enforcement officer to be able to move forward with crime resolution.
CSCI 2076 Tools and Tactics of the Black Hat Hacker
This course is designed to identify the types of tools hackers use to access a system. Those trying to thwart these criminals can also use these tools to gather evidence and investigate the alleged crime. This course will show the student what tactics the hackers use to gain entry, how some of the tools used in the attacks can also be used to investigate the crimes, and how to set the trap for hackers in an attempt to not only catch them, but to watch them work before releasing the trap to gain additional knowledge on the dark underworld of the Black Hat Community.
Degree requirements and courses are subject to change. Students should consult with an advisor/counselor when registering for courses.
Gainful Employment Disclosure
The following links provide information on program costs, financing and success. PLease click on the program name to be directed to the page link.
Computer Security Certificate