Digital Forensics Course Description

COURSE DESCRIPTIONS

CSA 580 Research Methodology and Project Preparation
This course is designed to cover key elements of social science methods in evidence-based policy, including quantitative and qualitative techniques and expert opinion to build facts and findings from context-free and context-rich environments. This course should also help prepare the student to complete his or her Master's thesis. The course aims to improve the student's ability to comprehend and assess the graduate-level readings assigned in other courses, and to write research papers and complete other written assignments for those courses. The course is intended to provide take-away skills that can be applied to professional activities after graduation: in particular, students should have greater confidence in their abilities to locate, read, commission, design, or conduct relevant research, and to draft research proposals. Among the topics covered: content analysis, survey and interviews, case study, ethics and research. Credits: ECTS: 2 US: 1. Prerequisite: None.

CSA 581 Cyber Security Standards and Policies
The course teaches students about cyber security standards and policies. Cyber security standards and policies enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks. The course will cover the most widely used security standard today know as ISO 27001. Other security standards and policies for IT infrastructure protection will also be taught. In addition, risk assessment and risk management will be incorporated in the course. Credits: ECTS: 4 US: 2. Prerequisite: None.

CSA 584 Computer and System Intrusion
This course teaches students about computer and system intrusion, types of intrusion, its detection as well as prevention systems and its classifications. In addition methods and tactics used in prevention of the intrusion will be covered. The course will also cover the following topics: hacking, E-Crime (or cyber crime) and e-Discovery. Hacking involves finding out weaknesses in a computer or computer network. Classifications, tools and techniques of hacking are covered. E-Crime or (or cyber crime) refers to any crime that involves a computer and a network. E-Discovery refers to discovery in civil litigation, which deals with the exchange of information in electronic format. Electronic information is considered different from paper information because of its intangible form, volume, transience and persistence. Credits: ECTS: 5 US: 2,5. Prerequisite: None.

CSA 591 Law in Cyber Crime
This course examines law, legal policies and their issues that exist and are used today when dealing with cyber crime. The course examines comparative legal approach to the problem of cybercrime. It addresses basic issues in comparative criminal law, and explores the key concepts of cyberspace and cybercrime. It also addresses some of the most prominent topics in the substantive law of cybercrime (e.g., unauthorized access to computers and files, malicious code such as viruses and worms, intellectual property offenses such as economic espionage and copyright piracy, fraud, "hate speech," and pornography). Major issues in the procedural law of cybercrime (e.g., surveillance technologies and legal standards for interception of electronic communications and evidence-gathering), as well as transnational legal issues are also examined. Cybercrime sentencing issues and predictions for the control of cybercrime are examined at the end of the course. Credits: ECTS: 4 US: 2. Prerequisite: None.

CSA 592 Digital Forensics
Digital forensics is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. The course explores digital forensics, its history, forensic process, application, legal considerations and branches. The typical forensic process encompasses the seizure, forensic imaging (acquisition) and analysis of digital media and the production of a report into collected evidence. Digital forensics investigations have a variety of applications. The technical aspect of an investigation is divided into several sub-branches, relating to the type of digital devices involved: a) computer forensics, b) network forensics, c) database forensics and d) mobile device forensics. Computer forensics pertains to legal evidence found in computers and digital storage media. Network forensics relates to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection. Database forensics relates to the forensic study of databases and their metadata. Mobile device forensics relates to recovery of digital evidence or data from a mobile device. Credits: ECTS: 4 US: 2. Prerequisite: None.