Cyber Forensics and Security (CFS)
Introduces students to core digital forensic concepts, including data storage, imaging, the digital forensics process, common Windows artifacts, and the fundamentals of the forensic examination of digital media using AccessData.
Students will learn how to use advanced tools that can aid investigators in searching the Internet and resources that can be applied to domestic and international investigations.
Course examines forensic and investigate aspects of incident response. Topics include pre-incident preparation, developing leads, scoping an incident, data collection, forensic duplication, evidence from hosts, networks, application and enterprise environments.
Students will learn the advanced skills and techniques required to test mobile and web applications. This advanced pen-testing course uses a combination of lecture, real-world experiences, and hands-on exercises.
Course will introduce principles of multimedia forensics (images, audio, and video) and their application to cyber forensics. Practical forensics enhancement, analysis, and reporting tools and techniques are covered.
Tools and techniques used to protect, monitor, analyze, detect and respond to unauthorized activity computers and networks.
Latest developments and advancement in cyber warfare facing nation-state and non-nation-state actors.
Examination of techniques and tools used to investigate, search, collect, analyze and report on network based breaches and events.
Examines fundamental security concepts, protocols, and procedures commonly in use today. Topics include governance, access control, cryptography, physical security, security architecture, and application development security.
Identification, preservation, collection, analysis, and reporting techniques and tolls used in the forensic examination of mobile devices such as mobile phones, tablets and GPS units.
Study of emerging and advanced topics in Cyber Forensics and Security. Topics vary with instructor and change from one semester to another.
A detailed study of the cyber threat intelligence process and its products. Topics include threat modeling, structured analysis, adversary groups, tactical, operations, and strategic threat intelligence.
An advanced study cyber defense, including coverage of topics such as social engineering, authorization techniques, security models, trusted computing, network architecture security, operating system security, endpoint security, database security, and physical security.
Students will learn how to plan and execute and end-to-end adversary emulation and build a red team program, leverage threat intelligence to map against adversary tactic and tool automation.
Students will learn the tools and techniques to defend IoT and ICS systems that run teh Power Grid and other critical systems.
Students will gain experience and practical knowledge working with professionals in the field of Cyber Forensics and Security as well as gaining real-world experience.
Students will plan, implement, research and present a solution to a real-world problem within cyber forensics & defense, demonstrating their technical and professional skills. Must be pre-approved before registering.
This capstone course is the culminating experience for the Masters Degree in Cyber Forensics and Security. This course builds on the concepts covered within the program of study.