MU Cybercrime Classes

The following classes are those that are being offered in the Methodist University Digital Forensics and Cyber Security Major.  The major is comprised of 15 semester hours of Justice Studies courses and 36 semester hours of Digital Forensics and Cyber Security courses.  These courses focus in the areas of:  Digital Forensics, Operating Systems, Networking, Cyber Security, IT Governance, Mobile Device Security, Cloud Security, Incident Response, and Social Media Security.  The classes and the course descriptions are listed below.

JUS 2430 Introduction To Cybercrime*
This course introduces and explains the various types of offenses that qualify as cybercrime activity. Emphasis is placed on identifying cyber crime activity and the response to these problems from both the private and public domains. This class is offered fall and spring.

JUS 2450 Cybercrime, Ethics and Law (formerly JUS 3500)*
This course covers the applicable technological laws dealing with the regulation of cyber security and criminal activity, as well as the ethical considerations and accepted standard practices applicable to technological investigations and computer privacy issues relative to the cyber crime investigator. Topics include an examination of state, federal and international laws regarding cyber crime with an emphasis on both general and North Carolina statutes, illegal and unethical investigative activities, end-justifying-the-means issues, and privacy issues of massive personal database information gathered by governmental sources.

JUS 2470 Operating Systems and Programming Concepts 
This course explores non-Windows operating systems.  Students will gain experience writing scripts to extract information from the operating system environment.  Focus will be placed on the Linux Operating System and Python programming language.

JUS 2500 Digital Crime Investigation*
This course introduces the fundamental principles of computer crime investigation processes. Topics include crime scene/incident processing, information gathering techniques, data retrieval, collection and preservation of evidence, preparation of reports and court presentations.

JUS 2550 Hardening the Enterprise Network (formerly Security Concepts)*
This course introduces the concepts and issues related to securing information systems and the development of policies to implement information security controls. Topics include the historical view of networking and security, security issues, trends, security resources, and the role of policy, people, and processes in information security. Prerequisites: JUS 2510.

JUS 2510 Networking Concepts*
This course introduces students to the networking field. Topics include network terminology and protocols, local-area networks, wide-area networks, OSI model, cabling, router programming, Ethernet, IP addressing, and network standards.

JUS 2650 Cyber Threats and Counterintelligence 
Students will define advanced persistent threat and its role in the use of intelligence gathering for corporations, terrorist groups, and foreign nations.  Students will be able to identify the various threat and attack vectors and use this information to develop an overall plan to help reduce risks within the enterprise.

JUS 3400 Penetration Testing and Vulnerability Scanning (formerly Networking Vulnerabilities)*
This course introduces students to penetration testing, network vulnerabilities, and hacking. Topics include an overview of traditional network security, system hardening, and known weaknesses. Prerequisites: JUS 2510.

JUS 3600 Basic Data Recovery* 
This course introduces the unique skills and methodologies necessary to assist in the investigation and prosecution of cyber crimes. Topics include hardware and software issues, recovering erased files, overcoming encryption, advanced imaging, transient data, Internet issues and testimony considerations. Prerequisites: JUS 2500

JUS 4050 Incident Response and Network Forensics
This course explores incident response and network forensics.  Students will explore Incident Response from a management and operational perspective; in addition, experience will be gained in responding to internal and external attacks, as well as recovering forensic evidence from a network. Prerequisite:  JUS 2510

JUS 4450 Social Media and Cloud Security
Students will be introduced to the fundamental concepts of cloud computing and social media.  Best practices will be investigated and how an information security framework can be developed for the enterprise to reduce risk for social media and cloud computing.  Challenges with cloud and social media forensics will be investigated.

JUS 4650 Mobile Device Forensics
This course explores the recovery of forensic evidence from mobile devices.  Emphasis will be placed on the functionality and recovery of evidence from major smart phone operating systems.  Additional topics include legal considerations specific to mobile device seizure and investigation result reporting. Prerequisite: JUS 2500

If you have any questions about any of these classes you can contact the instructor via the links provided on the individual class pages or under the Instructor Information and/or Contact Form.

*All courses that are marked with an asterisk are courses that will count towards the Digital Forensics and Cyber Security Minor.  Students must declare Digital Forensics and Cyber Security and complete the designated 21 semester hours in order to receive the minor in the program.