CS 221 Security Engeenering / Cyber Security Priciplaes
Course provides an overview of computer security topics, with a focus on understanding the most common threat types and implementing basic protection systems for device, data, and network protection. I discuss about proven techniques for protecting information systems from intruders, while allowing the required access to authorized users. This course is designed to provide an overall view of security in the modern information world.
BUS/ IT 250 Cyber security ,
The course covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. With many tips and examples reflect new industry trends in both attacks and defense.
CSC 420 Cryptography , introduction to modern cryptography, with an emphasis on the fundamental cryptographic primitives of public-key encryption, digital signatures, pseudo-random number generation, and basic protocols and their computational complexity requirements.
IT 230 Computer Forensic: The course introduces the newest technologies/devices along with detailed information on how the evidence contained on these devices should be analyzed.
Students will learn unique subjects from lectures including Mac Forensics, Mobile Forensics, Cyberbullying, and Child Endangerment.
The course prepares students for the rapidly-growing field of computer forensics for a career with law enforcement, accounting firms, banks and credit card companies, private investigation companies, or government agencies.
Course Talks about :
•The Scope of Computer Forensics
•Windows Operating and File Systems
•Handling Computer Hardware
•Acquiring Evidence in a Computer Forensics Lab
•Online Investigations
•Documenting the Investigation
•Admissibility of Digital Evidence
•Network Forensics
•Mobile Forensics
•Photograph Forensics
•Mac Forensics
•Real World Case Studies
Topics In Forensics Depending on the program:
Introduction to Information Security
Digital Forensics and Investigations
Windows Forensic Analysis
Incident Response
Network Forensics
Linux and Server Forensics
Memory and Malware Analysis
Malware Reverse Engineering
Mac OS Forensics
Mobile Device Forensics
Design and implementation of the process for identifying, analyzing, and responding to information security incidents. Computer forensics. Organization and management of the incident response and forensics team. Tools and best practices