Cyber crime is a growing concern in today’s technology-based environment. Through a combination of information technology and criminal justice courses, you will get the knowledge and skills to investigate computer and Internet-related crime. You’ll learn techniques hackers use and how to tighten network security. You’ll also learn about state and federal laws regarding the search and seizure of electronic evidence. Finally, you’ll learn how to preserve, verify and analyze data stored on computers.
Ethical Hacking and Network Defense
Introduces the techniques hackers use to discover vulnerabilities. Students will learn ways to tighten the network security to protect the exposed data from the discovered vulnerabilities. Focus is on penetration-testing tools and techniques that security testers and ethical hackers use to protect computer networks.
CCI: Computer Crime Investigation
Provides students with the skills, knowledge and ability to conduct computer crime investigations. Students will learn investigative protocols that can be applied to various types of computer crimes, focusing on the collection of evidence to initiate a criminal prosecution.
CCI: Computer Crime Law
Provides students with an understanding of the nature and application of laws related to computer crime. Students will learn and apply state and federal laws regarding criminal violations, the search and seizure of electronic evidence, and presenting computer crime evidence in court.
CCI: Investigating Internet Crime
Provides students with an understanding of the nature of crimes being committed on the Internet and the skills necessary to successfully investigate Internet-related crime. Students will learn various investigative techniques, protocols and technical tools necessary to identify offenders and acquire evidence to build a prosecutable case.
CCI: Basic Data Recovery
Provides students with a basic understanding of how forensic evidence is recovered from a computer or similar device. Students will learn the necessary steps involved in preserving, authenticating, and analyzing data stored on computing devices, while maintaining the integrity of evidence found on these devices.