By studying key topics in Digital Investigations, you have an opportunity to acquire fundamental understanding of digital and network investigations as you pursue your interest in opportunities involving the detection and prevention of computer crime.
For a Computer Forensics Degree Online, your classes may include:
Introduction to Cyber Crime and Digital Investigations
This course provides students with an introduction to the concepts and systems involved in digital investigations and cyber crime. The course discusses recognized incident response policies and procedures for collecting, preserving, analyzing, and reporting digital evidence, cyber crime history, and current and future threats.
Digital Investigations I
This course will examine digital investigation tools, threats, and techniques. Topics may include procedures, steganography, operating systems, tool validation plans, and open source software.
Principles in Electronic Discovery
This course is designed to provide students with the essential information related to electronic discovery. Discussions will focus on organizational electronic discovery needs and how digital investigators can fulfill those needs. Topics may include finding data collection, media restoration, file and email conversion, keyword and metadata searching, filtering, and classification and presentation of data.
During this course, students will examine forensic techniques for collection, preservation, analysis, and reporting of digital network evidence. Topics may include network traffic analysis, electronic mail, and Internet investigations.
This course discusses advanced topics in digital forensics related to the globalization of electronic data. International organization regulations, language barrier, rogue providers, and other topics will be covered in this course.
Digital Investigations II
During this course, students will examine digital investigation techniques for applications running for network operating systems.
Applications of Discrete Mathematics and Statistics in IT
In this course, students will examine the essential mathematics and logic skills required in Information Technology areas such as networking, systems administration, security, programming, database management, and computer hardware. Students will build on their mathematical proficiency to prepare for the challenges they are likely to encounter as an IT professional. This course discusses the importance of discrete mathematics, probability and statistics in IT. Students in this course will further their understanding of discrete mathematics and statistics necessary for application development and systems analysis. Students will also learn how to apply statistical techniques to improve the performance of IT systems. Real-world scenarios and problems from the IT industry are included throughout this course.
System Architecture and Integration
In this course, students will analyze the system integration requirements and apply appropriate frameworks, methodologies, and techniques that are used to manage, administer, acquire, develop, implement, and integrate enterprise systems.
Comprehensive IT Project
In this lower division capstone course, students will examine IT project management and systems architecture. Topics covered include project management concepts of time, scope, and costs, as well as systems architecture, sourcing, acquisition, development, and deployment processes.
Information Technology Security
This survey course covers information security concepts and mechanisms. Information security concepts reviewed may include data protection techniques, software security, information assurance process, enterprise network security, and attack types/countermeasures.
Data Structures and Implementation
This course will introduce students to basic data structures and algorithms which are to be used as tools in designing solutions to real-life problems. Students will become familiar with the specification, usage, implementation and analysis of basic data structures and algorithms.
Program Capstone for IT
This course offers students the opportunity to demonstrate their level of understanding regarding the application of information technology concepts, technologies, and methodologies. Students are expected to employ their knowledge about hardware, systems, applications, and security management.
View the Course Catalog.
Course content subject to change.