Master of Cyber Forensics and Security
Couse Descriptions
Students learn to set up and configure an industry-standard open source operating system, including system installation and basic system administration. Also addressed are applications and graphical user interfaces as well as support issues for open source software.
(2-2-3)
Prerequisite:
Corequisite: None
This course examines security architecture elements within modern object-oriented programming languages that create the framework for secure programming. Analysis of components and services with their inherent strength and weaknesses give rise to common coding security challenges. An exploration of identity management, encryption services and common hacking techniques will enable the student to evaluate the level of a systems data exposure. Coding Standards, best practices, guidelines and style will further enhance the student's ability to develop secure code. Homework assignments and a final project will reinforce the theories taught. A final project involves design and implementation of a secure product.
(2-1-3)
Prerequisite: [(ITMD
411)]
Corequisite: None
Students will engage in an in-depth examination of topics in data security including security considerations in applications & systems development, encryption methods, cryptography law and security architecture & models.
(3-0-3)
Prerequisite: [(ITMD 421)]
Corequisite: None
This course will address methods to properly conduct a computer and/or network forensics investigation including digital evidence collection and evaluation and legal issues involved in network forensics. Technical issues in acquiring court-admissible chains-of-evidence using various forensic tools that reconstruct criminally liable actions at the physical and logical levels are also addressed. Technical topics covered include detailed analysis of hard disks, files systems (including FAT, NTFS and EXT) and removable storage media; mechanisms for hiding and detecting hidden information; and the hands-on use of powerful forensic analysis tools.
(2-2-3)
Prerequisite: None
Corequisite:
None
Digital steganography is the science of hiding covert information in otherwise innocent carrier files so that the observer is unaware that hidden information exists. This course studies both digital steganography and digital steganalysis (the science of discovering the existence of and extracting the covert information). In addition to understanding the science and the pathologies of specific carriers and hiding algorithms, students will have hands-on experience with tools to both hide and extract information. Carrier files such as image, audio and video files will be investigated.
(0-0-3)
Prerequisite: [(ITMS 538)]
Corequisite: None
This course addresses hands-on ethical hacking, penetration testing, and detection of malicious probes and their prevention. It provides students with in-depth theoretical and practical knowledge of the vulnerabilities of networks of computers including the networks themselves, operating systems and important applications. Integrated with the lectures are laboratories focusing on use of open source and freeware tools; students will learn in a closed environment to probe, penetrate and hack other networks.
(2-2-3)
Prerequisite: [(ITMO 440) OR (ITMO 540)]
Corequisite:
None
Prepares students for a role as a network security administrator and analyst. Topics include viruses, worms, other attack mechanisms, vulnerabilities and countermeasures, network security protocols, encryption, identity and authentication, scanning, firewalls, security tools, and organizations addressing security. A component of this course is a self-contained team project that, if the student wishes, can be extended into a fully operational security system in a follow-on course.
(2-2-3)
Prerequisite: [(ITMO 440) OR (ITMO 540)]
Corequisite: None
Prepares students for a role as a network security analyst and developer and gives students experience in developing a production security system. Topics may include computer and network forensics, advances in cryptography and security protocols and systems; operating system security, analysis of recent security attacks, vulnerability and intrusion detection, incident analysis, and the design and development of secure networks. This course includes a significant real world team project the results in a fully operational security system. Students should have previous experience with object-oriented and/or scripting languages.
(2-2-3)
Prerequisite: [(ITMS 448) OR (ITMS 548)]
Corequisite: None
Intelligent device application development is covered with various technologies on mobile and robotic platforms. Utilizing contemporary toolkits, the student considers design and development on
emulated and real "smart" devices including smart phones, personal digital assistants, sensors, actuators and robots. Numerous exercises reinforce concepts gained throughout the course. A term project will integrate course topics into a comprehensive intelligent device application. This course may be taken more than once but only 6 hours of ITMD 455/555 credit may be applied to a degree.
(2-2-3)
Prerequisite: [(ITMS 538)]
Corequisite: None
This course will address theoretical concepts of operating system security, security architectures of current operating systems, and details of security implementation using best practices to configure operating systems to industry security standards. Server configuration, system-level firewalls, file system security, logging, anti-virus and anti-spyware measures and other operating system security strategies will be examined.
(2-2-3)
Prerequisite: [(ITMO 301) OR (ITMO 302)]
Corequisite: None
In-depth examination of topics in the management of information technology security including access control systems & methodology, business continuity & disaster recovery planning, legal issues in information system security, ethics, computer operations security, physical security and security architecture & models using current standards and models.
(3-0-3)
Prerequisite: None
Corequisite: None
This course will cover a particular topic in information security, varying from semester to semester, in which there is particular student or staff interest. This course may be taken more than once but only 9 hours of ITMS 479/579 credit may be applied to a degree.
(Credit: Variable)
Prerequisite: None
Corequisite: None
Current legal issues in information technology are addressed including elements of contracting, payment systems and digital signatures, privacy concerns, intellectual property, business torts and criminal liability including hacking, computer trespass and fraud. Examination of ethical issues including privacy, system abuse, and ethical practices in information technology equip students to make sound ethical choices and resolve legal and moral issues that arise in information technology.
(3-0-3)
Prerequisite: None
Corequisite: None
Industry standard practices and standards in the auditing of information technology in an organization are addressed, with a particular emphasis on examination of IT governance, assets, controls and control techniques. Specific areas covered will include the audit process; IT governance; systems and infrastructure life cycle management; IT service delivery and support; protection of information assets; and business continuity and disaster recovery. Students will examine case studies and complete hands-on exercises.
(3-0-3)
Prerequisite: None
Corequisite: None
Students learn to design and manage key business information security functions including incident response plans and incident response teams disaster recovery plans; and business continuity plans. Reporting, response planning and budgeting are all addressed. Students working in reams will prepare an
incident response, disaster recovery, or business continuity plan for a real-world organizations such as a business or a government body or agency.
(3-0-3)
Prerequisite: None
Corequisite: None
Capstone project.
(Credit: 1 to 6)
Prerequisite: written consent of instructor
Corequisite: None
Last modified: Mar. 06, 2012