Cybercriminology and Security Studies Cybercrime Majors (51 Credit Hours Required)
CRIM 150 Introduction to Criminal Justice (3)
CRIM 200 Criminology (3)
CRIM 220 Introduction to Law Enforcement (3)
CRIM 316 Report Writing in the Criminal Justice System (3)
CRIM 420 Criminal Law and Procedure (3)
CRIM 435 Criminal Investigation (3)
CRIM 440 Ethics in Criminal Justice (3)
Requirements for a Cybercrime Concentration
CSS 130 Cyber Fundamentals I (3)
CSS 131 Cyber Fundamentals II (3)
CSS 310 Cyber Crime Investigation (3)
CSS 427 Cyber Criminology (3)
CSS 430 Cyber Security (3)
CSS 435 Social Engineering (3)
Requirements for Digital Forensics Core (6 credit hours required)
CSS 235 Computer Forensics (3)
CSS 236 Mobile Forensics (3)
CSS 312 Advanced Digital Forensics (3)
CSS 333 Multimedia Forensics (3)
Requirements for Security and Risk Core (6 credit hours required)
CSS 330 Introduction to Security and Risk Analysis (3)
CSS 332 Information Systems Security (3)
CSS 370 Incident Response and Disaster Recovery (3)
CSS 411 Cyber Threat Analysis (3)
Criminology and Criminal Justice Course Descriptions
CRIM 150 Introduction to Criminal Justice
A study of the agencies and processes involved in the criminal justice system: the courts, the police, the prosecutor, the public defender, and corrections.
CRIM 200 Criminology
A consideration of criminality, its nature and extent, particularly in the United States; and an analysis of the etiology of criminal behavior, criminal law, and societal reactions to criminals.
CRIM 220 Introduction to Law Enforcement
Philosophical and historical background of law enforcement at the federal, state, county, city, and village levels. An introduction to contemporary police organizations and methods of operation.
CRIM 316: Criminal Justice Report Writing
A survey of the most frequently used forms of reports and records required by local, state, and federal agencies directly involved in the administration of corrections. Special attention will be given to the technical skills necessary for completing such forms and reports.
CRIM 420 Criminal Law and Procedure
An analysis of the history and development of the criminal law as a system of social control; the scope, purpose, and general principles of criminal law; and the essential characteristics of various crimes.
CRIM 435 Criminal Investigation
This course examines the organization and functions of investigative agencies, basic considerations in the investigation of crime, collection and preservation of physical evidence, elements of legal proof in the submission of evidence, and investigation of specific types of offenses.
CRIM 440 Ethics in Criminal Justice
A study of ethics, crime, and the criminal justice system. This course explores a variety of theoretical perspectives relative to the study of ethical behavior and then applies this discussion to the practice of law enforcement and corrections.
Cybercriminology and Security Studies Cybercrime Course Descriptions
CSS130 Cyber Fundamentals I
In this introductory course, you will learn information technology concepts and terminology, infrastructure, applications and software, software development, database fundamentals, and security. In addition, you will also learn the fundamental concepts of computer systems architecture including the CPU, memory, computer Input and Output, operating systems and file management. Furthermore, you will gain an understanding of how computer systems architecture can be implemented and properly maintained to support the needs of an organization. Topics covered include mobile devices, networking technology, hardware, virtualization, cloud computing, network troubleshooting, IT security fundamentals, software troubleshooting, and operational procedures. Upon completion, students should be able to provide customer support to properly diagnose, troubleshoot, install, configure, and maintain PCs, mobile devices, and software as well as properly diagnose, troubleshoot, install, configure, and maintain PC operating systems and software. This course is designed to prepare students for CompTIA ITF and A+ certification. Prerequisite: None
CSS131 Cyber Fundamentals II
In this course, you will learn cybersecurity fundamentals such as cybersecurity concepts, security architecture principles, security of networks, systems, applications, and data, incident response and security implications and adoption of evolving technology. Furthermore, you will also learn to troubleshoot, configure, and manage common network wireless and wired devices, establish basic network design and connectivity, understand and maintain network documentation, identify network limitations and weaknesses, and implement network security, standards, and protocols. You will have a basic understanding of emerging technologies including unified communications, mobile, cloud, and virtualization technologies. Upon course completion, students should be able to troubleshoot, configure, and manage networks. This course is designed to prepare students for ISACA Cybersecurity Fundamentals Certificate and CompTIA Net+ certification. Prerequisite: CSS130
CSS235 Computer Forensics
This hands-on introductory course in computer and digital forensics introduces students to a computer-based investigation and the detection and prevention of cybercrime involving digital devices. This course introduces students to the collection, preservation, presentation and preparation of computer based evidence for the purposes of criminal law enforcement or civil litigation. These activities define the central roles of computer forensic practitioners involved in investigating computer crime scenes and torts involving computers. The course will provide an overview of digital forensics to aid the student in understanding the process of data creation, recovery, and analysis and the benefits of that knowledge during a digital forensic engagement. The course will allow students to gain an understanding of working with investigations related to data forensics, emails, internet/web forensics, mobile devices, networks, etc. Also covered will be the topics of the litigation process including pre-trial, the day in court, and aspects of testifying as a computer forensics expert. The course teaches students how to use Magnet Axiom Cyber and prepares students for Magnet Certified Forensics Examiner (MCFE). Prerequisite: None
CSS236 Mobile Forensics
This course is a continuation of Computer Forensics I and introduces mobile device forensics and other Internet of Things forensics because computer forensics investigators no longer simply rely on traditional computers as sources of evidence. Incriminating evidence can be found on cell phones, smartphones, PDAs, cameras and even game systems. Students will learn methods of evidence extraction from the mobile devices and how these devices should be handled and analyzed. Students will get familiarized with mobile devices such Apple and Android and technology used by carriers. Students will identify data that can be retrieved from mobile devices. Hands-on Lab sessions with actual iPhone, iPad, android phones and tablets will allow students to analyze phones, flash memory and SIM cards. Students will also learn about recovering deleted SMS text messages and call logs. The course teaches students how to use Paraben E:3 Universal and prepares students to become a Paraben Certified Computer Operator (P2CO) and Mobile Operator (DSMO). Prerequisite: None
CSS310 Cybercrime Investigations
An in-depth study of the theory and practice of digital forensics. This course focuses on advanced concepts and techniques in cybercrime environment of digital forensics analysis including. It introduces students to more applied concentrations of discovering, recovering, preserving, and analyzing volatile and nonvolatile information from digital devices. Topics include computer forensics (Mac OS, Windows, and Linux), network forensics, host forensics, mobile forensics, and other types of digital forensics. This hands-on course introduces you to setting up a virtual machine with VirtualBox and installing an operating system with Windows and Ubuntu to perform labs in a secure environment. Students will also learn a variety of digital forensic tools such at AccessData Forensic Toolkit Imager (FTK), Passmark OSForensics, Sleuthkit Autopsy, X-Ways WinHex, and many more. Prerequisite: None
CSS312 Advanced Digital Forensics
This class is designed to provide the necessary skills to perform an effective digital forensics investigation. The course presents a methodological approach to computer forensics including searching and seizing, chain-of-custody, acquisition, preservation, analysis and reporting of digital evidence. It is a comprehensive course covering major forensic investigation scenarios that enables students to acquire necessary hands-on experience on various forensic investigation techniques and standard forensic tools necessary to successfully carryout a computer forensic investigation leading to prosecution of perpetrators. This course is designed to prepare students for the EC-Council Certified Hacking Forensic Investigator (CHFI)/ Prerequisite: None
CSS330 Introduction to Security and Risk Analysis
This course is intended validate knowledge and understanding of security and risk through a hands-on approach. The course will provide students with the knowledge and skills required to identify risk, to participate in risk mitigation activities, and to provide infrastructure, application, information, and operational security. In addition, students will be able to apply security controls to maintain confidentiality, integrity, and availability, identify appropriate technologies and products, troubleshoot security events and incidents, and operate with an awareness of applicable policies, laws, and regulations reviews all areas of information security including systems security, network infrastructure, access control, assessments and audits, cryptography and organizational security. In addition, the course provides you with in-depth coverage of risk identification, IT risk assessment, risk response mitigation, and risk and control monitoring and reporting. IT and enterprise risk management is key to an organization's operations and strategy. This course is designed to prepare students for CompTIA Security + and ISACA Certified in Risk and Information Systems Control (CRISC) certification exams.
CSS3 Files and Database Systems
The purpose of this class is a hands-on, Instructor-led, comprehensive ‘Specialist’ level course that presents a structured approach for effective handling and responding to cyber security incidents. The course will help students gain in-depth knowledge and skills in incident handling and response preparation, incident validation and prioritization, incident escalation and notification, forensic evidence gathering and analysis, incident containment, systems and disaster recovery, and incident eradication. This course prepares you for the EC-Council Certified Incident Handler (ECIH
CSS332 Information Systems Security
This course focuses on the foundation for the study of cybersecurity and information systems security. The course centers around the domains comprising the Information Security (InfoSec) Common Body of Knowledge (CBK) from the International Information Systems Security Certification Consortium (ISC2). Students will learn the security and risk management, asset security, security architecture and engineering, communications and network security, identity and access management, security assessment and testing, security operations, and software development security. This course is designed to prepare students for ISC2 Systems Security Certified Practitioner (SSCP)/Certified Information Systems Security Professional (CISSP) certification exams.
CSS333 Multimedia Forensics
This course prepares students to conduct digital forensic examinations on multimedia evidence, specifically images, videos and audio files. The course builds student knowledge from the basics of multimedia types to being able to recognize anomalies in the files and identify file creation attributes. Students will learn how to examine multimedia files manually and through automated processes utilized by digital forensic tools. Students will prepare written reports outlining their findings of analysis, in a professionally acceptable manner, pursuant to administrative, civil and criminal legal proceedings
CSS370 Incident Response and Disaster Recovery
This course is a hands-on, Instructor-led, comprehensive ‘Specialist’ level course that presents a structured approach for effective handling and responding to cyber security incidents. The course will help students gain in-depth knowledge and skills in incident handling and response preparation, incident validation and prioritization, incident escalation and notification, forensic evidence gathering and analysis, incident containment, systems and disaster recovery, and incident eradication. This course prepares you for the EC-Council Certified Incident Handler (ECIH
CSS411 Cyber Threat Analysis
This course will focus on the measurement, methodology, and application of cyber risk in various environments. Students will gain knowledge of terminology, systems, and relevant analytical tools to effectively calculate and anticipate cyber risk. Application of risk will be translated into constructing relative legislation, policies, and response efforts.
CSS427 Cyber Criminology
This course examines the application of traditional and new criminological theory to modern cybercrimes, offenders, and victims. Students will learn the theoretical foundations of behavior behind online offenders and their victims. Specific attention will be given to the application of theory for policy, prevention, and response efforts.
CSS430 Cyber Security
This course provides an overview of cyber security and its relationship to organizations and society. Topics include foundations of the OSI model, common attack vectors, network defense, malware identification, sandboxing, cryptography, and policy.
CSS435 Social Engineering
This course provides an examination of modern human/behavioral tactics of cyberoffenders. Students will learn the history of frauds and scams, the psychology of deceit and persuasion, and the modern use of employees as attack vectors in order to gain network access. Specific focus will be given to prevention, response, and employee training.