Cyber Safety and Security
This track allows students to focus on knowledge and skills related to the vulnerabilities, threats, protections, investigations and legalities associated with technology systems.
Course options with computational/digital focus:
This course provides students with a practical, hands-on exposure to information security topics. This course follows the curriculum for the industry standard Security+ certification program. Students successfully completing this course will be prepared to take the Security+ certification exam. This credential is a valuable way to demonstrate knowledge of information security topics to potential employers.
Students completing this course will be prepared to address the information security issues facing managers and
leaders in any organization. The course is also an excellent starting point for those seeking a career in information
security or risk management consulting. Specific topics covered include:
- Network Security
- Compliance and Operational Security
- Threats and Vulnerabilities
- Application, Data and Host Security
- Access Control and Identity Management
CDT 40210 Digital and Forensic Psychology taught by Mitch Kajzer (NOT OFFERED AT THIS TIME)
The use and interaction with digital devices is a part of daily life. This course will introduce students to the principles of forensic psychology as they apply to cybercrime offenses along with the field of computer forensics techniques and methodologies. Topics to be covered include the motivations of hackers, online child offenders, cyber stalkers, and identity thieves along with electronic discovery, Windows forensic analysis procedures, and Macintosh forensic analysis procedures.
CDT 40215 Intro to Digital Analysis taught by Mitch Kajzer (SPRING)
Digital devices and communications are a part of daily life. This course will provide students with an introduction to the field of digital analysis and e-discovery. Topics to be covered include the scientific method of digital analysis, electronic discovery, legal issues related to digital analysis, network investigations, and mobile technologies. Students will learn basic procedures and hardware/software requirements for conducting digital analyses on Windows and Macintosh computer systems along with iOS and Android mobile devices.
CDT 40220 Cybercrime and the Law taught by Eric Tamashasky (FALL & SPRING)
Almost all crimes, or even human interactions, contain a digital component. The fact that "old" laws don't always fit "new" problems is no more apparent than in the area of cybercrimes. This course will include discussion of topics including: the methodology of typical cyber investigations, the application of the Fourth Amendment to digital evidence, and different types of cyber-specific laws enforced today. The course will also focus on the responses of both courts and legislators to the ever-evolving issues presented by computer crimes.
CDT 40205 Computer Security taught by Walter Scheirer (SPRING)
This course is a survey of topics in realm of computer security. This course will introduce the students to many contemporary topics in computer security ranging from PKIs (Public Key Infrastructures) to cyber-warfare to security ethics. Students will learn fundamental concepts of security that can be applied to many; traditional aspects of computer programming and computer systems design. The course will culminate in a research project where the student will have an opportunity to more fully investigate a topic related to the course.
CDT 43210 Forensic Psychology Seminar taught by Mitch Kajzer (FALL)
This discussion-oriented seminar will examine specific topics in the field of forensic psychology. In this section, we will explore the psychology of mass-shooters. Through current research and investigations, we will examine characteristics of mass shooters and discuss these characteristics as they relate to notable mass-shooting cases. Students will be required to complete an extensive project where they will critically analyze evidence (Internet postings, messages, notebook writings, computer forensics reports) and form an opinion about a mass-shooter case that was discovered and thwarted by law enforcement several years ago.