Cyber Crime Technology (CCT)
-
Introduction to Cyber Crime
CCT-110, Lecture: 3, Credits: 3No prerequisites.No corequisites.
Fall 2020This course introduces and explains the various types of offenses that qualify as cyber crime activity. Emphasis is placed on identifying cyber crime activity and the response to these problems from both the private and public domains. Upon completion, students should be able to accurately describe and define cyber crime activities and select an appropriate response to deal with the problem.
-
Computer Crime Investigation
CCT-121, Lecture: 3, Lab: 2, Credits: 4No prerequisites.No corequisites.
Spring 2021This course introduces the fundamental principles of computer crime investigation processes. Topics include crime scene/incident processing, information gathering techniques, data retrieval, collection and preservation of evidence, preparation of reports and court presentations. Upon completion, students should be able to identify cyber crime activity and demonstrate proper investigative techniques to process the scene and assist in case prosecution.
-
Data Recovery Techniques
CCT-240, Lecture: 2, Lab: 3, Credits: 3No prerequisites.No corequisites.
Fall 2020This course introduces the unique skills and methodologies necessary to assist in the investigation and prosecution of cyber crimes. Topics include hardware and software issues, recovering erased files, overcoming encryption, advanced imaging, transient data, Internet issues and testimony considerations. Upon completion, students should be able to recover digital evidence, extract information for criminal investigation and legally seize criminal evidence.
-
Network Vulnerabilities I
CCT-250, Lecture: 2, Lab: 2, Credits: 3
Spring 2021- Prerequisites
- Take One: CTI-120 or NET-110
This course introduces students to penetration testing, network vulnerabilities, and hacking. Topics include an overview of traditional network security, system hardening, and known weaknesses. Upon completion, students should be able to evaluate weaknesses of traditional and wireless network for the purpose of incident response, reconstruction, and forensic investigation.