Digital Forensics & Investigations, Certificate
Washington , United States
Visit Program Website
Tuition Fee
Not Available
Start Date
Not Available
Medium of studying
Not Available
Duration
Not Available
Details
Program Details
Degree
Courses
Major
Cybersecurity
Area of study
Information and Communication Technologies | Security Services
Course Language
English
About Program
Program Overview
Digital Forensics & Investigations, Certificate
Program Description
This certificate program validates students' ability to gather and secure digital evidence, document a digital crime scene, retrieve lost files, retrieve deleted files and e-mails, and reconstruct data from various computer storage media. Students get hands-on experience with some of the popular commercial and open-source digital forensics tools. In addition, students will have the ability to detect the vulnerability of the computer system, identify threats, and assess the risk.
Requirements
Prerequisite Requirements
- CSCI 100 or equivalent
- CIS 150, A+ certification or equivalent
- CIS 160, Cisco I, Network+ or equivalent
- CIS 215 or equivalent - Linux+ or similar
Professional-Technical Core Courses
- CIS 155 - Information Security Foundations
- CIS 166 - Network Defense
- CIS 249 - Intro to Cybercrime Investigative Tools
- CIS 269 - Internet of Things (IoT) Security & Forensics
- CIS 289 - International Cyber Crime Investigations
Total Professional-Technical Courses: 25 credits
Important Notes
- This information does not substitute for meeting with a faculty adviser.
- Students must achieve a minimum 2.0 GPA in each core course to attain an AAS degree.
- Not all classes are offered every quarter or at night.
- This certificate is for a student with an IT background.
Learning Outcomes
- Describe the key security concepts in modern computing systems and networks.
- Determine and design an appropriate plan for identifying, securing, and gathering evidence in a case.
- Understand the importance of ethics while conducting investigations and apply the principles in their professional and personal lives.
- Search, monitor, and analyze big data cyber threats by effectively using software.
- Analyze data acquired and use the evidence to come to a conclusion that can be confirmed using standard or accepted forensic science techniques.
- Perform security, threat intelligence, and response in support of investigations by applying cloud cybersecurity tools.
- Create a mitigation plan based on the type of cybercrime investigation.
See More
