Вы находитесь на странице: 1из 3

ONLINE CYBERSECURITY CERTIFICATES

OF ADVANCED STUDY
Toll Free: (866) 295-3106
Local: (315) 732-2640

Admission Requirements Computer Forensics Certificate


The online Certificate of Advanced Studies in Computer Forensics
• Application and file review: $50 teaches students how to apply computer and network forensic tools
• Technology fee per course: $70 and techniques to investigate cybercrime, fraud, terrorism, child
pornography, and other illegal activities. Students gain special skills
• Bachelor’s degree or International equivalent
for law enforcement (local, state, federal) and understand expert
• Minimum GPA of 2.7 witness parameters. The goal is to explore the fundamentals of
[Applicants with GPAs below 2.7 can be admitted at the computer investigation, which will give students technical training and
discretion of the department] know-how to navigate efficiently in the dynamic and growing field of
• No GRE or GMAT required. cyber forensics.

These credits can be transferred into the MS in Cybersecurity.


Monitoring, Surveillance, and Intelligence
Operations Certificate Tuition: $895/credit hour
The online Certificate of Advanced Studies in Monitoring,
Surveillance, and Intelligence Operations provides the tools and Courses (18 Credits):
techniques to gather and utilize intelligence information to identify CYB 624 Essential Topics and Emerging Trends in Cybercrime
and defend cyber threats, while also understanding the ethical, legal, CYB 642 Access Methods and Data Hiding
international, and cultural issues and ramifications of this process.
CYB 651 Computer Forensics and Investigation Methods
CYB 652 Intrusion Forensics and Network Analysis
These credits can be transferred into the MPS in Cyber Policy & Risk
Analysis, MS in Cybersecurity, or MBA in General Management. CYB 653 Network Forensics
CYB 659 Advanced Topics in Computer Forensics
Tuition: $775/credit hour

Courses (18 Credits):


Cyber Policy Certificate
CYB 610 Cyber Intelligence The online Certificate of Advanced Studies in Cyber Policy will
CYB 615 Cyber Counter Intelligence educate and prepare professionals with the fundamentals of cyber
CYB 671 Open Source Cyber Surveillance policy. The growth of our technical world has created a significant
CYB 674 Cyber Data Fusion need for policy creation to govern all things cyber. Students will study
the current issues on a national and international scale, attempting to
CYB 680 Cyberspace Law, Public Policy, and Politics
create regulations in the new and complicated field of cyber policy.
CYB 683 International Aspects of Cyber Policy
These credits can be transferred into the MS in Cybersecurity, MPS in
Cyber Operations Certificate Cyber Policy & Risk Analysis, or MBA in General Management.
The online Certificate of Advanced Studies in Cyber Operations will
introduce students to the fundamentals, current issues and technical Tuition: $775/credit hour
savvy necessary to navigate efficiently in the workplace with regard to
Courses (18 Credits):
cybersecurity and the space of cyber operations.
CYB 606 Cyberspace and Cybersecurity
These credits can be transferred into the MS in Cybersecurity, MPS in CYB 668 Organizational Risk Management Framework
Cyber Policy & Risk Analysis, or MBA in General Management. CYB 680 Cyberspace Law, Public Policy and Politics
CYB 681 The Law and Ethics of Cyber Espionage
Tuition: $895/credit hour
CYB 682 Cyber War and Deterrence
CYB 683 International Aspects of Cyber Policy
Courses (18 Credits):
CYB 640 Tactics, Techniques and Procedures
CYB 641 Computer and Network Operations
CYB 642 Access Methods and Data Hiding
CYB 643 Autonomous Cyber Operations
CYB 649 Advanced Topics in Cyber Operations
CYB 653 Network Forensics

programs.online.utica.edu Page 1 of 3
ONLINE CYBERSECURITY CERTIFICATES
OF ADVANCED STUDY
Toll Free: (866) 295-3106
Local: (315) 732-2640

Monitoring, Surveillance, and Intelligence Operations


CYB 610 CYBER INTELLIGENCE (3 CREDITS) CYB 642 ACCESS METHODS AND DATA HIDING (3 CREDITS)
This course provides an overview of the history and evolution of cyber This course takes an in-depth look at data hiding methods, techniques and
intelligence, covering areas that include passive and active measures, access methods, from both a historical perspective and an up-to-the-minute
principles and processes, ethics, and evaluation of successes and failures. review of the latest developments. The course also includes both research
and practical experimentation of data hiding tools, investigation techniques
CYB 615 CYBER COUNTER INTELLIGENCE (3 CREDITS) and the latest countermeasures.
This course provides an overview of the history and evolution of cyber
-counterintelligence, covering areas that include passive and active measures, CYB 643 AUTONOMOUS CYBER OPERATIONS (3 CREDITS)
principles and processes, ethics, and evaluation of successes and failures. Understand construction, discovery and analysis of viral code from both a
defensive and offensive standpoint. Address legal issues associated with
CYB 671 OPEN SOURCE CYBER SURVEILLANCE (3 CREDITS) autonomous operations, and examine the design, construction, engineering
This course questions the technical gaps, Intelligence Community and reverse engineering of computer code in an effort to better understand
assumptions, and important legal issues related to open source cyber the cutting edge technology used by both malicious hackers and nation state
surveillance. Topics addressed include the use of data and information engineering teams for cyber weapon development.
gathered from the use of unmanned, semi-autonomous systems, web data
mining, social networks, and other systems. CYB 649 ADVANCED TOPICS IN CYBER OPERATIONS (3 CREDITS)
Gain an understanding of advanced concepts and techniques of computer
CYB 674 CYBER DATA FUSION (3 CREDITS) network operations. Develop the skills and techniques used in computer
This course will address the collection and integration of email, URL, social network operations (CNO), and get a hands-on approach to the three pillars of
network mining, CCTV, RFID, black box analysis, audio interception, electrical- computer network operations to include attack, defense and exploitation.
optical surveillance, video/photo/optical systems, and tracking and locating
systems. Legal and policy issues associated with use of these tools will be CYB 653 NETWORK FORENSICS (3 CREDITS)
addressed. This course provides students with an understanding of the technology,
laws, regulations, ethics and procedures for network forensics. The course
CYB 680 CYBERSPACE LAW, PUBLIC POLICY, AND POLITICS (3 CREDITS) provides an introduction to identifying data of evidentiary value, and
This course examines the Constitution, law, public policy, surveillance, privacy, collecting and analyzing digital evidence within computer networks.
crime, law enforcement, and punishment related to actions in cyberspace. Emphasis will be placed upon the technical aspects of the problem.

CYB 683 INTERNATIONAL ASPECTS OF CYBER POLICY (3 CREDITS) Computer Forensics


This course is concerned with evolving international law, diplomacy, CYB 624 ESSENTIAL TOPICS AND EMERGING TRENDS IN CYBERCRIME
international cooperation, non-cooperation, international organizations, INVESTIGATIONS (3 CREDITS)
alternatives for Internet governance, the European Convention on Students in this course examine topics, concepts, trends, and methods in
Cybercrime, the Tallinn Manual, and the principle of national responsibility. computer and network forensics investigations. Students acquire skills and
knowledge in digital evidence collection and evaluation; legal issues; and
Cyber Operations
international, jurisdiction, and privacy issues.
CYB 640 TACTICS, TECHNIQUES AND PROCEDURES (3 CREDITS)
This course presents the foundational Tactics, Techniques and Procedures CYB 642 ACCESS METHODS AND DATA HIDING (3 CREDITS)
(TTPs) for Cyber Technical, Legal and Ethical issues. You’ll develop an This course takes an in-depth look at data hiding methods, techniques and
understanding of the evolution of Cyber TTPs and their application on current access methods, from both a historical perspective and an up-to-the-minute
events. Additionally, you’ll explore the development of Computer Network review of the latest developments. The course also includes both research and
Operations by looking at the Strategic and National view. practical experimentation of data hiding tools, investigation techniques and
the latest countermeasures.
CYB 641 COMPUTER AND NETWORK OPERATIONS (3 CREDITS)
Gain an understanding of the foundational concepts and processes of CYB 651 COMPUTER FORENSICS AND INVESTIGATION METHODS (3
computer network operations. You’ll develop an appreciation and depth of CREDITS)
understanding in computer network operations (CNO) through course topics, This course examines techniques and tools used by computer forensics
covering the three pillars of computer network operations to include attack, investigations such as acquisition, preservation, recovery, and analysis of
defense and exploitation. Discover system vulnerability assessment to gain an evidence obtained from portable and stationary computer storage devices,
appreciation for each of the pillars of CNO. personal digital assistants (PDAs), and cell phones.

programs.online.utica.edu Page 2 of 3
ONLINE CYBERSECURITY CERTIFICATES
OF ADVANCED STUDY
Toll Free: (866) 295-3106
Local: (315) 732-2640

CYB 652 INTRUSION FORENSICS AND NETWORK ANALYSIS (3 CREDITS) CYB 680 CYBERSPACE LAW, PUBLIC POLICY AND POLITICS (3 CREDITS)
As a result of advances in technology and a consequent rise in computer- This course examines the Constitution, law, public policy, surveillance,
related crime and victimization, there is a need for experts in detecting privacy, crime, law enforcement, and punishment related to actions in
when an unlawful intrusion has occurred and who is responsible. This course cyberspace.
emphasizes ethical considerations as well as proper procedure for intrusion
analysis and the forensic investigation that follows. CYB 681 THE LAW AND ETHICS OF CYBER ESPIONAGE (3 CREDITS)
Examination of United States laws governing cyber espionage activities,
CYB 653 NETWORK FORENSICS (3 CREDITS) major known incidents, strategies and motivations, geopolitics, and
This course provides students with an understanding of the technology, laws, corporate/industrial espionage. This course will address the Foreign
regulations, ethics and procedures for network forensics. The course provides Intelligence Surveillance Act, FISA Court, and PATRIOT Act.
an introduction to identifying data of evidentiary value, and collecting and
analyzing digital evidence within computer networks. Emphasis will be placed CYB 682 CYBER WAR AND DETERRENCE (3 CREDITS)
upon the technical aspects of the problem. Study definitions of warfare, strategies and objectives, the developing roles
of cyber in warfare and deterrence, key United States and other nation’s
CYB 659 ADVANCED TOPICS IN COMPUTER FORENSICS (3 CREDITS) policy documents, and protecting national critical infrastructures.
This course will cover state-of-the art advances in the computer forensics
field. It is a flexible course intended to breach the knowledge gap between CYB 683 INTERNATIONAL ASPECTS OF CYBER POLICY (3 CREDITS)
published material and newest exploits. This course is concerned with developing and evolving international law,
diplomacy, international cooperation, non-cooperation, international
Cyber Policy organizations, alternatives for Internet governance, the European
CYB 606 CYBERSPACE AND CYBERSECURITY (3 CREDITS) Convention on Cybercrime, the Tallinn Manual, and the principle of national
Provides an introduction to the disciplines of cyberspace and cybersecurity responsibility.
including key concepts, terms and definitions. Examination of threats,
vulnerabilities and countermeasures associated with cybersecurity. Introduce
the topics of cybersecurity policy, risk and compliance.

CYB 668 ORGANIZATIONAL RISK MANAGEMENT FRAMEWORK (3 CREDITS)


Rules, regulations and issues related to organizational risk management.
Topics addressed cover risk assessment and management from healthcare,
financial, privacy, data breach, and government perspectives.

CYB 688 INTERNATIONAL ASPECTS OF CYBER POLICY (3 CREDITS)


This course is concerned with evolving international law, diplomacy,
international cooperation, non-cooperation, international organizations,
alternatives for Internet governance, the European Convention on
Cybercrime, the Tallinn Manual, and the principle of national responsibility.

programs.online.utica.edu Page 3 of 3

Вам также может понравиться