This certificate of Advanced Studies in Computer Forensics provides students with the detailed knowledge to investigate computer and network-related cyber incidents. Cyber incidents cover a wide array of illegal activities, including cybercrime and fraud, child pornography, cyber-attack, insider threat, terrorism, and espionage. With the Computer Forensics Certificate, students will learn:
- :: The role that malware plays in computer investigations.
- :: How to apply state-of-the-art computer and network forensic tools and methods to investigate cyber-based incidents, including unauthorized observation and manipulation of data and the illegal use of digital devices.
- :: How malicious actors use data hiding, steganography, and anonymity techniques.
The Computer Forensics Certificate will also help prepare students to take advantage of testing for this professional certification:
- :: EC-Council Certified Hacking Forensic Investigator (CHFI)
Cybersecurity is Utica College's Specialty
Recognized by the National Security Agency (NSA) and Department of Homeland Security as a National Center of Academic Excellence in Cyber Defense Education (CAE-CDE), Utica College is a leader in the field of cybersecurity policy and practice. Our suite of programs and specializations at the Bachelor's, Master's, Certificate, and now MPS level within cybersecurity offer subject expertise that span every aspect of this vital field.
Courses & Curriculums
Students will learn hands-on investigative skills using the most modern and up-to-date tools and technologies in the following courses:
CYB 624 – Essential Topics and Emerging Trends in Cybercrime Investigations
Students in this course examine topics, concepts, trends, and methods in computer and network forensics investigations. Students acquire skills and knowledge in digital evidence collection and evaluation; legal issues; and international, jurisdiction, and privacy issues.
CYB 642 – Access Methods and Data Hiding
This course takes an in-depth look at data hiding methods, techniques and access methods, from both a historical perspective and an up-to-the-minute review of the latest developments. The course also includes both research and practical experimentation of data hiding tools, investigation techniques and the latest countermeasures.
CYB 651 – Computer Forensics and Investigation Methods
This course examines techniques and tools used by computer forensics investigations such as acquisition, preservation, recovery, and analysis of evidence obtained from portable and stationary computer storage devices, personal digital assistants (PDAs), and cell phones.
CYB 652 – Intrusion Forensics and Network Analysis
As a result of advances in technology and a consequent rise in computer-related crime and victimization, there is a need for experts in detecting when an unlawful intrusion has occurred and who is responsible. This course emphasizes ethical considerations as well as proper procedure for intrusion analysis and the forensic investigation that follows.
CYB 653 – Network Forensics
This course provides students with an understanding of the technology, laws, regulations, ethics and procedures for network forensics. The course provides an introduction to identifying data of evidentiary value, and collecting and analyzing digital evidence within computer networks. Emphasis will be placed upon the technical aspects of the problem.
CYB 659 – Advanced Topics in Computer Forensics
This course will cover state-of-the art advances in the computer forensics field. It is a flexible course intended to breach the knowledge gap between published material and newest exploits.
Total Required Credits Hours: 18
To apply for admission, you must meet the following requirements:
- :: Bachelor's degree or International equivalent
- :: Minimum GPA of 2.7. Applicants with GPAs below 2.7 can be admitted at the discretion of the department
- :: No GRE or GMAT required
Computer Forensics Learning Goals
- :: Apply computer forensics tools and techniques to solving issues related to malicious cyber incidents
- :: Apply network forensics tools and techniques to complex, network related cyber incidents and scenarios
- :: Understand, assess and analyze the role that data hiding, steganography and anonymity play in computer and network-related investigations
- :: Understand the legal, social and ethical constraints associated with a computer and network forensics investigation
- :: Analyze the role that malware plays in investigating computer and network-related investigations.
Continue Your Education
When you’re ready to advance your education, you may seamlessly transfer your Certificate of Advanced Studies credits to complete your Master’s in Cybersecurity degree in as few as 12 months1. Not all credit hours may transfer into the Master’s degree. Permission of the Program Director is required.
Additional Certificates of Advanced Study can be found here.
Want to Learn More?
Request More Information or call us today at 315.732.2640 or toll-free at 866.295.3106 to speak with a Program Manager.
1Students are expected to take 1 class every 8 weeks. Please contact your Program Manager for detailed guidelines.