The undergraduate certificate in Digital Forensics examines various forensics models to identify, preserve, collect, analyze, prepare, and present evidence for prosecuting cybercrime. The window of opportunity for collecting evidence can be a few seconds or minutes depending on the sophistication of the perpetrator, and this program teaches the precise digital forensic measures needed to respond to security incidents to prevent loss or corruption of sensitive proprietary information. This certificate program is intended for undergraduate students who seek to heighten their knowledge of digital forensics without committing to an academic degree program.
The curriculum for this program follows industry trends to help ensure relevancy to today's marketplace. View all courses.
Note: One course in this program is aligned with the general objectives of the International Association of Computer Investigative Specialists (IACIS) certification.
In addition to the institutional and degree level learning objectives, graduates of this program are expected to achieve these learning outcomes:
- Examine common incident response procedures via basic computer investigation processes and a good computer forensics lab for the development of investigative reports following first responder procedures.
- Investigate forensics of wireless network attacks caused by mobile and wireless peripheral devices, and then evaluate security and access procedures within wireless Internet use of subject search warrants and chain of custody in a forensic investigation.
- Explore Web attacks, router forensics, email tracking techniques, email crime, and network forensics through investigation logs.
- Discuss corporate espionage and prevention techniques and computer-related crimes, such as sexual harassment and child pornography and the law.
- Analyze image files using forensic processes, recovered files on deleted partitions, data acquisition and duplication procedures, and steganography tools to create a forensic investigation case.
- Analyze file systems, hard disks, various types of digital media, tools, and applications that utilize password cracking on various operating systems.