top of page
  • LinkedIn Slide Share
  • YouTube
  • Twitter
  • Linkedin

Cybersecurity and Forensics

​

​

 

BUS/ IT 250 Cybersecurity

The course covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. With many tips and examples reflect new industry trends in both attacks and defense.  

 

CSC 420 Cryptography, introduction to modern cryptography, with an emphasis on the fundamental cryptographic primitives of public-key encryption, digital signatures, pseudo-random number generation, and basic protocols and their computational complexity requirements.

 

IT 230 Computer Forensic: The course introduces the newest technologies/devices along with detailed information on how the evidence contained on these devices should be analyzed.  


Students will learn unique subjects from lectures including Mac Forensics, Mobile Forensics, Cyberbullying, and Child Endangerment.  
 

The course prepares students for the rapidly-growing field of computer forensics for a career with law enforcement, accounting firms, banks and credit card companies, private investigation companies, or government agencies.

Course Talks about : 

•The Scope of Computer Forensics  

•Windows Operating and File Systems 

•Handling Computer Hardware 

•Acquiring Evidence in a Computer Forensics Lab 

•Online Investigations 

•Documenting the Investigation 

•Admissibility of Digital Evidence 

•Network Forensics 

•Mobile Forensics 

•Photograph Forensics 

•Mac Forensics 

•Real World Case Studies 

Topics In Forensics Depending on the program:

  1. Introduction to Information Security

  2. Digital Forensics and Investigations

  3. Windows Forensic Analysis

  4. Incident Response

  5. Network Forensics

  6. Linux and Server Forensics

  7. Memory and Malware Analysis

  8. Malware Reverse Engineering

  9. Mac OS Forensics

  10. Mobile Device Forensics

 

Design and implementation of the process for identifying, analyzing, and responding to information security incidents. Computer forensics. Organization and management of the incident response and forensics team. Tools and best practices

​

​

​

​

​

​

  • Facebook
  • Twitter
  • YouTube
  • Pinterest
  • Tumblr Social Icon
  • Instagram

Thanks for submitting!

Professor Lili Saghafi  , Montreal , Canada

bottom of page