Computer Forensics and Vulnerability Management

Graduate Certificates in Computer Forensics and Vulnerability Management

Designed for individuals with the necessary background in networking, programming and operating systems, the computer forensics and vulnerability management certificates provide students with essential skills for managing, investigating, monitoring and protecting against cyber attacks. Students taking either of the two certificate options will complete a case study and should be comfortable conducting research to complete various lab tasks.
 
The certificate programs comprise of two 11-week courses, totaling 12 graduate-level credits, and are completed entirely online. Upon successful completion of a certificate program, students wishing to enter into our Master of Science in Information Security & Assurance program will be able to use the certificate courses toward the completion of their master’s degree.

Certificate Options

Computer Forensic Investigation/Incident Response Team Management
Vulnerability Management

Next Start DateApplication DeadlineTuition
December 3, 2018

November 5, 2018
Admissions requirements »

$10,650
See the Tuition and Fee Schedule »

Computer Forensic Investigation/Incident Response Team Management

Students participating in the computer forensics certificate should have an understanding of the Microsoft Windows operating systems and a background in systems administration is helpful, but not required.

Computer Security Incident Response Team Management | GI554 | 6 credit hours
In this course, you will analyze and apply the key points in creating and managing a computer security incident response team (CSIRT), also known as a computer incident response team (CIRT) or a computer emergency response team (CERT). Topics include establishing CSIRTs; responding to computer emergencies; securing the CSIRT; managing the CSIRT with respect to professionalism, setting priorities for triage, and protecting personnel against burnout; and learning from emergencies using the incident postmortem and establishing continuous process improvement within the organization. Students will use their case study to apply their knowledge to real-world situations and will prepare recommendations for the establishment of a new CSIRT or improvement of their existing CSIRT.

Computer Forensic Investigation | GI551 | 6 credit hours
This course focuses on the spectrum of tools and techniques used to investigate digital incidents, whether in a civil or criminal environment. The course provides the broad understanding that information assurance professionals must have of the management, investigation, and analysis of digital incidents. It also places that understanding in the context of other information assurance domains. Discussions of digital investigation and forensics cover topics from both technical and management perspectives to increase the information assurance professional’s understanding and application of domain-specific knowledge.

top


Vulnerability Management

Students taking the vulnerability management certificate program should be familiar with and comfortable using both Microsoft Windows and Linux command line and GUI based tools as well researching proper usage of the tools.

Vulnerability Management and Penetration Testing I | GI562 | 6 credit hours
This course introduces students to the penetration testing of computer networks. Students will utilize a virtual lab to gain experience through hands‐on lab exercises, and learn to use the well‐known open‐source Metasploit computer security project to understand security vulnerabilities. Students will apply this tool for penetration testing, testing the control tools, and learn how to conduct monitoring of an enterprise. Topics explored in this course include system security and vulnerability analysis, the most common system exploits and vulnerabilities, along with system “pivoting” and client‐side exploits. This course also introduces open‐source tools, in particular, the Metasploit Framework (MSF). Students will learn how to assess enterprise security controls and system vulnerability, and learn to document their findings. The course is designed for penetration testers, system security, and network administrators.

Vulnerability Management and Penetration Testing II | GI563 | 6 credit hours
This course introduces students to advanced open-source tools used to conduct penetration testing of computer networks. Students will learn the rules of engagement, and how to conduct legal and ethical security tests and vulnerability assessments. Students will utilize a virtual lab to gain experience through hands-on lab exercises. Students will learn to use the well-known open-source tools (Metasploit, John the Ripper, Wireshark) to understand security vulnerabilities and how to use this tool for penetration testing, testing the control tools, and how to conduct monitoring of an enterprise.

top