Firewall Intrusion Detection

January 5, 2016

This course will cover how to install, configure and manage network and host-based firewalls. It will cover how to set up and configure popular network-based firewalls and host-based firewalls with various operating systems. It will instruct the students how to set up both network- and host-based intrusion detection systems to determine if and when a […]

Computer Forensics I

January 5, 2016

This course deals with the preservation, identification, extraction, documentation and interpretation of computer data. Topics covered include evidence handling, chain of custody, collection, preservation, identification and recovery of computer data.

Hacker Techniques and Incident Handling

January 5, 2016

Introduces common computer and network hacking techniques. With a sound understanding of how hackers can compromise computers and computer networks you will learn how to identify when an incident has happened, how to respond in a comprehensive manner, and what steps to take to protect yourself in the future.

Ethical Hacking

January 5, 2016

This course introduces the concept of ethical hacking and how to perform penetration tests of computer networks. In hands-on labs an emphasis will be placed on how to use tools to discover weaknesses in computer networks and how to improve the defenses of those networks against malicious attacks.

Packet Analysis and Network Forensics

January 5, 2016

Students utilize common packet sniffing tools, intrusion detection tools and packet analysis tools to determine if malicious activity is occurring on a network. They learn details about how network protocols can be abused by hackers. They find how network connection logging provides a valuable source of evidence.

Programming in C++

January 5, 2016

(SAME AS CIS 170) Students study digital computing systems and how they are used to solve problems. Students use procedural and object-oriented programming capabilities to design, develop and test computer programs. Topics covered include program development, functions, control structures, text file operations, classes, recursion, arrays and pointers.

Computer Science II

January 5, 2016

This course is a continuation of CPS 177. Students are introduced to major data structures used for data storage and processing. These include arrays, lists, stacks, queries and trees. Algorithms for searching, sorting and updating structures are developed and analyzed.

Criminal Law

January 5, 2016

This course covers both substantive and procedural law at local, state and federal levels. Special emphasis given to the Michigan Penal Code and landmark court decisions.

Criminal Investigation

January 5, 2016

This course covers the fundamentals of criminal investigation, theory and practice, from crime scene to courtroom, with emphasis on techniques appropriate to specific crimes.

Criminal Justice Psychology

January 5, 2016

This course is an overview of criminal behavior from a psych-social perspective. Contemporary research, theory and practice concerning the psychology of crime are reviewed.