Skip to Content

Course Description

Investigation and Triage

The student becomes familiar with the practical methodologies of digital forensics in this course. We discuss real world cases in the exciting, burgeoning field, such as digital forensics triage, investigations, and the prominent techniques and tools deployed in the profession.
 

Windows Digital Forensics

This example-driven course instructs the student to build a skillset in order to perform digital forensics examinations in the Windows environment. The core skills necessary to perform forensic analysis of digital data will be covered. We will learn how to acquire and analyze data from a Windows system. Many digital forensics tools and techniques will be used in this course.
 

Windows Registry Forensics

In this course, the student is guided through advanced forensic investigations of the Windows Registry system. From the Registry’s background to its basic topics—e.g., hive files, information in keys and values—to discovering the trove of available data, the learner will be prepared to prove that a specific user performed specific actions in a Windows platform.
 

Digital Forensics Tools and Techniques

Learn about up-to-date free and open-source digital forensics tools. In this course, the learner not only gains experience using digital forensics tools but also will understand the “why” behind the “how” when analyzing a Windows system. The course includes lessons about data acquisition and analysis of USB devices, a key topic in digital forensics especially useful in workplace cases of the bring-your-own-device (“BYOD”) nature that are on the rise.
 

Digital Forensics Evidence

When a civil or criminal case may end up in court, all of the digital forensics skills that IT professionals bear are at risk unless chain-of-custody is maintained and the rules of evidence are followed. Understanding evidence law, therefore, prepares the information security professional to put into full force digital forensics analyses and effectively serve the corporate, private, or governmental client with utmost professionalism. MSDF 640 Laws, Regulations, Investigations, and Compliance and this course complement each other to place the learner at a great competitive advantage over peers who tend to leave the law to the lawyers.
 

Malware Analysis and Mitigation

This course focuses on malware in Windows environments. The student will understand the various techniques used to analyze different types of malware programs such as Trojan horses, botnets, and rootkits. This course provides the student with useful tools to perform digital forensics focused on analyzing and mitigating malware.
 

INFOSEC Leadership and Communications

Without effective and efficient leadership in the security domain, both informational and physical, all of the analyses may be for naught. In this unique course, the student will gain an advantage among professional peers by becoming an excellent communicator, and developing leadership skills. Technology professionals require both technological toolkits and “soft skills” abilities in order to inform and support law enforcement, executives, and similar lay-stakeholders. The ability to translate jargon into concise, actionable business actions results in added value.
 

Web Browser Forensics

In this unique course, the student will be provided with the knowledge, skills, and abilities to comprehensively understand web browser vulnerabilities. The approach taken includes becoming aware of browser-based risk by embracing tutorials designed by experienced browser hackers. Through this perspective, you will learn how hackers target Internet Explorer, Chrome, and Firefox web browsers, and therefore how to fight back against such attacks.
 

Digital Forensics Capstone (1hr)

The proverbial rubber hits the road in this practical course where the student applies the knowledge and tools attained and obtained through successful completion of at least seven MSDF courses. While the student will likely be concurrently taking up to two other MSDF courses he or she will work with an assigned faculty member(s) to design a cybersecurity incident, draft and implement a response plan, acquire and analyze relevant data, and report the results in a mock attorney meeting with the goal of having the case picked up for prosecution.
 

"I enjoyed the convenience and flexibility of the schedule especially with four children. The small ..."

Read More >
– Mark Steely
Coordinator of Radiology and Radiation Safety Officer
Baptist Regional Medical Center

"UC provided me with the tools and professional network of individuals to lead our school district in South Carolina."

Read More >
– David O’Shields
Superintendent
Laurens County School District

"The [MBA] program allowed me to make great contacts and network with other professionals."

Read More >
– Amanda Farris
Accountant
Southeastern Kentucky Rehabilitation Industries

"The MBA program fit my busy lifestyle. I was able to attend MBA classes and do the assigned work all ..."

Read More >
– Pam Jones
Controller
Baptist Regional Medical Center

"The learning environment and the facilities at UC PA are the best around and it makes learning so much ..."

Read More >
– Kevin Caddell
PA Program Student

"Enrolling in the University of the Cumberlands’ MBA program was a rewarding and valuable investment ..."

Read More >
– Brooklyn Hooker
Accountant
Kentucky Highlands Investment Corporation

"The Rank 1 program at UC provides a broad array of avenues for enhancing our roles as educators."

Read More >
– Elizabeth Stack
Teacher

"The MBA program has given me an opportunity to further my education while working a full-time job."

Read More >
– Desrick Jones
Assistant Manager
Wal-Mart Stores, Inc.

"Being part of the new era of technology allows UC to be a great learning institution as well as versatile."

Read More >
– Lesley Tipton
PA Program Student

"The MAED program was a very comprehensive and robust experience that definitely added value to ..."

Read More >
– Nathan Smith
Elementary School Teacher

"UC has multiple attributes that I find attractive. Its affordability, high moral standards and sense of ..."

Read More >
– April Templeton
MBA graduate

"I enjoyed the quality of the materials and the instructors. The knowledge I gained will help me in my business."

Read More >
– Eric Greer
Founder & President
CIS

"I was attracted to UC because of its location in the beautiful foothills of the Appalachian Mountains ..."

Read More >
– Suzanne Benninger
PA Program Student

"The online program at UC has allowed me to further my education while maintaining my personal commitments."

Read More >
– Carl Roberts
Teacher
MAT Program

"I believe that UC is making great strides toward becoming one of the best online programs."

Read More >
– Benjamin Clayton
MACS Program

"UC does an excellent job of bringing students from the virtual world together in a cohesive class unit."

Read More >
– Jennifer Kincaid
Assistant Principal
MAED Program Student

Clicking the “Send Request” button below constitutes your express written consent to be called and/or texted by University of the Cumberlands at the number(s) you provided, regarding furthering your education. You understand that these calls may be generated using an automated technology.