RE: School of Computer Forensic Investigation, Class 7, Eastern Michigan University

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "RE: School of Computer Forensic Investigation, Class 7, Eastern Michigan University"

Transcription

1 December 12, 2006 RE: School of Computer Forensic Investigation, Class 7, Eastern Michigan University Dear Applicant Agency: The Center for Regional and National Security are pleased to announce the seventh Computer Forensic Investigation School to be offered to law enforcement agencies, starting September 10 th, Overview The School of Computer Forensic Investigation at Eastern Michigan University is quickly gaining a national reputation for excellence. Designed for the law enforcement community, this unique educational/training program has been developed with cooperation from our instructors in law enforcement, business and industry. These professionals provide comprehensive instruction relevant to the recent developments in the field of computer forensics. The classroom experience is supplemented with lecture and textbook materials. Considerable time is spent developing hands-on skills in an academic lab setting. Participants spend the majority of their class time doing analysis and implementing new techniques rather than talking about forensics. This hands-on training enhances the student s ability to return to their departments and start processing cases without the need for additional training. The School of Computer Forensic Investigation has been built upon our over 15 year history of Eastern Michigan University s efforts to provide advanced training within the law enforcement community of Michigan. The Center for Regional and National Security at E.M.U. is continuing to incorporate and develop new technologies in their educational programs. Participants in the School of Computer Forensic Investigation will be exposed to a new paradigm of criminal investigation rooted in the technological process. Students can immediately transfer the skills and knowledge learned in the program to their workplace. Instructors The School of Computer Forensic Investigation has developed relationships with leading edge industry professionals. Our faculty consists of professionals from the Department of Defense, the State Attorney General s Office, Air Force Intrusion Testing, Sprint Communications, as well as other private technology companies, and law enforcement personnel. In the private sector these individuals hold positions as Systems Engineers, Senior Systems Security Professionals, Cybercrime Investigators, Computer Forensics Examiners, Network Security Administrators,

2 teachers and trainers. Our faculty is content experts in their respective fields, many hold advanced degrees. Certification Students who successfully complete the entire program including required examinations and projects will be granted a certificate of successful completion as a Basic Certified Computer Forensic Examiner. Forensic Evidence Computer In week one of the program the students will build their own Forensic Computer. This accomplishes two goals. 1) The students learn about hardware issues and the need to have a sound basis of the internal workings of the computer. 2) The student will leave with a computer that they built as part of their studies. This is a state of the art machine that they will take back to their respective agency and do the analysis required of computer forensic examiners. This machine has been designed by one of Michigan s leading computer forensic examiners. While it is not required that each student purchase this machine, it affords those departments an opportunity to not only have an individual trained but he/she will have the necessary hardware tools once they graduate to start conducting forensic analysis when they return to their respective agencies. Estimated cost for this device is pending; please call for further information (EST under $4,000, which is a considerable savings over commercially produced Forensic Devices with a price tag of over $6,500.) All machines are state of the art. The Deadline for Ordering is August 10, 2007 If you desire to have us purchase the components for your student to assemble this computer please fill out the attached consent form and mail it with your registration. The curriculum of study has been developed with feedback from a number of working law enforcement computer forensic examiners. The curriculum is presented for your review:

3 Curriculum of Instruction Week 1: September Topic Hours Introduction to Forensics School... 2 Building the Forensic Computer Windows XP... 7 Linux Software Installation & Setup... 7 Week 2: September Physical/Logical Disk Structure DOS Basics/Advanced, Disk Edit FAT Windows Operating Systems Windows XP, NTFS, Logs... 7 Windows Registry File/Artifacts... 7 Week 3: October 8-12 Using Linux for Forensic Analysis Practical Examination Week 4: October Topic Hours Validation of Forensic Hardware/Software... 7 External Media- CD/DVD + Digital Film... 7 Report Writing Network Investigations Practical Examination Week 5: October 29 November 2 Preparation of Analysis Media Image Restoration Automated Forensic Tools for Image Analysis Week 6: November 5-9 Field Acquisition Kit and Methodology... 7 Search and Seizure Electronic Media Legal Issues in Forensic Investigations Access Data Password Cracking Software... 7 Encryption/Steganography... 7 Final Examination Evaluations and Graduation Times Classes will meet Monday through Friday from 8:00 a.m. to 4:00 p.m. The course is 6-weeks in length. Location Classes will be held in Room 8, Roosevelt Hall. Application Information Applicants are required to complete a formal application in its entirety. All applications must be typed before being submitted to the address below. Cost $800.00** The majority** of the costs have been funded by a grant from the Michigan Justice Training Commission. Additional program fees for this course are $800.00** per applicant excluding the costs for the computer. The computer cost will be determined, costs to not exceed $4,000. Compare these costs with other nationally recognized one week courses. **Pending Final Approval from the Michigan Justice Training Commission.

4 No refunds will be honored after the registration date. Student substitutions will be permitted. Selection Criteria 1. Applicants from departments demonstrating significant need will be given first priority for admissions. 2. Qualified federal, state, and local police and sheriff department personnel receive preferential consideration. 3. It is necessary that applicants have an understanding of computers and a background in criminal investigations. 4. It is suggested that all applicants have completed the School of Computer Cyber Crime Investigations. (Similar or related training can be substituted.) 5. All applicants are subject to background investigation. College Credit Eastern Michigan University offers participants in the School of Computer Forensic Investigation an opportunity to receive university credit. Details can be obtained by contacting the Center for Regional and National Security at the numbers indicated below. Further Registration Information. Deadline for Program Registration only August 31, 2007 Michael Yauk, Skip Lawver, Phone Fax Respectfully, Mike Yauk Platform Associate, Information Assurance

5 Authorization to Purchase Computer Components Authorization is hereby granted to Eastern Michigan University to purchase the following computer components for The School of Computer Forensic Investigation. The computer will be the property of Police Department upon completion of the training course. Eastern Michigan University is authorized to bill my Department not to exceed $4,000 for this Forensic Evidence Computer. Purchase Order Number: Signed Date NOTE: No refunds will be allowed after receipt of signed authorization.

6 All applicants will be subjected to a background investigation. Deadline Date: August 10, 2007 for Forensic Computer Purchase & Student Application Deadline Date for Program Only: August 31, 2007 PLEASE TYPE/PRINT. DATE Name Last First Middle Rank/Title Present address Number Street City State Zip Telephone : ( ) - address: Department Name: Street Address: MCOLES License Number City State Zip Fax Number: ( ) Telephone : ( ) Computer Ability: (Please check one) Beginner Intermediate Check the systems/software which you are familiar with and rate your ability level (i.e. beginner, intermediate, advanced) Windows 95/2000 MS-DOS Windows NT Macintosh Novell Norton Utilities Advanced List other software programs and/or operating systems with which you have a working knowledge: How many years in Law Enforcement How many years as an Investigator/Detective or position with extensive investigative responsibilities State your current job responsibilities/duties (Specifically state investigator tasks ) Signature of applicant Date: Signature of Chief or Designate Date:

Training Program Overview

Training Program Overview Effective December 2006 Page 1/5 Engine Service Training Training Requirements Each Distributor and Full Service Dealer is required to staff technicians who have successfully completed authorized DEUTZ

More information

CYBER FORENSICS (W/LAB) Course Syllabus

CYBER FORENSICS (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 CYBER FORENSICS (W/LAB) Course Syllabus Course Number: CSFS-0020 OHLAP Credit: Yes OCAS Code: 8134 Course Length: 130 Hours Career Cluster: Information

More information

CST 244 Computer Forensics and Investigation Spring, 2010

CST 244 Computer Forensics and Investigation Spring, 2010 CST 244 Computer Forensics and Investigation Spring, 2010 Instructor: Guy Theriault Class Room: 221 Office: Rm 221 Class Hours: Mon thru Fri 8:00 to 10:50 Class Dates: Mar 8 to Apr 16 Office hours: Monday,

More information

Distance Education Certification Program Secondary Provider Application for Subsequent Course Certification This application is required for

Distance Education Certification Program Secondary Provider Application for Subsequent Course Certification This application is required for Distance Education Certification Program Secondary Provider Application for Subsequent Course Certification This application is required for secondary providers seeking certification for a course offered

More information

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge skills in computer

More information

Distance Education Certification Program Secondary Provider Application for Initial Certification This application is required for secondary

Distance Education Certification Program Secondary Provider Application for Initial Certification This application is required for secondary Distance Education Certification Program Secondary Provider Application for Initial Certification This application is required for secondary providers seeking certification for the first time or a course

More information

Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065

Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation

More information

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge

More information

Security and Computer Forensics ITP 477 (4 Units)

Security and Computer Forensics ITP 477 (4 Units) Security and Computer Forensics ITP 477 (4 Units) Description Objective Prerequisites/ Recommended Preparation Instructor Contacting the Instructor Lecture/Lab Required Textbooks Web Site Grading In 2007,

More information

Of the programs offered by IACIS, the Basic Computer Forensic Examiner (BCFE) Training Program is at the forefront.

Of the programs offered by IACIS, the Basic Computer Forensic Examiner (BCFE) Training Program is at the forefront. BCFE 2015 BASIC Certified Examiner Training Program Program Description and Syllabus Contents A. Program Overview B. Prerequisites C. Automated Tools, Hardware, and Software D. Required Equipment and Supplies

More information

The CSI Forensic Science Program

The CSI Forensic Science Program The CSI Forensic Science Program at Michigan State University A week-long day camp or residential program for students with a strong interest in forensic science. Level I: June 15 20 for students currently

More information

Monfort College of Business Semester Course Syllabus (2015-2016)

Monfort College of Business Semester Course Syllabus (2015-2016) Monfort College of Business Semester Course Syllabus (2015-2016) COURSE PREFIX/TITLE: BACS 371 Introduction to Computer Forensics Sem. Hrs. 3 Ed. Cap: 40 CATALOG DESCRIPTION: Prerequisite: BACS 300 or

More information

Charleston Southern University. CSI @ CSU Camp. June 16 th 20 st, 2014 Participant Application

Charleston Southern University. CSI @ CSU Camp. June 16 th 20 st, 2014 Participant Application Charleston Southern University CSI @ CSU Camp June 16 th 20 st, 2014 Participant Application Please complete all the required information (including signatures) and submit your application and a deposit

More information

CDFE Certified Digital Forensics Examiner (CFED Replacement)

CDFE Certified Digital Forensics Examiner (CFED Replacement) Course: CDFE Certified Digital Forensics Examiner (CFED Replacement) Description: Price: $3,450.00 Category: Popular Courses Duration: 5 days Schedule: Request Dates Outline: COURSE OVERVIEW Computer Forensics

More information

COS/PSA 412 Computer Forensics and Investigations

COS/PSA 412 Computer Forensics and Investigations COS/PSA 412 Computer Forensics and Investigations Date: November 18, 2003 Division: Natural and Behavioral Sciences Number of Credits: 4 Location: Nadeau 109 Meeting Times: TBD Course Description Computer

More information

MCOLES Information and Tracking Network. Security Policy. Version 2.0

MCOLES Information and Tracking Network. Security Policy. Version 2.0 MCOLES Information and Tracking Network Security Policy Version 2.0 Adopted: September 11, 2003 Effective: September 11, 2003 Amended: September 12, 2007 1.0 POLICY STATEMENT The Michigan Commission on

More information

KENTUCKY COMMISSION ON PROPRIETARY EDUCATION

KENTUCKY COMMISSION ON PROPRIETARY EDUCATION INSTRUCTIONS 1. This application must be typed or printed legibly and completed in its entirety. 2. This application and all supporting material must be submitted with the application fee in accordance

More information

Surgical Technology Accelerated Alternate Delivery (AAD) Program (For all students in the program January 2015 or later)

Surgical Technology Accelerated Alternate Delivery (AAD) Program (For all students in the program January 2015 or later) Surgical Technology Accelerated Alternate Delivery (AAD) Program (For all students in the program January 2015 or later) General Information The Accelerated Alternate Delivery (AAD) Pathway in Surgical

More information

CTC 328: Computer Forensics

CTC 328: Computer Forensics FALL 2010 CSUDH COMPUTER SCIENCE DEPARTMENT CTC 328: Computer Forensics Instructor: Adam Kaplan, Ph.D. E-Mail: akaplan@csudh.edu Office: NSM E-117 WWW (Blackboard Site): http://toro.csudh.edu Class Meetings:

More information

General Investigation Training Course Blended Learning Guide

General Investigation Training Course Blended Learning Guide www.cpkn.ca 1.866.357.CPKN (2756) Last updated November 2015 Table of Contents About the GIT Blended Learning Program... 1 Pre-Requisites... 1 Registering to GIT... 1 GIT Payment Policy... 2 Part I: Online

More information

Advanced Digital Forensics ITP 475 (4 Units)

Advanced Digital Forensics ITP 475 (4 Units) Advanced Digital Forensics ITP 475 (4 Units) Description In 2007, the FBI reported that over 200 major companies reported a loss of over 60 million dollars due to computer crime. Computers are becoming

More information

NATHAN M. WOLFE LAW ENFORCEMENT CADET ACADEMY Working Together Since 1973

NATHAN M. WOLFE LAW ENFORCEMENT CADET ACADEMY Working Together Since 1973 MARCH NATHAN M. WOLFE LAW ENFORCEMENT CADET ACADEMY Working Together Since 1973 APPLICATIONS DUE DATE: MAY 1, 2016 The Nathan M. Wolfe Law Enforcement Cadet Academy will be held at the South Carolina Criminal

More information

Professional Development Training Course Catalog Fall 2013 ITS. Offered by Furman University Information Technology Services

Professional Development Training Course Catalog Fall 2013 ITS. Offered by Furman University Information Technology Services Professional Development Training Course Catalog Fall 2013 ITS Offered by Furman University Information Technology Services in collaboration with Center for Teaching and Learning And the Library These

More information

Cyber Incident Forensic Response (CIFR) 2015

Cyber Incident Forensic Response (CIFR) 2015 Cyber Incident Forensic Response (CIFR) 2015 Cyber Incident Forensic Response Training Program Program Description and Syllabus Contents A. Program Overview B. Prerequisites C. Automated Forensic Tools,

More information

To Catch a Thief: Computer Forensics in the Classroom

To Catch a Thief: Computer Forensics in the Classroom To Catch a Thief: Computer Forensics in the Classroom Anna Carlin acarlin@csupomona.edu Steven S. Curl scurl@csupomona.edu Daniel Manson dmanson@csupomona.edu Computer Information Systems Department California

More information

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING MODULE A INTRODUCTION TO COMPUTER FORENSICS AND NVESTIGATIONS A1.0 Explain concepts related to computer forensics. A1.1 This module is measured

More information

INTERNSHIP OPPORTUNITIES

INTERNSHIP OPPORTUNITIES INTERNSHIP OPPORTUNITIES Criminal Justice Program, 3229 Sangren Hall Kalamazoo, Michigan 49008 Dr. Ron Kramer, Director; Ann P. Browning, Office Assistant, 3233 Sangren (Phone: 269-387-5271) The Criminal

More information

COWLEY COLLEGE & Area Vocational Technical School

COWLEY COLLEGE & Area Vocational Technical School COWLEY COLLEGE & Area Vocational Technical School COURSE PROCEDURE FOR Student Level: This course is open to students on the college level in either the freshman or sophomore year. Prerequisites: Basic

More information

The Hotchkiss School Information Technology Services. Service Level Agreement (SLA) with the Hotchkiss Community for Technology User Support

The Hotchkiss School Information Technology Services. Service Level Agreement (SLA) with the Hotchkiss Community for Technology User Support I. Summary The Hotchkiss School Information Technology Services Service Level Agreement (SLA) with the Hotchkiss Community for Technology User Support The Hotchkiss Information Technology Services (ITS)

More information

Hands-On How-To Computer Forensics Training

Hands-On How-To Computer Forensics Training j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE

More information

MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633

MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633 MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633 COLLEGE EDUCATION B.A. degree in Criminal Justice from Cal State, Fullerton in

More information

IDS and Penetration Testing Lab ISA 674

IDS and Penetration Testing Lab ISA 674 IDS and Penetration Testing Lab ISA 674 Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible Use

More information

CJ 4472 Cyber Crime Syllabus Term

CJ 4472 Cyber Crime Syllabus Term CJ 4472 Cyber Crime Syllabus Term 4 2016 For course syllabus posted prior to the beginning of the term, the instructor reserves the right to make minor changes prior to or during the term. The instructor

More information

Course Title: Computer Forensic Specialist: Data and Image Files

Course Title: Computer Forensic Specialist: Data and Image Files Course Title: Computer Forensic Specialist: Data and Image Files Page 1 of 9 Course Description The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute

More information

LICENSING AT A LOWER LEVEL

LICENSING AT A LOWER LEVEL EMS-APP-500 (11/2014) Michigan Department of Community Health Lansing, Michigan 48909 Website: www.michigan.gov/ems Authority: P.A. 368 of 1978, as amended This form is for information only. MICHIGAN COURSE

More information

Enclosed is the form you requested. Please complete the form in its entirety and return as directed below:

Enclosed is the form you requested. Please complete the form in its entirety and return as directed below: Dear MasterCard Class B Stockholder: Enclosed is the form you requested. Please complete the form in its entirety and return as directed below: Return Stock Transfer forms and s to at the following addresses:

More information

EC-Council Ethical Hacking and Countermeasures

EC-Council Ethical Hacking and Countermeasures EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

Criminal Justice Internship CRJ 280

Criminal Justice Internship CRJ 280 Criminal Justice Internship CRJ 280 An internship for Criminal Justice majors is highly suggested. In today s competitive job market, employers demand that applicants not only complete college coursework

More information

Implementing Security Education at a Small Community College

Implementing Security Education at a Small Community College PRACTICAL SECURITY Implementing Security Education at a Small Community College Corrinne Sande Whatcom Community College Abstract: Key words: This paper discusses modifying an existing two-year degree

More information

CERTIFIED TEACHER APPLICATION INSTRUCTIONS

CERTIFIED TEACHER APPLICATION INSTRUCTIONS School City of Whiting 1500 Center Street, Whiting, IN 46394 Phone: 219-659-0656 Fax: 219-473-4008 www.whiting.k12.in.us CERTIFIED TEACHER APPLICATION INSTRUCTIONS The completed employment application

More information

Computer and Information Science

Computer and Information Science Computer and Information Science www.odessa.edu/dept/computer Faculty: Katrieva Jones- Munroe, chair The computer information systems curriculum provides students with practical, job- related computer

More information

KENT CAREER TECHNICAL CENTER 2015-2016 CRIMINAL JUSTICE PROGRAM STUDENT APPLICATION CHECK LIST

KENT CAREER TECHNICAL CENTER 2015-2016 CRIMINAL JUSTICE PROGRAM STUDENT APPLICATION CHECK LIST KENT CAREER TECHNICAL CENTER 2015-2016 CRIMINAL JUSTICE PROGRAM STUDENT APPLICATION CHECK LIST This check sheet will assist you in making sure you have all the application sheets filled out and signed.

More information

Computer Forensics introduction part A

Computer Forensics introduction part A Computer Forensics introduction part A Dr. Magdalena Szeżyńska, CISA Institute of Electronic Systems WUT m.szezynska@elka.pw.edu.pl Summer 2016 Digital Forensic Investigation Concepts A digital investigation

More information

Course Syllabus - IST 454 Computer and Cyber Forensics General Course Information

Course Syllabus - IST 454 Computer and Cyber Forensics General Course Information General Course Information Department IST Number 454 Title Credits 3 Description Computer and Computer and communication technologies have become the key components to support critical infrastructure services

More information

RESEARCHING AND CHOOSING A SCHOOL

RESEARCHING AND CHOOSING A SCHOOL RESEARCHING AND CHOOSING A SCHOOL This section is to help you determine what school best suits your learning style and training needs. It is your responsibility to investigate all of the available courses

More information

RESEARCHING AND CHOOSING A SCHOOL

RESEARCHING AND CHOOSING A SCHOOL RESEARCHING AND CHOOSING A SCHOOL This section is to help you determine what school best suits your learning style and training needs. It is your responsibility to investigate all of the available courses

More information

Computer and Network Forensics INF 528 (3 Units)

Computer and Network Forensics INF 528 (3 Units) Computer and Network Forensics INF 528 (3 Units) Fall 2014 Description According to the Internet Crimes Complaint Center Annual Report, in 2011, there were over 300,000 incidents reported to the organization,

More information

Lean Strategies for Laboratory Testing

Lean Strategies for Laboratory Testing Microrite, Inc. brings you this unique learning experience in Lean Strategies for Laboratory Testing; Part of Microrite s step-by-step webinar series. Lean Strategies for Laboratory Testing erience in

More information

FRONT LINE SUPERVISOR PROGRAM INSTRUCTOR TEAM

FRONT LINE SUPERVISOR PROGRAM INSTRUCTOR TEAM NJSACOP FRONT LIINE SUPERVIISIION PROGRAM In Collaboration with the: Any supervisor/officer who is a committed law enforcement professional with a desire to lead people effectively and who is motivated

More information

information security and its Describe what drives the need for information security.

information security and its Describe what drives the need for information security. Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.

More information

Policy & Procedures Help Desk Service Level Agreement (SLA)

Policy & Procedures Help Desk Service Level Agreement (SLA) Policy & Procedures Help Desk Service Level Agreement (SLA), Rossey Hall, Room 058, Ext. 4357 TABLE OF CONTENTS Scope...1 Customer Service Statement...1 Help Desk Services...2 Hours of Operation...2 Methods

More information

Online Course Schedule

Online Course Schedule Online Course Schedule Through December 000 Introduction to Blackboard... 1 100 Getting Started Orientation Courses... 1 200 Teaching and Learning Online... 1 300 Advanced Teaching and Learning Online...

More information

INNOVATION. Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf

INNOVATION. Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf EDUCATION RESEARCH INNOVATION Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf Email: ncmf@ucdenver.edu Phone: 303.315.5850 Fax: 303.832.0483 JEFF M. SMITH, m.s.

More information

Christian Family & Children s Center Champion Christian School Technology Plan Outline January 2009

Christian Family & Children s Center Champion Christian School Technology Plan Outline January 2009 Christian Family & Children s Center Champion Christian School Technology Plan Outline January 2009 Vision Statement It is the vision of the Leadership team of the Christian Family & Children s Center

More information

Crime Scene investigation

Crime Scene investigation Crime Scene investigation This class focuses on crime scene investigation, evidence collection and documentation, the key components of any criminal investigation. This course will teach students the importance

More information

Computer Forensics (3 credit hours)

Computer Forensics (3 credit hours) Syllabus for Fall 2010 Computer Forensics (3 credit hours) COURSE INFORMATION Instructor: Smith Office: A 112-B Phone: 291-4920 Email: aurelia.smith@cv.edu Class Time: TH from 7:00 8:15 p.m. Room: A 112

More information

MANSFIELD POLICE DEPARTMENT CITIZEN S ACADEMY

MANSFIELD POLICE DEPARTMENT CITIZEN S ACADEMY MANSFIELD POLICE DEPARTMENT CITIZEN S ACADEMY In 1998 the Mansfield Police Department s first citizen s academy graduated. The curriculum and teaching methods are similar to the traditional police academy,

More information

Researching and Choosing a School

Researching and Choosing a School Researching and Choosing a School Updated May, 2015 This section is to help you determine what school best suits your learning style and training needs. It is your responsibility to investigate all of

More information

Citizens Academy Overview

Citizens Academy Overview If you reside, own property, or a own a business in the City of Sarasota, you are invited to apply for the Citizens Academy by downloading an application which is available on the Neighborhood and Development

More information

UNITED STATES DISTRICT COURT WESTERN DISTRICT OF NORTH CAROLINA CRIMINAL JUSTICE ACT ( CJA ) PANEL APPLICATION FORM

UNITED STATES DISTRICT COURT WESTERN DISTRICT OF NORTH CAROLINA CRIMINAL JUSTICE ACT ( CJA ) PANEL APPLICATION FORM UNITED STATES DISTRICT COURT WESTERN DISTRICT OF NORTH CAROLINA CRIMINAL JUSTICE ACT ( CJA ) PANEL APPLICATION FORM The following Application is to be completed by attorneys who wish to participate in

More information

INSTRUCTIONS FOR SECONDARY EMPLOYMENT APPROVAL APPLICATION FOR PRIVATE BUSINESSES AND PUBLIC AGENCIES AND FOR SPECIAL EVENTS

INSTRUCTIONS FOR SECONDARY EMPLOYMENT APPROVAL APPLICATION FOR PRIVATE BUSINESSES AND PUBLIC AGENCIES AND FOR SPECIAL EVENTS INSTRUCTIONS FOR SECONDARY EMPLOYMENT APPROVAL APPLICATION FOR PRIVATE BUSINESSES AND PUBLIC AGENCIES AND FOR SPECIAL EVENTS In order for San Jose police officers or reserve officers to be eligible work

More information

Introduction to Computer Forensics ITP 499 (3 Units)

Introduction to Computer Forensics ITP 499 (3 Units) Introduction to Computer Forensics ITP 499 (3 Units) Description In 2007, the FBI reported that over 200 major companies reported a loss of over 60 million dollars due to computer crime. Computers are

More information

CRIJ 1301 Introduction to Criminal Justice Course Syllabus: Summer 2015

CRIJ 1301 Introduction to Criminal Justice Course Syllabus: Summer 2015 CRIJ 1301 Introduction to Criminal Justice Course Syllabus: Summer 2015 Northeast Texas Community College exists to provide responsible, exemplary learning opportunities. Kevin P Rose, Ed.D. Office: BT

More information

Course Title: ITAP 3471: Web Server Management

Course Title: ITAP 3471: Web Server Management Course Title: ITAP 3471: Web Server Management Semester Credit Hours: 4 (3,1) I. Course Overview The primary objective of this course is to give students a comprehensive overview of the tools and techniques

More information

COURSE OUTLINE TEMPLATE (Computer Forensics CFR 712S)

COURSE OUTLINE TEMPLATE (Computer Forensics CFR 712S) Faculty Name Mr. Isaac Nhamu Name of Department COMPUTER SCIENCE COURSE OUTLINE TEMPLATE (Computer Forensics CFR 712S) STATEMENT ABOUT ACADEMIC HONESTY AND INTEGRITY All staff and students of the Namibia

More information

City of Holly Springs Citizen s Police Academy

City of Holly Springs Citizen s Police Academy City of Holly Springs Citizen s Police Academy City of Holly Springs Police 3235 Holly Springs Parkway Holly Springs, GA. 30115 Officer Greg Bettis 770.721.7526 dbettis@hollyspringsga.us 1 The Holly Springs

More information

Credit Application Terms

Credit Application Terms Dundee Manufacturing 107 Fairchild Drive Dundee, MI 48131 P: 734.529.2540 F: 734.529.3583 Credit Application Terms New Accounts To open a new credit account with Dundee Manufacturing please fill out the

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student

More information

Computing Services Helpdesk

Computing Services Helpdesk s e r v i c e l e v e l a g r e e m e n t Computing Services Helpdesk This document contains an agreement between the Computing Services (CS) Helpdesk and the Faculty, Staff, and Students (FSS, or Ross

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student

More information

INDIANAPOLIS, IN 2011 CATALOG Volume 78

INDIANAPOLIS, IN 2011 CATALOG Volume 78 TABLE OF CONTENTS CURRICULA 2 SCHOOL OF INFORMATION TECHNOLOGY 2 INFORMATION SYSTEMS AND CYBERSECURITY (RESIDENCE PROGRAM) 2 INFORMATION SYSTEMS AND CYBERSECURITY (ONLINE PROGRAM) 3 INFORMATION SYSTEMS

More information

MICHAEL W. LITTRELL Georgetown College Department of Sociology 400 East College Street Georgetown, KY 40324 michael_littrell@georgetowncollege.

MICHAEL W. LITTRELL Georgetown College Department of Sociology 400 East College Street Georgetown, KY 40324 michael_littrell@georgetowncollege. MICHAEL W. LITTRELL Georgetown College Department of Sociology 400 East College Street Georgetown, KY 40324 michael_littrell@georgetowncollege.edu EDUCATION Doctor of Philosophy (ABD) University Of Louisville,

More information

Palomar College San Marcos, California Contract for Directed/Independent Study Course

Palomar College San Marcos, California Contract for Directed/Independent Study Course San Marcos, California Please Print Course Number & Title SPCH 145 Section Number : Units 1 Semester & Year Spring 2015 Instructor Name Dewi Hokett Student Name: Student ID No.: Course Components: Specify

More information

SCM 432 Syllabus Spring 2015 Dr. Taube Page 1

SCM 432 Syllabus Spring 2015 Dr. Taube Page 1 SCM 432 Syllabus Spring 2015 Dr. Taube Page 1 University of North Carolina at Greensboro Bryan School of Business & Economics Department of Information Systems & Supply Chain Management Spring 2015 Course

More information

Administrative Services Operational Guidelines

Administrative Services Operational Guidelines Administrative Services Operational Guidelines Information Technology Introduction Mission Statement: To research, apply, and manager information technology to foster productive working and learning environments.

More information

Robotics Core School 1

Robotics Core School 1 Robotics Core School 1 Robotics Core School 2 Cyber Forensics & Crime Investigation This workshop is dedicated on Cyber Forensics & Crime Investigation. Computer Forensics is a detailed and scientific

More information

ACC 7145: ACCOUNTING SYSTEMS DESIGN AND CONTROL SYLLABUS FOR SUMMER SESSION 2014

ACC 7145: ACCOUNTING SYSTEMS DESIGN AND CONTROL SYLLABUS FOR SUMMER SESSION 2014 ACC 7145, Summer Session 2014 Page 1 Wayne State University School of Business Administration ACC 7145: ACCOUNTING SYSTEMS DESIGN AND CONTROL SYLLABUS FOR SUMMER SESSION 2014 Instructor Name: Office: Telephone:

More information

2015 Lean in Healthcare Certificate Course A comprehensive 8-day continuous improvement course for healthcare professionals

2015 Lean in Healthcare Certificate Course A comprehensive 8-day continuous improvement course for healthcare professionals 2015 Lean in Healthcare Certificate Course A comprehensive 8-day continuous improvement course for healthcare professionals Starting Friday, September 11, 2015 Concord Hospital, Concord, NH Featuring faculty

More information

Practical Nursing Program Information for Applicants

Practical Nursing Program Information for Applicants Practical Nursing Program Information for Applicants The application deadline is May 15, 2015 at noon. The Practical Nursing Program at ASUMH is designed to prepare the student to become a Licensed Practical

More information

elearning: Distance Student Services Student Guide

elearning: Distance Student Services Student Guide elearning: Distance Student Services Student Guide University of Alaska Anchorage elearning: Distance Student Services 3211 Providence Drive Anchorage, Alaska 99508 907.786.1730 / Toll Free: 855.582.2337

More information

817-504-6650 1531 Duncanville Road Dallas, TX 75211 msantiago@yahoo.com. Knowledge of regulatory agency rules Supervision experience

817-504-6650 1531 Duncanville Road Dallas, TX 75211 msantiago@yahoo.com. Knowledge of regulatory agency rules Supervision experience Highly accomplished Individual with extensive education and managerial experience. Has strong leadership and motivational skills, proven ability to manage and train both faculty and staff. Recognized for

More information

COOPERATIVE EDUCATION AND INTERNSHIP GUIDELINES

COOPERATIVE EDUCATION AND INTERNSHIP GUIDELINES COOPERATIVE EDUCATION AND INTERNSHIP GUIDELINES Career and Technical Education Division Career and Technical Education Initiatives We Make Houston Work Houston Community College Last Revised 05/01/13 Dr.

More information

Program Committee Report-Criminal Justice

Program Committee Report-Criminal Justice Program Committee Report-Criminal Justice Goals, Objectives, and Activities The Criminal Justice Program prepares students for careers in criminal justice or for further graduate or professional studies

More information

CJ 101.001 Introduction to Criminal Justice COURSE SYLLABUS: Spring 2013

CJ 101.001 Introduction to Criminal Justice COURSE SYLLABUS: Spring 2013 CJ 101.001 Introduction to Criminal Justice COURSE SYLLABUS: Spring 2013 Professor: Vincent Hunter Office Location: Ferguson SS 219 Office Hours: Tuesday and Thursday pm-2:00 pm by appointment Office Phone:

More information

DEPARTMENT OF HUMAN RESOURCES CITY OF NEW HAVEN

DEPARTMENT OF HUMAN RESOURCES CITY OF NEW HAVEN DEPARTMENT OF HUMAN RESOURCES CITY OF NEW HAVEN 200 Orange Street, New Haven, CT 06510 (203) 946-8252 (203) 946-7166 fax www.cityofnewhaven.com JOHN DeSTEFANO, JR. MAYOR EMMET P. HIBSON, JR. DIRECTOR of

More information

INTRODUCTION TO CRIMINAL JUSTICE 101 - FALL 2015

INTRODUCTION TO CRIMINAL JUSTICE 101 - FALL 2015 INTRODUCTION TO CRIMINAL JUSTICE 101 - FALL 2015 Instructor: Tom Pritchard Office: D-200C Office Hours: M/W 7:30 a.m. 8:20 a.m. E-mail: thomas.pritchard@bellevuecollege.edu Tuesday 11:30 a.m. 12:20 p.m.

More information

Ecorse Public Schools 27225 W. Outer Drive Ecorse, Michigan 48229 (313)294-4750/ (313)294-4769(fax)

Ecorse Public Schools 27225 W. Outer Drive Ecorse, Michigan 48229 (313)294-4750/ (313)294-4769(fax) Ecorse Public Schools 27225 W. Outer Drive Ecorse, Michigan 48229 (313)294-4750/ (313)294-4769(fax) October 23, 2015 RE: Technology Consultant Services The Ecorse Board of Education is desirous of receiving

More information

Instruction Guide Practice Round 2 High School August 2015

Instruction Guide Practice Round 2 High School August 2015 Instruction Guide Practice Round 2 High School August 2015 1 Maryland Cyber Challenge Practice Round Instruction Guide Table of Contents Introduction 3 Tips for Success 3 Round Times 3 Linux Virtual Machine

More information

Criminal Justice Careers Exploration. College Now Career Pathways Program Front Range Community College 2014-2015.

Criminal Justice Careers Exploration. College Now Career Pathways Program Front Range Community College 2014-2015. Criminal Justice Careers Exploration College Now Career Pathways Program Front Range Community College 2014-2015 Program Syllabus Career Pathways The Career Pathways program at Front Range Community College

More information

BASIC TRAINING FOR THE MEDICOLEGAL DEATH INVESTIGATOR. The New Mexico Office of the Medical Investigator. March 14-16, 2016.

BASIC TRAINING FOR THE MEDICOLEGAL DEATH INVESTIGATOR. The New Mexico Office of the Medical Investigator. March 14-16, 2016. BASIC TRAINING FOR THE MEDICOLEGAL DEATH INVESTIGATOR Presented by: The New Mexico Office of the Medical Investigator March 14-16, 2016 Albuquerque, NM ABOUT THE NM OFFICE OF THE MEDICAL INVESTIGATOR The

More information

REQUEST FOR PROPOSAL (RFP)

REQUEST FOR PROPOSAL (RFP) REQUEST FOR PROPOSAL (RFP) Subject: Due Date/Time: Submit To: Financial Management & Utility Billing Software March 28, 201412:00 pm Eastern Standard Time Chris Wilson Village of Beverly Hills 18500 W

More information

HIT Practice Workflow & Information Management Redesign Presented by Ivy Tech Corporate College

HIT Practice Workflow & Information Management Redesign Presented by Ivy Tech Corporate College COURSE NUMBER: HLTHHIT2 87120: Fall 2014 CREDIT: Non-Credit CEUs: 0 PREREQUISITES: Individuals in this role will be licensed clinical or public health professionals; or in the case of public health, they

More information

INTERNATIONAL BACCALAUREATE (IB)

INTERNATIONAL BACCALAUREATE (IB) TEACHER DEVELOPMENT AND EDUCATIONAL STUDIES SCHOOL OF EDUCATION AND HUMAN SERVICES INTERNATIONAL BACCALAUREATE (IB) Certificate in Teaching and Learning Thank you for your interest in Oakland University

More information

Universität Mannheim Praktische Informatik I

Universität Mannheim Praktische Informatik I Universität Mannheim Praktische Informatik I 21.03.2007 Examining and imaging data on running systems using LiveWire" Steven W. Wood Master of Science (Florida Institute of Technology) ALSTE Technologies

More information

Professional Business Communications

Professional Business Communications BASIC PUBLIC RELATIONS EXTENSION CERTIFICATE Professional Business Communications Extension Certificate Program Information Guide Policies ~ Guidelines ~ Descriptions 1 Professional Business Communications

More information

Systems Support - Standard

Systems Support - Standard 1 General Overview This is a Service Level Agreement ( SLA ) between document: and Enterprise Windows Services to The technology services Enterprise Windows Services provides to the customer The targets

More information

Florida s Best and Brightest Scholarship Program. Q & A (updated: 9/18/15)

Florida s Best and Brightest Scholarship Program. Q & A (updated: 9/18/15) Florida s Best and Brightest Scholarship Program Q & A (updated: 9/18/15) The State of Florida created the new Best and Brightest Teacher Scholarship Program to attract and retain high academic achievers

More information

Course Syllabus CRIJ-1301-001 Introduction to Criminal Justice Spring 2012 Tuesday & Thursday 2:50-4:05pm

Course Syllabus CRIJ-1301-001 Introduction to Criminal Justice Spring 2012 Tuesday & Thursday 2:50-4:05pm Course Syllabus CRIJ-1301-001 Introduction to Criminal Justice Spring 2012 Tuesday & Thursday 2:50-4:05pm 1. Course: CRIJ 1301-01 Introduction to Criminal Justice 2. Instructor: Edwin Ueckert, M.S., Criminal

More information

2. Neither the name of SWGIT, nor the names of its contributors, may be used to endorse or promote products derived from its documents.

2. Neither the name of SWGIT, nor the names of its contributors, may be used to endorse or promote products derived from its documents. Disclaimer: As a condition to the use of this document and the information contained herein, the SWGIT requests notification by e-mail before or contemporaneously to the introduction of this document,

More information