RE: School of Computer Forensic Investigation, Class 7, Eastern Michigan University

Size: px
Start display at page:

Download "RE: School of Computer Forensic Investigation, Class 7, Eastern Michigan University"

Transcription

1 December 12, 2006 RE: School of Computer Forensic Investigation, Class 7, Eastern Michigan University Dear Applicant Agency: The Center for Regional and National Security are pleased to announce the seventh Computer Forensic Investigation School to be offered to law enforcement agencies, starting September 10 th, Overview The School of Computer Forensic Investigation at Eastern Michigan University is quickly gaining a national reputation for excellence. Designed for the law enforcement community, this unique educational/training program has been developed with cooperation from our instructors in law enforcement, business and industry. These professionals provide comprehensive instruction relevant to the recent developments in the field of computer forensics. The classroom experience is supplemented with lecture and textbook materials. Considerable time is spent developing hands-on skills in an academic lab setting. Participants spend the majority of their class time doing analysis and implementing new techniques rather than talking about forensics. This hands-on training enhances the student s ability to return to their departments and start processing cases without the need for additional training. The School of Computer Forensic Investigation has been built upon our over 15 year history of Eastern Michigan University s efforts to provide advanced training within the law enforcement community of Michigan. The Center for Regional and National Security at E.M.U. is continuing to incorporate and develop new technologies in their educational programs. Participants in the School of Computer Forensic Investigation will be exposed to a new paradigm of criminal investigation rooted in the technological process. Students can immediately transfer the skills and knowledge learned in the program to their workplace. Instructors The School of Computer Forensic Investigation has developed relationships with leading edge industry professionals. Our faculty consists of professionals from the Department of Defense, the State Attorney General s Office, Air Force Intrusion Testing, Sprint Communications, as well as other private technology companies, and law enforcement personnel. In the private sector these individuals hold positions as Systems Engineers, Senior Systems Security Professionals, Cybercrime Investigators, Computer Forensics Examiners, Network Security Administrators,

2 teachers and trainers. Our faculty is content experts in their respective fields, many hold advanced degrees. Certification Students who successfully complete the entire program including required examinations and projects will be granted a certificate of successful completion as a Basic Certified Computer Forensic Examiner. Forensic Evidence Computer In week one of the program the students will build their own Forensic Computer. This accomplishes two goals. 1) The students learn about hardware issues and the need to have a sound basis of the internal workings of the computer. 2) The student will leave with a computer that they built as part of their studies. This is a state of the art machine that they will take back to their respective agency and do the analysis required of computer forensic examiners. This machine has been designed by one of Michigan s leading computer forensic examiners. While it is not required that each student purchase this machine, it affords those departments an opportunity to not only have an individual trained but he/she will have the necessary hardware tools once they graduate to start conducting forensic analysis when they return to their respective agencies. Estimated cost for this device is pending; please call for further information (EST under $4,000, which is a considerable savings over commercially produced Forensic Devices with a price tag of over $6,500.) All machines are state of the art. The Deadline for Ordering is August 10, 2007 If you desire to have us purchase the components for your student to assemble this computer please fill out the attached consent form and mail it with your registration. The curriculum of study has been developed with feedback from a number of working law enforcement computer forensic examiners. The curriculum is presented for your review:

3 Curriculum of Instruction Week 1: September Topic Hours Introduction to Forensics School... 2 Building the Forensic Computer Windows XP... 7 Linux Software Installation & Setup... 7 Week 2: September Physical/Logical Disk Structure DOS Basics/Advanced, Disk Edit FAT Windows Operating Systems Windows XP, NTFS, Logs... 7 Windows Registry File/Artifacts... 7 Week 3: October 8-12 Using Linux for Forensic Analysis Practical Examination Week 4: October Topic Hours Validation of Forensic Hardware/Software... 7 External Media- CD/DVD + Digital Film... 7 Report Writing Network Investigations Practical Examination Week 5: October 29 November 2 Preparation of Analysis Media Image Restoration Automated Forensic Tools for Image Analysis Week 6: November 5-9 Field Acquisition Kit and Methodology... 7 Search and Seizure Electronic Media Legal Issues in Forensic Investigations Access Data Password Cracking Software... 7 Encryption/Steganography... 7 Final Examination Evaluations and Graduation Times Classes will meet Monday through Friday from 8:00 a.m. to 4:00 p.m. The course is 6-weeks in length. Location Classes will be held in Room 8, Roosevelt Hall. Application Information Applicants are required to complete a formal application in its entirety. All applications must be typed before being submitted to the address below. Cost $800.00** The majority** of the costs have been funded by a grant from the Michigan Justice Training Commission. Additional program fees for this course are $800.00** per applicant excluding the costs for the computer. The computer cost will be determined, costs to not exceed $4,000. Compare these costs with other nationally recognized one week courses. **Pending Final Approval from the Michigan Justice Training Commission.

4 No refunds will be honored after the registration date. Student substitutions will be permitted. Selection Criteria 1. Applicants from departments demonstrating significant need will be given first priority for admissions. 2. Qualified federal, state, and local police and sheriff department personnel receive preferential consideration. 3. It is necessary that applicants have an understanding of computers and a background in criminal investigations. 4. It is suggested that all applicants have completed the School of Computer Cyber Crime Investigations. (Similar or related training can be substituted.) 5. All applicants are subject to background investigation. College Credit Eastern Michigan University offers participants in the School of Computer Forensic Investigation an opportunity to receive university credit. Details can be obtained by contacting the Center for Regional and National Security at the numbers indicated below. Further Registration Information. Deadline for Program Registration only August 31, 2007 Michael Yauk, mike.yauk@emich.edu Skip Lawver, skip.lawver@emich.edu Phone Fax Respectfully, Mike Yauk Platform Associate, Information Assurance

5 Authorization to Purchase Computer Components Authorization is hereby granted to Eastern Michigan University to purchase the following computer components for The School of Computer Forensic Investigation. The computer will be the property of Police Department upon completion of the training course. Eastern Michigan University is authorized to bill my Department not to exceed $4,000 for this Forensic Evidence Computer. Purchase Order Number: Signed Date NOTE: No refunds will be allowed after receipt of signed authorization.

6 All applicants will be subjected to a background investigation. Deadline Date: August 10, 2007 for Forensic Computer Purchase & Student Application Deadline Date for Program Only: August 31, 2007 PLEASE TYPE/PRINT. DATE Name Last First Middle Rank/Title Present address Number Street City State Zip Telephone : ( ) - address: Department Name: Street Address: MCOLES License Number City State Zip Fax Number: ( ) Telephone : ( ) Computer Ability: (Please check one) Beginner Intermediate Check the systems/software which you are familiar with and rate your ability level (i.e. beginner, intermediate, advanced) Windows 95/2000 MS-DOS Windows NT Macintosh Novell Norton Utilities Advanced List other software programs and/or operating systems with which you have a working knowledge: How many years in Law Enforcement How many years as an Investigator/Detective or position with extensive investigative responsibilities State your current job responsibilities/duties (Specifically state investigator tasks ) Signature of applicant Date: Signature of Chief or Designate Date:

Training Program Overview

Training Program Overview Effective December 2006 Page 1/5 Engine Service Training Training Requirements Each Distributor and Full Service Dealer is required to staff technicians who have successfully completed authorized DEUTZ

More information

CYBER FORENSICS (W/LAB) Course Syllabus

CYBER FORENSICS (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 CYBER FORENSICS (W/LAB) Course Syllabus Course Number: CSFS-0020 OHLAP Credit: Yes OCAS Code: 8134 Course Length: 130 Hours Career Cluster: Information

More information

Distance Education Certification Program Secondary Provider Application for Subsequent Course Certification This application is required for

Distance Education Certification Program Secondary Provider Application for Subsequent Course Certification This application is required for Distance Education Certification Program Secondary Provider Application for Subsequent Course Certification This application is required for secondary providers seeking certification for a course offered

More information

CST 244 Computer Forensics and Investigation Spring, 2010

CST 244 Computer Forensics and Investigation Spring, 2010 CST 244 Computer Forensics and Investigation Spring, 2010 Instructor: Guy Theriault Class Room: 221 Office: Rm 221 Class Hours: Mon thru Fri 8:00 to 10:50 Class Dates: Mar 8 to Apr 16 Office hours: Monday,

More information

Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065

Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation

More information

Charleston Southern University. CSI @ CSU Camp. June 16 th 20 st, 2014 Participant Application

Charleston Southern University. CSI @ CSU Camp. June 16 th 20 st, 2014 Participant Application Charleston Southern University CSI @ CSU Camp June 16 th 20 st, 2014 Participant Application Please complete all the required information (including signatures) and submit your application and a deposit

More information

Security and Computer Forensics ITP 477 (4 Units)

Security and Computer Forensics ITP 477 (4 Units) Security and Computer Forensics ITP 477 (4 Units) Description Objective Prerequisites/ Recommended Preparation Instructor Contacting the Instructor Lecture/Lab Required Textbooks Web Site Grading In 2007,

More information

Monfort College of Business Semester Course Syllabus (2015-2016)

Monfort College of Business Semester Course Syllabus (2015-2016) Monfort College of Business Semester Course Syllabus (2015-2016) COURSE PREFIX/TITLE: BACS 371 Introduction to Computer Forensics Sem. Hrs. 3 Ed. Cap: 40 CATALOG DESCRIPTION: Prerequisite: BACS 300 or

More information

The CSI Forensic Science Program

The CSI Forensic Science Program The CSI Forensic Science Program at Michigan State University A week-long day camp or residential program for students with a strong interest in forensic science. Level I: June 15 20 for students currently

More information

Of the programs offered by IACIS, the Basic Computer Forensic Examiner (BCFE) Training Program is at the forefront.

Of the programs offered by IACIS, the Basic Computer Forensic Examiner (BCFE) Training Program is at the forefront. BCFE 2015 BASIC Certified Examiner Training Program Program Description and Syllabus Contents A. Program Overview B. Prerequisites C. Automated Tools, Hardware, and Software D. Required Equipment and Supplies

More information

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge skills in computer

More information

Distance Education Certification Program Secondary Provider Application for Initial Certification This application is required for secondary

Distance Education Certification Program Secondary Provider Application for Initial Certification This application is required for secondary Distance Education Certification Program Secondary Provider Application for Initial Certification This application is required for secondary providers seeking certification for the first time or a course

More information

Advanced Digital Forensics ITP 475 (4 Units)

Advanced Digital Forensics ITP 475 (4 Units) Advanced Digital Forensics ITP 475 (4 Units) Description In 2007, the FBI reported that over 200 major companies reported a loss of over 60 million dollars due to computer crime. Computers are becoming

More information

Surgical Technology Accelerated Alternate Delivery (AAD) Program (For all students in the program January 2015 or later)

Surgical Technology Accelerated Alternate Delivery (AAD) Program (For all students in the program January 2015 or later) Surgical Technology Accelerated Alternate Delivery (AAD) Program (For all students in the program January 2015 or later) General Information The Accelerated Alternate Delivery (AAD) Pathway in Surgical

More information

CTC 328: Computer Forensics

CTC 328: Computer Forensics FALL 2010 CSUDH COMPUTER SCIENCE DEPARTMENT CTC 328: Computer Forensics Instructor: Adam Kaplan, Ph.D. E-Mail: akaplan@csudh.edu Office: NSM E-117 WWW (Blackboard Site): http://toro.csudh.edu Class Meetings:

More information

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge

More information

COS/PSA 412 Computer Forensics and Investigations

COS/PSA 412 Computer Forensics and Investigations COS/PSA 412 Computer Forensics and Investigations Date: November 18, 2003 Division: Natural and Behavioral Sciences Number of Credits: 4 Location: Nadeau 109 Meeting Times: TBD Course Description Computer

More information

RESEARCHING AND CHOOSING A SCHOOL

RESEARCHING AND CHOOSING A SCHOOL RESEARCHING AND CHOOSING A SCHOOL This section is to help you determine what school best suits your learning style and training needs. It is your responsibility to investigate all of the available courses

More information

Computer and Network Forensics INF 528 (3 Units)

Computer and Network Forensics INF 528 (3 Units) Computer and Network Forensics INF 528 (3 Units) Fall 2014 Description According to the Internet Crimes Complaint Center Annual Report, in 2011, there were over 300,000 incidents reported to the organization,

More information

CDFE Certified Digital Forensics Examiner (CFED Replacement)

CDFE Certified Digital Forensics Examiner (CFED Replacement) Course: CDFE Certified Digital Forensics Examiner (CFED Replacement) Description: Price: $3,450.00 Category: Popular Courses Duration: 5 days Schedule: Request Dates Outline: COURSE OVERVIEW Computer Forensics

More information

Computer and Information Science

Computer and Information Science Computer and Information Science www.odessa.edu/dept/computer Faculty: Katrieva Jones- Munroe, chair The computer information systems curriculum provides students with practical, job- related computer

More information

COWLEY COLLEGE & Area Vocational Technical School

COWLEY COLLEGE & Area Vocational Technical School COWLEY COLLEGE & Area Vocational Technical School COURSE PROCEDURE FOR Student Level: This course is open to students on the college level in either the freshman or sophomore year. Prerequisites: Basic

More information

Professional Development Training Course Catalog Fall 2013 ITS. Offered by Furman University Information Technology Services

Professional Development Training Course Catalog Fall 2013 ITS. Offered by Furman University Information Technology Services Professional Development Training Course Catalog Fall 2013 ITS Offered by Furman University Information Technology Services in collaboration with Center for Teaching and Learning And the Library These

More information

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING MODULE A INTRODUCTION TO COMPUTER FORENSICS AND NVESTIGATIONS A1.0 Explain concepts related to computer forensics. A1.1 This module is measured

More information

Criminal Justice Internship CRJ 280

Criminal Justice Internship CRJ 280 Criminal Justice Internship CRJ 280 An internship for Criminal Justice majors is highly suggested. In today s competitive job market, employers demand that applicants not only complete college coursework

More information

NATHAN M. WOLFE LAW ENFORCEMENT CADET ACADEMY Working Together Since 1973

NATHAN M. WOLFE LAW ENFORCEMENT CADET ACADEMY Working Together Since 1973 MARCH NATHAN M. WOLFE LAW ENFORCEMENT CADET ACADEMY Working Together Since 1973 APPLICATIONS DUE DATE: MAY 1, 2016 The Nathan M. Wolfe Law Enforcement Cadet Academy will be held at the South Carolina Criminal

More information

EC-Council Ethical Hacking and Countermeasures

EC-Council Ethical Hacking and Countermeasures EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633

MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633 MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633 COLLEGE EDUCATION B.A. degree in Criminal Justice from Cal State, Fullerton in

More information

Hands-On How-To Computer Forensics Training

Hands-On How-To Computer Forensics Training j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE

More information

INTRODUCTION TO CRIMINAL JUSTICE 101 - FALL 2015

INTRODUCTION TO CRIMINAL JUSTICE 101 - FALL 2015 INTRODUCTION TO CRIMINAL JUSTICE 101 - FALL 2015 Instructor: Tom Pritchard Office: D-200C Office Hours: M/W 7:30 a.m. 8:20 a.m. E-mail: thomas.pritchard@bellevuecollege.edu Tuesday 11:30 a.m. 12:20 p.m.

More information

Program Committee Report-Criminal Justice

Program Committee Report-Criminal Justice Program Committee Report-Criminal Justice Goals, Objectives, and Activities The Criminal Justice Program prepares students for careers in criminal justice or for further graduate or professional studies

More information

Digital Forensics Workforce Training for Wounded Warriors

Digital Forensics Workforce Training for Wounded Warriors Digital Forensics Workforce Training for Wounded Warriors David A. Dampier 1, Kendall Blaylock 2, Robert Wesley McGrew 3 Abstract Mississippi State University has a long history of providing digital forensics

More information

To Catch a Thief: Computer Forensics in the Classroom

To Catch a Thief: Computer Forensics in the Classroom To Catch a Thief: Computer Forensics in the Classroom Anna Carlin acarlin@csupomona.edu Steven S. Curl scurl@csupomona.edu Daniel Manson dmanson@csupomona.edu Computer Information Systems Department California

More information

Computer Forensics (3 credit hours)

Computer Forensics (3 credit hours) Syllabus for Fall 2010 Computer Forensics (3 credit hours) COURSE INFORMATION Instructor: Smith Office: A 112-B Phone: 291-4920 Email: aurelia.smith@cv.edu Class Time: TH from 7:00 8:15 p.m. Room: A 112

More information

Policy & Procedures Help Desk Service Level Agreement (SLA)

Policy & Procedures Help Desk Service Level Agreement (SLA) Policy & Procedures Help Desk Service Level Agreement (SLA), Rossey Hall, Room 058, Ext. 4357 TABLE OF CONTENTS Scope...1 Customer Service Statement...1 Help Desk Services...2 Hours of Operation...2 Methods

More information

Course Title: Computer Forensic Specialist: Data and Image Files

Course Title: Computer Forensic Specialist: Data and Image Files Course Title: Computer Forensic Specialist: Data and Image Files Page 1 of 9 Course Description The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute

More information

INTERNSHIP OPPORTUNITIES

INTERNSHIP OPPORTUNITIES INTERNSHIP OPPORTUNITIES Criminal Justice Program, 3229 Sangren Hall Kalamazoo, Michigan 49008 Dr. Ron Kramer, Director; Ann P. Browning, Office Assistant, 3233 Sangren (Phone: 269-387-5271) The Criminal

More information

CRIJ 1301 Introduction to Criminal Justice Course Syllabus: Summer 2015

CRIJ 1301 Introduction to Criminal Justice Course Syllabus: Summer 2015 CRIJ 1301 Introduction to Criminal Justice Course Syllabus: Summer 2015 Northeast Texas Community College exists to provide responsible, exemplary learning opportunities. Kevin P Rose, Ed.D. Office: BT

More information

Cyber Incident Forensic Response (CIFR) 2015

Cyber Incident Forensic Response (CIFR) 2015 Cyber Incident Forensic Response (CIFR) 2015 Cyber Incident Forensic Response Training Program Program Description and Syllabus Contents A. Program Overview B. Prerequisites C. Automated Forensic Tools,

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student

More information

Introduction to Computer Forensics ITP 499 (3 Units)

Introduction to Computer Forensics ITP 499 (3 Units) Introduction to Computer Forensics ITP 499 (3 Units) Description In 2007, the FBI reported that over 200 major companies reported a loss of over 60 million dollars due to computer crime. Computers are

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student

More information

KENT CAREER TECHNICAL CENTER 2015-2016 CRIMINAL JUSTICE PROGRAM STUDENT APPLICATION CHECK LIST

KENT CAREER TECHNICAL CENTER 2015-2016 CRIMINAL JUSTICE PROGRAM STUDENT APPLICATION CHECK LIST KENT CAREER TECHNICAL CENTER 2015-2016 CRIMINAL JUSTICE PROGRAM STUDENT APPLICATION CHECK LIST This check sheet will assist you in making sure you have all the application sheets filled out and signed.

More information

CERTIFIED TEACHER APPLICATION INSTRUCTIONS

CERTIFIED TEACHER APPLICATION INSTRUCTIONS School City of Whiting 1500 Center Street, Whiting, IN 46394 Phone: 219-659-0656 Fax: 219-473-4008 www.whiting.k12.in.us CERTIFIED TEACHER APPLICATION INSTRUCTIONS The completed employment application

More information

COURSE OUTLINE TEMPLATE (Computer Forensics CFR 712S)

COURSE OUTLINE TEMPLATE (Computer Forensics CFR 712S) Faculty Name Mr. Isaac Nhamu Name of Department COMPUTER SCIENCE COURSE OUTLINE TEMPLATE (Computer Forensics CFR 712S) STATEMENT ABOUT ACADEMIC HONESTY AND INTEGRITY All staff and students of the Namibia

More information

MCOLES Information and Tracking Network. Security Policy. Version 2.0

MCOLES Information and Tracking Network. Security Policy. Version 2.0 MCOLES Information and Tracking Network Security Policy Version 2.0 Adopted: September 11, 2003 Effective: September 11, 2003 Amended: September 12, 2007 1.0 POLICY STATEMENT The Michigan Commission on

More information

General Investigation Training Course Blended Learning Guide

General Investigation Training Course Blended Learning Guide www.cpkn.ca 1.866.357.CPKN (2756) Last updated November 2015 Table of Contents About the GIT Blended Learning Program... 1 Pre-Requisites... 1 Registering to GIT... 1 GIT Payment Policy... 2 Part I: Online

More information

MANSFIELD POLICE DEPARTMENT CITIZEN S ACADEMY

MANSFIELD POLICE DEPARTMENT CITIZEN S ACADEMY MANSFIELD POLICE DEPARTMENT CITIZEN S ACADEMY In 1998 the Mansfield Police Department s first citizen s academy graduated. The curriculum and teaching methods are similar to the traditional police academy,

More information

RESEARCHING AND CHOOSING A SCHOOL

RESEARCHING AND CHOOSING A SCHOOL RESEARCHING AND CHOOSING A SCHOOL This section is to help you determine what school best suits your learning style and training needs. It is your responsibility to investigate all of the available courses

More information

Course Syllabus - IST 454 Computer and Cyber Forensics General Course Information

Course Syllabus - IST 454 Computer and Cyber Forensics General Course Information General Course Information Department IST Number 454 Title Credits 3 Description Computer and Computer and communication technologies have become the key components to support critical infrastructure services

More information

The Hotchkiss School Information Technology Services. Service Level Agreement (SLA) with the Hotchkiss Community for Technology User Support

The Hotchkiss School Information Technology Services. Service Level Agreement (SLA) with the Hotchkiss Community for Technology User Support I. Summary The Hotchkiss School Information Technology Services Service Level Agreement (SLA) with the Hotchkiss Community for Technology User Support The Hotchkiss Information Technology Services (ITS)

More information

Computer Forensics introduction part A

Computer Forensics introduction part A Computer Forensics introduction part A Dr. Magdalena Szeżyńska, CISA Institute of Electronic Systems WUT m.szezynska@elka.pw.edu.pl Summer 2016 Digital Forensic Investigation Concepts A digital investigation

More information

KENTUCKY COMMISSION ON PROPRIETARY EDUCATION

KENTUCKY COMMISSION ON PROPRIETARY EDUCATION INSTRUCTIONS 1. This application must be typed or printed legibly and completed in its entirety. 2. This application and all supporting material must be submitted with the application fee in accordance

More information

Implementing Security Education at a Small Community College

Implementing Security Education at a Small Community College PRACTICAL SECURITY Implementing Security Education at a Small Community College Corrinne Sande Whatcom Community College Abstract: Key words: This paper discusses modifying an existing two-year degree

More information

Online Course Schedule

Online Course Schedule Online Course Schedule Through December 000 Introduction to Blackboard... 1 100 Getting Started Orientation Courses... 1 200 Teaching and Learning Online... 1 300 Advanced Teaching and Learning Online...

More information

Citizens Academy Overview

Citizens Academy Overview If you reside, own property, or a own a business in the City of Sarasota, you are invited to apply for the Citizens Academy by downloading an application which is available on the Neighborhood and Development

More information

HIT Practice Workflow & Information Management Redesign Presented by Ivy Tech Corporate College

HIT Practice Workflow & Information Management Redesign Presented by Ivy Tech Corporate College COURSE NUMBER: HLTHHIT2 87120: Fall 2014 CREDIT: Non-Credit CEUs: 0 PREREQUISITES: Individuals in this role will be licensed clinical or public health professionals; or in the case of public health, they

More information

Enclosed is the form you requested. Please complete the form in its entirety and return as directed below:

Enclosed is the form you requested. Please complete the form in its entirety and return as directed below: Dear MasterCard Class B Stockholder: Enclosed is the form you requested. Please complete the form in its entirety and return as directed below: Return Stock Transfer forms and s to at the following addresses:

More information

Robotics Core School 1

Robotics Core School 1 Robotics Core School 1 Robotics Core School 2 Cyber Forensics & Crime Investigation This workshop is dedicated on Cyber Forensics & Crime Investigation. Computer Forensics is a detailed and scientific

More information

What is a FRCC College School Transcript?

What is a FRCC College School Transcript? Criminal Justice Careers Exploration College Now Career Pathways Program Front Range Community College 2014-2015 Program Syllabus Career Pathways The Career Pathways program at Front Range Community College

More information

Instruction Guide Practice Round 2 High School August 2015

Instruction Guide Practice Round 2 High School August 2015 Instruction Guide Practice Round 2 High School August 2015 1 Maryland Cyber Challenge Practice Round Instruction Guide Table of Contents Introduction 3 Tips for Success 3 Round Times 3 Linux Virtual Machine

More information

INDIANAPOLIS, IN 2011 CATALOG Volume 78

INDIANAPOLIS, IN 2011 CATALOG Volume 78 TABLE OF CONTENTS CURRICULA 2 SCHOOL OF INFORMATION TECHNOLOGY 2 INFORMATION SYSTEMS AND CYBERSECURITY (RESIDENCE PROGRAM) 2 INFORMATION SYSTEMS AND CYBERSECURITY (ONLINE PROGRAM) 3 INFORMATION SYSTEMS

More information

TOWN OF POUGHKEEPSIE POLICE DEPARTMENT

TOWN OF POUGHKEEPSIE POLICE DEPARTMENT TOWN OF POUGHKEEPSIE POLICE DEPARTMENT INFORMATION PACKET OVERVIEW The Town of Poughkeepsie Police Department is seeking to provide an innovative program for youth residing in the Town of Poughkeepsie.

More information

Palomar College San Marcos, California Contract for Directed/Independent Study Course

Palomar College San Marcos, California Contract for Directed/Independent Study Course San Marcos, California Please Print Course Number & Title SPCH 145 Section Number : Units 1 Semester & Year Spring 2015 Instructor Name Dewi Hokett Student Name: Student ID No.: Course Components: Specify

More information

Training and Certification. ACT Program Overview Apple Certified Trainer Program

Training and Certification. ACT Program Overview Apple Certified Trainer Program Training and Certification ACT Program Overview Apple Certified Trainer Program ACT Program Overview Apple Certified Trainer Program Contents About the Program... 3 Becoming an ACT for Creative... 6 Becoming

More information

Innovative Course Application 2011-2012. Submission Deadline: Tuesday, November 30, 2010. NO applications may be accepted after that deadline.

Innovative Course Application 2011-2012. Submission Deadline: Tuesday, November 30, 2010. NO applications may be accepted after that deadline. Instructions: Innovative Course Application 2011-2012 Submission Deadline: Tuesday, November 30, 2010. NO applications may be accepted after that deadline. 1. Complete this application with care, remembering

More information

Florida s Best and Brightest Scholarship Program. Q & A (updated: 9/18/15)

Florida s Best and Brightest Scholarship Program. Q & A (updated: 9/18/15) Florida s Best and Brightest Scholarship Program Q & A (updated: 9/18/15) The State of Florida created the new Best and Brightest Teacher Scholarship Program to attract and retain high academic achievers

More information

Course Syllabus CRIJ-1301-001 Introduction to Criminal Justice Spring 2012 Tuesday & Thursday 2:50-4:05pm

Course Syllabus CRIJ-1301-001 Introduction to Criminal Justice Spring 2012 Tuesday & Thursday 2:50-4:05pm Course Syllabus CRIJ-1301-001 Introduction to Criminal Justice Spring 2012 Tuesday & Thursday 2:50-4:05pm 1. Course: CRIJ 1301-01 Introduction to Criminal Justice 2. Instructor: Edwin Ueckert, M.S., Criminal

More information

Crafting an Undergraduate Information Security Emphasis Within Information Technology

Crafting an Undergraduate Information Security Emphasis Within Information Technology Crafting an Undergraduate Information Security Emphasis Within Information Technology Patricia Y. Logan, Ph.D. Information Systems and Technologies, Weber State University Ogden, Utah, 84408-3804 plogan@weber.edu

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Cyber Security Training & Consulting Certified Digital COURSE OVERVIEW 5 Days 40 CPE Credits $3,000 Digital is the investigation and recovery of data contained in digital devices. This data is often the

More information

How To Get A Law Degree In Alabama

How To Get A Law Degree In Alabama THE UNIVERSITY OF ALABAMA SCHOOL OF LAW GRADUATE PROGRAMS Is the LL.M. Right for You? Information Guide A L A B A M A S L L. M. P R O G R A M S Why get an LL.M.? T he LL.M. Concentrations in Tax and Business

More information

IDS and Penetration Testing Lab ISA 674

IDS and Penetration Testing Lab ISA 674 IDS and Penetration Testing Lab ISA 674 Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible Use

More information

CMJ 105 - INTRODUCTION TO FORENSIC SCIENCE Fall Syllabus 2015. 4:30 5:30 p.m.

CMJ 105 - INTRODUCTION TO FORENSIC SCIENCE Fall Syllabus 2015. 4:30 5:30 p.m. CMJ 105 - INTRODUCTION TO FORENSIC SCIENCE Fall Syllabus 2015 INSTRUCTOR INFORMATION Associate Professor David Striegel Guerrieri Hall, Room 202D Office Phone: 410-572-8755 Office Hours: Monday Tuesday

More information

EAST VALLEY INSTITUTE OF TECHNOLOGY JOB DESCRIPTION

EAST VALLEY INSTITUTE OF TECHNOLOGY JOB DESCRIPTION EAST VALLEY INSTITUTE OF TECHNOLOGY JOB DESCRIPTION JOB TITLE: Medical Assistant Instructor DIVISION: School STATUS: Full-Time/Exempt DEPARTMENT: Instruction TERM: 10 months GENERAL PURPOSE: Under general

More information

Course Agenda: Managing Active Directory with NetIQ Directory and Resource Administrator and NetIQ Exchange Administrator

Course Agenda: Managing Active Directory with NetIQ Directory and Resource Administrator and NetIQ Exchange Administrator Course Agenda: Managing Active Directory with NetIQ Directory and Resource Administrator and NetIQ Exchange Administrator Products Covered: Who Should Attend: NetIQ Directory And Resource Administrator

More information

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach This material is based upon work supported by the National Science Foundation under Grant No. 1516724 Project Organization University

More information

City of Holly Springs Citizen s Police Academy

City of Holly Springs Citizen s Police Academy City of Holly Springs Citizen s Police Academy City of Holly Springs Police 3235 Holly Springs Parkway Holly Springs, GA. 30115 Officer Greg Bettis 770.721.7526 dbettis@hollyspringsga.us 1 The Holly Springs

More information

information security and its Describe what drives the need for information security.

information security and its Describe what drives the need for information security. Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.

More information

Crime Scene investigation

Crime Scene investigation Crime Scene investigation This class focuses on crime scene investigation, evidence collection and documentation, the key components of any criminal investigation. This course will teach students the importance

More information

UNDERGRADUATE NEW PROGRAM MAJOR OR MINOR OR CONCENTRATION Within an Existing Degree Program*

UNDERGRADUATE NEW PROGRAM MAJOR OR MINOR OR CONCENTRATION Within an Existing Degree Program* UNDERGRADUATE NEW PROGRAM MAJOR OR MINOR OR CONCENTRATION Within an Existing Degree Program* *For a new degree program or new CIP code designation, in addition to EPC program and course forms you must

More information

ASSOCIATE DEGREE APPLICATION FOR GRADUATION

ASSOCIATE DEGREE APPLICATION FOR GRADUATION AGREEMENT / CONSENT FOR ANNOUNCEMENT AND PUBLICATION OF STUDENT GRADUATION INFORMATION ASSOCIATE DEGREE APPLICATION FOR GRADUATION ** ATTENTION STUDENT ** A complete and separate application for graduation

More information

INNOVATION. Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf

INNOVATION. Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf EDUCATION RESEARCH INNOVATION Campus Box 154 P.O. Box 173364 Denver, CO 80217-3364 Website: http://cam.ucdenver.edu/ncmf Email: ncmf@ucdenver.edu Phone: 303.315.5850 Fax: 303.832.0483 JEFF M. SMITH, m.s.

More information

LICENSING AT A LOWER LEVEL

LICENSING AT A LOWER LEVEL EMS-APP-500 (11/2014) Michigan Department of Community Health Lansing, Michigan 48909 Website: www.michigan.gov/ems Authority: P.A. 368 of 1978, as amended This form is for information only. MICHIGAN COURSE

More information

ACC 7145: ACCOUNTING SYSTEMS DESIGN AND CONTROL SYLLABUS FOR SUMMER SESSION 2014

ACC 7145: ACCOUNTING SYSTEMS DESIGN AND CONTROL SYLLABUS FOR SUMMER SESSION 2014 ACC 7145, Summer Session 2014 Page 1 Wayne State University School of Business Administration ACC 7145: ACCOUNTING SYSTEMS DESIGN AND CONTROL SYLLABUS FOR SUMMER SESSION 2014 Instructor Name: Office: Telephone:

More information

FRONT LINE SUPERVISOR PROGRAM INSTRUCTOR TEAM

FRONT LINE SUPERVISOR PROGRAM INSTRUCTOR TEAM NJSACOP FRONT LIINE SUPERVIISIION PROGRAM In Collaboration with the: Any supervisor/officer who is a committed law enforcement professional with a desire to lead people effectively and who is motivated

More information

Course Title: ITAP 3471: Web Server Management

Course Title: ITAP 3471: Web Server Management Course Title: ITAP 3471: Web Server Management Semester Credit Hours: 4 (3,1) I. Course Overview The primary objective of this course is to give students a comprehensive overview of the tools and techniques

More information

MASTERS DEGREE IN CRIMINAL JUSTICE

MASTERS DEGREE IN CRIMINAL JUSTICE MASTERS DEGREE IN CRIMINAL JUSTICE Career Opportunities: Graduates of this program will gain the skills and knowledge that will enable them to qualify for mid to higher-level positions in Criminal Justice,

More information

College in High School Program. Handbook for High School Instructors and Guidance Counselors. Fall 2015

College in High School Program. Handbook for High School Instructors and Guidance Counselors. Fall 2015 College in High School Program Handbook for High School Instructors and Guidance Counselors Fall 2015 Career & Business Development, 226 Bush Hall 454 Delhi Drive Delhi, NY 13753 607-746-4545 COLLEGE IN

More information

AJS 101 INTRODUCTION TO ADMINISTRATION OF JUSTICE

AJS 101 INTRODUCTION TO ADMINISTRATION OF JUSTICE AJS 101 INTRODUCTION TO ADMINISTRATION OF JUSTICE Presented and Approved: December 7, 2012 Effective: Fall 2013-14 Prefix & Number AJS 101 Course Title: Introduction to Administration of Justice Purpose

More information

Statement of Work. 1.0 Executive Summary. 2.0 Features & Benefits. Service. Software Education Service. Table of Contents

Statement of Work. 1.0 Executive Summary. 2.0 Features & Benefits. Service. Software Education Service. Table of Contents - 1 - StruxureWare TM for Data Centers Management Software Administrator Training Statement of Work StruxureWare TM for Data Centers Management Software Administrator Training Software Education Service

More information

Kevin A. Williams Coordinator. 108 Washington Street P.O. Box 1724 Cumberland, MD 21501-1724 Telephone (301) 759-2000 www.acps.allconet.

Kevin A. Williams Coordinator. 108 Washington Street P.O. Box 1724 Cumberland, MD 21501-1724 Telephone (301) 759-2000 www.acps.allconet. 108 Washington Street P.O. Box 1724 Cumberland, MD 21501-1724 Telephone (301) 759-2000 www.acps.allconet.org August 21, 2013 Dear Parent or Guardian, Welcome to the 2013-2014 school year! Once again, Washington

More information

IS 6363 Computer Forensics Spring 2006

IS 6363 Computer Forensics Spring 2006 Class Information: IS 6363 Computer Forensics Spring 2006 Class Time: 5:30-6:45 p.m. Tue/Thu Class Location: BB 3.03.10 Lab Location & Hours: BB 3.03.10 (Hours as posted. Should mirror APL hours.) Instructor

More information

Practical Nursing Program Information for Applicants

Practical Nursing Program Information for Applicants Practical Nursing Program Information for Applicants The application deadline is May 15, 2015 at noon. The Practical Nursing Program at ASUMH is designed to prepare the student to become a Licensed Practical

More information

CJ 4480 Digital Forensics II Syllabus - Term 2 2015

CJ 4480 Digital Forensics II Syllabus - Term 2 2015 CJ 4480 Digital Forensics II Syllabus - Term 2 2015 For course syllabus posted prior to the beginning of the term, the instructor reserves the right to make minor changes prior to or during the term. The

More information

How To Pass A Customer Service Course At Tstc

How To Pass A Customer Service Course At Tstc MRKG 1301 Customer Relationship Management COURSE SYLLABUS COURSE NUMBER AND TITLE: MRKG 1301 Customer Relationship Management (Online Lecture Class) COURSE (CATALOG) DESCRIPTION: Study of general principles

More information

Researching and Choosing a School

Researching and Choosing a School Researching and Choosing a School Updated May, 2015 This section is to help you determine what school best suits your learning style and training needs. It is your responsibility to investigate all of

More information

UNIVERSITY OF RHODE ISLAND THE GRADUATE SCHOOL

UNIVERSITY OF RHODE ISLAND THE GRADUATE SCHOOL UNIVERSITY OF RHODE ISLAND THE GRADUATE SCHOOL To: From: Members of the 2013-2014 Graduate Council Nasser Zawia, Dean Keith Killingbeck, Associate Dean Date: 20 March 2014 RE: Agenda for Meeting Number

More information