RE: School of Computer Forensic Investigation, Class 7, Eastern Michigan University



Similar documents
Training Program Overview

CYBER FORENSICS (W/LAB) Course Syllabus

Distance Education Certification Program Secondary Provider Application for Subsequent Course Certification This application is required for

CST 244 Computer Forensics and Investigation Spring, 2010

Computer Forensics and Investigations Duration: 5 Days Courseware: CT

Charleston Southern University. CSU Camp. June 16 th 20 st, 2014 Participant Application

Security and Computer Forensics ITP 477 (4 Units)

Monfort College of Business Semester Course Syllabus ( )

The CSI Forensic Science Program

Of the programs offered by IACIS, the Basic Computer Forensic Examiner (BCFE) Training Program is at the forefront.

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

Distance Education Certification Program Secondary Provider Application for Initial Certification This application is required for secondary

Advanced Digital Forensics ITP 475 (4 Units)

Surgical Technology Accelerated Alternate Delivery (AAD) Program (For all students in the program January 2015 or later)

CTC 328: Computer Forensics

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

COS/PSA 412 Computer Forensics and Investigations

RESEARCHING AND CHOOSING A SCHOOL

Computer and Network Forensics INF 528 (3 Units)

CDFE Certified Digital Forensics Examiner (CFED Replacement)

Computer and Information Science

COWLEY COLLEGE & Area Vocational Technical School

Professional Development Training Course Catalog Fall 2013 ITS. Offered by Furman University Information Technology Services

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

Criminal Justice Internship CRJ 280

NATHAN M. WOLFE LAW ENFORCEMENT CADET ACADEMY Working Together Since 1973

EC-Council Ethical Hacking and Countermeasures

MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633

Hands-On How-To Computer Forensics Training

INTRODUCTION TO CRIMINAL JUSTICE FALL 2015

Program Committee Report-Criminal Justice

Digital Forensics Workforce Training for Wounded Warriors

To Catch a Thief: Computer Forensics in the Classroom

Computer Forensics (3 credit hours)

Policy & Procedures Help Desk Service Level Agreement (SLA)

Course Title: Computer Forensic Specialist: Data and Image Files

INTERNSHIP OPPORTUNITIES

CRIJ 1301 Introduction to Criminal Justice Course Syllabus: Summer 2015

Cyber Incident Forensic Response (CIFR) 2015

Certified Digital Forensics Examiner

Introduction to Computer Forensics ITP 499 (3 Units)

Certified Digital Forensics Examiner

KENT CAREER TECHNICAL CENTER CRIMINAL JUSTICE PROGRAM STUDENT APPLICATION CHECK LIST

CERTIFIED TEACHER APPLICATION INSTRUCTIONS

COURSE OUTLINE TEMPLATE (Computer Forensics CFR 712S)

MCOLES Information and Tracking Network. Security Policy. Version 2.0

General Investigation Training Course Blended Learning Guide

MANSFIELD POLICE DEPARTMENT CITIZEN S ACADEMY

RESEARCHING AND CHOOSING A SCHOOL

Course Syllabus - IST 454 Computer and Cyber Forensics General Course Information

The Hotchkiss School Information Technology Services. Service Level Agreement (SLA) with the Hotchkiss Community for Technology User Support

Computer Forensics introduction part A

KENTUCKY COMMISSION ON PROPRIETARY EDUCATION

Implementing Security Education at a Small Community College

Online Course Schedule

Citizens Academy Overview

HIT Practice Workflow & Information Management Redesign Presented by Ivy Tech Corporate College

Enclosed is the form you requested. Please complete the form in its entirety and return as directed below:

Robotics Core School 1

What is a FRCC College School Transcript?

Instruction Guide Practice Round 2 High School August 2015

INDIANAPOLIS, IN 2011 CATALOG Volume 78

TOWN OF POUGHKEEPSIE POLICE DEPARTMENT

Palomar College San Marcos, California Contract for Directed/Independent Study Course

Training and Certification. ACT Program Overview Apple Certified Trainer Program

Innovative Course Application Submission Deadline: Tuesday, November 30, NO applications may be accepted after that deadline.

Florida s Best and Brightest Scholarship Program. Q & A (updated: 9/18/15)

Course Syllabus CRIJ Introduction to Criminal Justice Spring 2012 Tuesday & Thursday 2:50-4:05pm

Crafting an Undergraduate Information Security Emphasis Within Information Technology

Certified Digital Forensics Examiner

How To Get A Law Degree In Alabama

IDS and Penetration Testing Lab ISA 674

CMJ INTRODUCTION TO FORENSIC SCIENCE Fall Syllabus :30 5:30 p.m.

EAST VALLEY INSTITUTE OF TECHNOLOGY JOB DESCRIPTION

Course Agenda: Managing Active Directory with NetIQ Directory and Resource Administrator and NetIQ Exchange Administrator

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach

City of Holly Springs Citizen s Police Academy

information security and its Describe what drives the need for information security.

Crime Scene investigation

UNDERGRADUATE NEW PROGRAM MAJOR OR MINOR OR CONCENTRATION Within an Existing Degree Program*

ASSOCIATE DEGREE APPLICATION FOR GRADUATION

INNOVATION. Campus Box 154 P.O. Box Denver, CO Website:

LICENSING AT A LOWER LEVEL

ACC 7145: ACCOUNTING SYSTEMS DESIGN AND CONTROL SYLLABUS FOR SUMMER SESSION 2014

FRONT LINE SUPERVISOR PROGRAM INSTRUCTOR TEAM

Course Title: ITAP 3471: Web Server Management

MASTERS DEGREE IN CRIMINAL JUSTICE

College in High School Program. Handbook for High School Instructors and Guidance Counselors. Fall 2015

AJS 101 INTRODUCTION TO ADMINISTRATION OF JUSTICE

Statement of Work. 1.0 Executive Summary. 2.0 Features & Benefits. Service. Software Education Service. Table of Contents

Kevin A. Williams Coordinator. 108 Washington Street P.O. Box 1724 Cumberland, MD Telephone (301)

IS 6363 Computer Forensics Spring 2006

Practical Nursing Program Information for Applicants

CJ 4480 Digital Forensics II Syllabus - Term

How To Pass A Customer Service Course At Tstc

Researching and Choosing a School

UNIVERSITY OF RHODE ISLAND THE GRADUATE SCHOOL

Transcription:

December 12, 2006 RE: School of Computer Forensic Investigation, Class 7, Eastern Michigan University Dear Applicant Agency: The Center for Regional and National Security are pleased to announce the seventh Computer Forensic Investigation School to be offered to law enforcement agencies, starting September 10 th, 2007. Overview The School of Computer Forensic Investigation at Eastern Michigan University is quickly gaining a national reputation for excellence. Designed for the law enforcement community, this unique educational/training program has been developed with cooperation from our instructors in law enforcement, business and industry. These professionals provide comprehensive instruction relevant to the recent developments in the field of computer forensics. The classroom experience is supplemented with lecture and textbook materials. Considerable time is spent developing hands-on skills in an academic lab setting. Participants spend the majority of their class time doing analysis and implementing new techniques rather than talking about forensics. This hands-on training enhances the student s ability to return to their departments and start processing cases without the need for additional training. The School of Computer Forensic Investigation has been built upon our over 15 year history of Eastern Michigan University s efforts to provide advanced training within the law enforcement community of Michigan. The Center for Regional and National Security at E.M.U. is continuing to incorporate and develop new technologies in their educational programs. Participants in the School of Computer Forensic Investigation will be exposed to a new paradigm of criminal investigation rooted in the technological process. Students can immediately transfer the skills and knowledge learned in the program to their workplace. Instructors The School of Computer Forensic Investigation has developed relationships with leading edge industry professionals. Our faculty consists of professionals from the Department of Defense, the State Attorney General s Office, Air Force Intrusion Testing, Sprint Communications, as well as other private technology companies, and law enforcement personnel. In the private sector these individuals hold positions as Systems Engineers, Senior Systems Security Professionals, Cybercrime Investigators, Computer Forensics Examiners, Network Security Administrators,

teachers and trainers. Our faculty is content experts in their respective fields, many hold advanced degrees. Certification Students who successfully complete the entire program including required examinations and projects will be granted a certificate of successful completion as a Basic Certified Computer Forensic Examiner. Forensic Evidence Computer In week one of the program the students will build their own Forensic Computer. This accomplishes two goals. 1) The students learn about hardware issues and the need to have a sound basis of the internal workings of the computer. 2) The student will leave with a computer that they built as part of their studies. This is a state of the art machine that they will take back to their respective agency and do the analysis required of computer forensic examiners. This machine has been designed by one of Michigan s leading computer forensic examiners. While it is not required that each student purchase this machine, it affords those departments an opportunity to not only have an individual trained but he/she will have the necessary hardware tools once they graduate to start conducting forensic analysis when they return to their respective agencies. Estimated cost for this device is pending; please call 734-487-1590 for further information (EST under $4,000, which is a considerable savings over commercially produced Forensic Devices with a price tag of over $6,500.) All machines are state of the art. The Deadline for Ordering is August 10, 2007 If you desire to have us purchase the components for your student to assemble this computer please fill out the attached consent form and mail it with your registration. The curriculum of study has been developed with feedback from a number of working law enforcement computer forensic examiners. The curriculum is presented for your review:

Curriculum of Instruction Week 1: September 10-14 Topic Hours Introduction to Forensics School... 2 Building the Forensic Computer... 19 Windows XP... 7 Linux Software Installation & Setup... 7 Week 2: September 17-21 Physical/Logical Disk Structure... 3.5 DOS Basics/Advanced, Disk Edit... 10.5 FAT 12-16-32... 3.5 Windows Operating Systems... 3.5 Windows XP, NTFS, Logs... 7 Windows Registry File/Artifacts... 7 Week 3: October 8-12 Using Linux for Forensic Analysis... 31.5 Practical Examination... 3.5 Week 4: October 15-19 Topic Hours Validation of Forensic Hardware/Software... 7 External Media- CD/DVD + Digital Film... 7 Report Writing... 3.5 Network Investigations... 14 Practical Examination... 3.5 Week 5: October 29 November 2 Preparation of Analysis Media... 3.5 Image Restoration... 3.5 Automated Forensic Tools for Image Analysis... 28 Week 6: November 5-9 Field Acquisition Kit and Methodology... 7 Search and Seizure Electronic Media...3.5 Legal Issues in Forensic Investigations...3.5 Access Data Password Cracking Software... 7 Encryption/Steganography... 7 Final Examination....3.5 Evaluations and Graduation... 3.5 Times Classes will meet Monday through Friday from 8:00 a.m. to 4:00 p.m. The course is 6-weeks in length. Location Classes will be held in Room 8, Roosevelt Hall. Application Information Applicants are required to complete a formal application in its entirety. All applications must be typed before being submitted to the address below. Cost $800.00** The majority** of the costs have been funded by a grant from the Michigan Justice Training Commission. Additional program fees for this course are $800.00** per applicant excluding the costs for the computer. The computer cost will be determined, costs to not exceed $4,000. Compare these costs with other nationally recognized one week courses. **Pending Final Approval from the Michigan Justice Training Commission.

No refunds will be honored after the registration date. Student substitutions will be permitted. Selection Criteria 1. Applicants from departments demonstrating significant need will be given first priority for admissions. 2. Qualified federal, state, and local police and sheriff department personnel receive preferential consideration. 3. It is necessary that applicants have an understanding of computers and a background in criminal investigations. 4. It is suggested that all applicants have completed the School of Computer Cyber Crime Investigations. (Similar or related training can be substituted.) 5. All applicants are subject to background investigation. College Credit Eastern Michigan University offers participants in the School of Computer Forensic Investigation an opportunity to receive university credit. Details can be obtained by contacting the Center for Regional and National Security at the numbers indicated below. Further Registration Information. Deadline for Program Registration only August 31, 2007 Michael Yauk, mike.yauk@emich.edu Skip Lawver, skip.lawver@emich.edu Phone 734-487-1590 Fax 734-487-1620 Respectfully, Mike Yauk Platform Associate, Information Assurance

Authorization to Purchase Computer Components Authorization is hereby granted to Eastern Michigan University to purchase the following computer components for The School of Computer Forensic Investigation. The computer will be the property of Police Department upon completion of the training course. Eastern Michigan University is authorized to bill my Department not to exceed $4,000 for this Forensic Evidence Computer. Purchase Order Number: Signed Date NOTE: No refunds will be allowed after receipt of signed authorization.

All applicants will be subjected to a background investigation. Deadline Date: August 10, 2007 for Forensic Computer Purchase & Student Application Deadline Date for Program Only: August 31, 2007 PLEASE TYPE/PRINT. DATE Name Last First Middle Rank/Title Present address Number Street City State Zip Telephone : ( ) - E-mail address: Department Name: Street Address: MCOLES License Number City State Zip Fax Number: ( ) Telephone : ( ) Computer Ability: (Please check one) Beginner Intermediate Check the systems/software which you are familiar with and rate your ability level (i.e. beginner, intermediate, advanced) Windows 95/2000 MS-DOS Windows NT Macintosh Novell Norton Utilities Advanced List other software programs and/or operating systems with which you have a working knowledge: How many years in Law Enforcement How many years as an Investigator/Detective or position with extensive investigative responsibilities State your current job responsibilities/duties (Specifically state investigator tasks ) Signature of applicant Date: Signature of Chief or Designate Date: