May 04, 2024  
2023-24 Catalog 
    
2023-24 Catalog
Add to Portfolio (opens a new window)

CIS 289 - International Cyber Crime Investigations

5 Credits
The course provides the students with the opportunity to investigate corporate and/or criminal investigations on an international scale.  Students will research privacy laws and regulations for the countries in which the corporate policy violation or criminal activity occurred.  They will apply security privacy policies to the various electronic devices used on the network. These will include the cloud, corporate devices, and personal devices.  This course will include the use of network and forensic tools for hands-on projects.

Pre-requisite(s) CIS 155 with a min 2.0
FeesCF

Quarters Typically Offered
Winter Evening, Online
Spring Evening, Online

Designed to Serve Students in the AAS in Global Cybersecurity Investigations or related degree
Active Date 20220405T16:40:50

Grading Basis Decimal Grade
Class Limit 24
Contact Hours: Lecture 44 Lab 22
Total Contact Hours 66
Degree Distributions:
ProfTech Course Yes
Restricted Elective Yes
Course Outline
​​​​​​

  • Cyber crime history and current trends
  • Types of criminal and civil cyber crimes
  • International law enforcement entities and their jurisdictions and responsibilities
    • Interpol
    • The Americas
    • Europe
    • Asia
  • International privacy laws by countries and regions
  • Privacy laws and their applicability to private sector investigations
    • Creating effective privacy policies
    • Understanding chain of authority in corporate investigations
  • Cyber crimes and their effects on the consumer, companies and the global economy
    • Case studies
    • Investigation results
    • Creating mitigation plans
    • Financial impacts
  • Hands on Projects


Student Learning Outcomes
Correctly describe the types of cybercrime including network intrusion, identity theft, and ransomware

Compare and interpret concepts of privacy in the course of investigating

Describe the effects the Internet has on privacy.

Describe approaches individuals, organizations, and governments have taken to protect privacy.

Compare and contrast privacy policies and laws of different jurisdictions.

Create a mitigation plan based on the type of cybercrime investigation

Create effective privacy policies based upon the laws and regulations of jurisdiction



Add to Portfolio (opens a new window)