|
Jan 15, 2025
|
|
|
|
CIS 289 - International Cyber Crime Investigations5 Credits The course provides the students with the opportunity to investigate corporate and/or criminal investigations on an international scale. Students will research privacy laws and regulations for the countries in which the corporate policy violation or criminal activity occurred. They will apply security privacy policies to the various electronic devices used on the network. These will include the cloud, corporate devices, and personal devices. This course will include the use of network and forensic tools for hands-on projects.
Pre-requisite(s) CIS 155 with a min 2.0 FeesCF
Quarters Typically Offered Winter Evening, Online Spring Evening, Online
Designed to Serve Students in the AAS in Global Cybersecurity Investigations or related degree Active Date 20220405T16:40:50
Grading Basis Decimal Grade Class Limit 24 Contact Hours: Lecture 44 Lab 22 Total Contact Hours 66 Degree Distributions: ProfTech Course Yes Restricted Elective Yes Course Outline
- Cyber crime history and current trends
- Types of criminal and civil cyber crimes
- International law enforcement entities and their jurisdictions and responsibilities
- Interpol
- The Americas
- Europe
- Asia
- International privacy laws by countries and regions
- Privacy laws and their applicability to private sector investigations
- Creating effective privacy policies
- Understanding chain of authority in corporate investigations
- Cyber crimes and their effects on the consumer, companies and the global economy
- Case studies
- Investigation results
- Creating mitigation plans
- Financial impacts
- Hands on Projects
Student Learning Outcomes Correctly describe the types of cybercrime including network intrusion, identity theft, and ransomware
Compare and interpret concepts of privacy in the course of investigating
Describe the effects the Internet has on privacy.
Describe approaches individuals, organizations, and governments have taken to protect privacy.
Compare and contrast privacy policies and laws of different jurisdictions.
Create a mitigation plan based on the type of cybercrime investigation
Create effective privacy policies based upon the laws and regulations of jurisdiction
Add to Portfolio (opens a new window)
|
|