Cyber Security Digital Forensics Degree
Page Navigation
Program Learning Outcomes
- 
	- 
Identify and analyze risks, threats, and vulnerabilities associated with digital tools, used to monitor digital components connected to computer networks. 
- 
Explain various operating systems; operating system roles; how operating systems manage computer hardware, software, and subsystems; and describe memory allocation schemes and paging 
- 
Performing Static Analysis on a Suspicious File, System Behavior Analysis, and Forensic Examination of a Suspicious Microsoft Office Document. 
- 
Implement Role-Based Access Controls in Windows Admin Center (WAC) and Implement Password Policies using Windows Group Policy. Implement IDS/IPS functionality, and secure IoT devices on the network using tools such as Disk Encryption, MD5 Hashes, TLS/SSL 
- 
Investigate various Network Attacks using Kiwi Log Viewer and Wireshark tools. 
- 
Utilize forensic investigative strategies and tools to locate and retrieve electronic data and history on the network and digital devices; retrieve volatile and non-volatile information, deleted files, and partition data 
 
- 
