Cybercrime Investigation & Cybersecurity Graduate Certificate
Cybercrime and information security are growing transnational phenomena. Recently, severe security breaches, ID thefts, digital frauds, online drug-trafficking, and online dating violence have raised public concerns that technology facilitates cybercrime and victimization.
Driven by the need to ensure the security of very sensitive data in today’s government organizations and business enterprises, the demand for cybersecurity experts (network security analysts and cybersecurity investigators) has increased by 74 percent during the six years from 2007 to 2013 (according to labor market consultants Burning Glass Technologies).
Ideal for law enforcement officers, computer science-related personnel, and others who wish to enhance their expertise in cybercrime investigation and cybersecurity techniques, the graduate certificate program in Cybercrime Investigation & Cybersecurity (CIC) offers an interdisciplinary approach that combines criminal justice and cybersecurity. Taught by faculty from the Boston University Metropolitan College departments of Applied Social Sciences and Computer Science, the curriculum ensures that students develop competency and practical knowledge, enabling them to work with various issues related to cybercrime. By participating in the program, students will gain insight into cyber-criminology and the legal practices, practical digital investigative knowledge, and policies related to cybersecurity risk assessment. In addition, students who successfully complete the certificate program are eligible to take the forensic examiner exams.
Students who complete the Graduate Certificate in Cybercrime Investigation & Cybersecurity will be able to demonstrate:
- Insight into cyber-criminology and legal practices.
- Practical digital investigative knowledge.
- An understanding of the policies related to cybersecurity risk assessment.
Graduate Certificate in Cybercrime Investigation & Cybersecurity Program Options
Available on campus and in the following format:
Official transcripts of previous academic work, two letters of recommendation, personal statement, and résumé are required as part of the application.
Minimum passing grade for a course in the graduate certificate program is B– (2.7), but an average grade of B (3.0) must be maintained to be in good academic standing and satisfy the certificate requirements.
Transfer of Credits to Degree Programs
All credits earned toward the Graduate Certificate in Cybercrime Investigation & Cybersecurity may be applied to the Metropolitan College Master of Criminal Justice program.
(Four courses/16 credits)
MET CJ 610 Cybercrime
This course is designed to help students understand and apply the nature of computer crime in the criminal justice field. Several theories (both micro-level and macro-level) will be presented and will be analyzed in depth and applied to computer crime cases both past and present. Students will see how major theories have been re-developed to be applied to computer crime, and by using these theories, students will both develop and explore different strategies for future law enforcement. Students will be presented with common types of fraudulent schemes, as well as several laws that have been enacted and developed specifically for computer crime. In addition, causes, victimization, legal issues, control strategies, and societal costs regarding the "computer-crime" problem will be explored and evaluated. [ 4 cr. ]
MET CJ 710 Applied Digital Forensic Investigation
This course is designed to engage students for conducting successful forensic examinations of digital devices and computer networks with hands-on-experience within the Virtual Security Lab. The course introduces EnCase forensic software, which has received the high acceptance rate in a court of law as an expert witness. The course aims to cover various cybercrime topics and digital forensic investigation practices using digital evidence samples. In the process of learning, students will explore the nature of specific cybercrime and be able to successfully analyze and document the digital evidence related to the crime. [ 4 cr. ]
|B1||IND||Choi||SHA 111||T||6:00 pm – 8:45 pm|
MET CS 684 IT Security Policies and Procedures
This course enables IT professional leaders to identify emerging security risks and implement highly secure networks to support organizational goals. Discussion of methodologies for identifying, quantifying, mitigating and controlling risks. Students implement a comprehensive IT risk management plans (RMP) that identify alternate sites for processing mission-critical applications, and techniques to recover infrastructure, systems, networks, data and user access. The course also discusses related topics such as: disaster recovery, handling information security; protection of property, personnel and facilities; protection of sensitive and classified information, privacy issues, and criminal terrorist and hostile activities. [ 4 cr. ]
|D1||IND||Burgoyne||SHA 210||R||6:00 pm – 8:45 pm|
|E1||IND||Burgoyne||SHA 210||R||6:00 pm – 8:45 pm|
MET CS 693 Digital Forensics and Investigations
Provides a comprehensive understanding of digital forensics and investigation tools and techniques. Learn what computer forensics and investigation is as a profession and gain an understanding of the overall investigative process. Operating system architectures and disk structures are discussed. Studies how to set up an investigator's office and laboratory, as well as what computer forensic hardware and software tools are available. Other topics covered include importance of digital evidence controls and how to process crime and incident scenes, details of data acquisition, computer forensic analysis, e-mail investigations, image file recovery, investigative report writing, and expert witness requirements. Provides a range of laboratory and hands-on assignments either in solo or in teams. With rapid growth of computer systems and digital data this area has grown in importance. Prereq: Working knowledge of windows computers, including installing and removing software. Access to a PC meeting the minimum system requirements defined in the course syllabus. [ 4 cr. ]