This course discusses the fundamentals of vulnerability & risk assessment to mitigate and manage security risks. Analytical methodologies for information security risk assessment, test and evaluation. Practical experience with case studies and defense-indepth concepts will be covered.

This course introduces learners to the principles of digital forensics, evidence collection, preservation and analysis. Topics include investigation principles, data acquisition, OS and memory recovery/analysis, computer network forensics, mobile forensics, legal consideration, ethics, digital evidence control and documentation.

The Cyber security course explores the field of cyber security, specifically the importance of cyber security, data confidentiality, best practices for using the internet and social media safely, and potential career opportunities in this growing field.

The Internet of Things (IoT) is everywhere. It provides advanced data collection, connectivity, and analysis of information collected by computers everywhere—taking the concepts of Machine-to-Machine communication farther than ever before. This course gives a foundation in the Internet of Things, including the components, tools, and analysis by teaching the concepts behind the IoT and a look at real-world solutions.
Mobile Forensics course is designed to make students understand how to secure mobile devices and investigate crimes made using the devices. It covers the fundamental knowledge that is required by a computer forensic expert. This course will show you the best practices for collecting and investigating mobile phones as well as the details on how they work. Students will learn about cellular technologies, radio isolation, where the evidence can be located, troubleshooting, data structures.

Legal rights & liabilities associated with computer security, information privacy; Rights enforceable by private parties; Liabilities associated by private parties and governments; Legal aspects of records management; Un-authorized computer use; Computer Fraud &Abuse Act; Trade Secrets; Economic Espionage Act; Civil Law Claims; Privacy; Export Control; Constitutional Rights; Digital Rights Management.

This course will explore the myriad of forensic data acquisition hardware and software. The students will learn the adapters and identification. During the process of forensic data acquisition mistakes are not expected, therefore students will be taken through the best ways of capturing evidence so the best decisions about the data.

In this course, students will learn the tools, attacks, techniques, strategies and tactics to jump start their penetration testing career and infiltrate any network or system. This hands-on, how-to course gives students an in-depth overview of penetration testing and how to test for computer/network/web vulnerabilities. From internal to external hacking, students will be able to understand the vulnerabilities that an attacker could exploit. Throughout the course, the students will have the opportunity to work with various tools, attacks, software, and tactics.

The course is designed for students who are beginners in Linux systems as users or system administrators. It is designed to give the student an entry understanding from the core fundamentals of Unix/Linux operating system. It covers essential learning skills for Linux. The course provides-hands-on training to effectively use, customizes, and script common command line utilities.  In addition, the student will be able to make effective use of a wide range of standard system administration, job control, software tools, system processes, system start-up and shutdown, software package administration, networking, the Network File System, and naming services.

This course introduces learners to the principles and theories of library classification. It exposes learners to the various schemes and facets of knowledge classification.