ECF 604: The Computer and Internet Fraud
Computers have made organizations easier to run. All accounting information, inventory records, customer data, and intellectual property that an organization possesses is contained somewhere in an electronic file. As such, these electronic files are vulnerable to attacks from both employees and outsiders from around the world. This course will provide the student with an understanding of how computer fraud and manipulation is accomplished and what security measures should be instituted to prevent it.
ECF/INL 644: Information Security
This course will explore all aspects of computing and communications security, including policy, authentication, authorization, administration, and business resumption planning. It will examine key security technologies, such as encryption, firewalls, public-key infrastructures, smart cards, and related technologies that support the development of an overall security architecture. Course work will include plans for developing and implementing a technology security strategy focused on business needs.
ECF 665: Computer Digital Forensics
This course examines techniques used to conduct computer crime investigations and gather probative evidence to secure a conviction under state and federal laws. Students will simulate a computer forensic investigation by developing an investigation plan, securing the crime scene, analyzing evidence, preparing the case for court, and testifying in a moot court situation.
A corporate ethics course (either ECF 605 or CIS 612)
ECF 605: Corporate Ethics and Compliance
This course will examine corporate compliance as a response to the Sarbanes/Oxley legislation, which requires corporations to implement programs designed to impact business practices relative to honesty, integrity, compliance, and ethical behavior. Students will review the elements of the Act with particular emphasis on the areas of the Federal Sentencing Guidelines, Public Company Accounting Oversight Board (PCAOB), auditor independence, corporate responsibility, enhanced financial disclosure, corporate fraud, and accountability as they relate to the promotion of enhanced financial security and address corporate malfeasance.
CIS 612 Ethics, Issues and Government Regulations
This course considers privacy both on– and off–line; legal background of intellectual property and e–mail; ethics and codes of ethics; effects of computers on work and society; and responsibilities and risks of computing, including topics such as accuracy of information, e-waste, and multitasking. This course includes an examination of government policies and regulations related to data security and information assurance.
One elective between either ECF 628 or INL 668
ECF 628 Cybercrime, Cyber Espionage and Cyberwar
This course introduces students to the differences between cybercrime, cyber espionage and cyber–warfare by discussing the relationship of cyber intrusions and cybersecurity to nations, businesses, society, and people. Students will use case studies to analyze the threats, vulnerabilities and risks present in these environments, and develop strategies to reduce the breaches and mitigate the damages.
INL 668 Computer and Network Security
Students will study and implement basic computer and network security strategies on Windows and Linux networks. Students examine and analyze network traffic, including investigating wireless transmissions, install firewalls and define Internet Protocol Security Controls (IPSEC). Labs include system hardening, dissecting network packet structure and creating encryption formats; managing authentication and access controls. Students study implementing a public key infrastructure and best strategies for using intrusion detection systems.
Margaret (Peggy) McCoey, M.S.
La Salle University
Graduate Certificate in Cybersecurity
1900 West Olney Avenue
Philadelphia, PA 19141 USA
La Salle University reserves the right to alter or change this information
at any time, without notice.