Comprehensive Exam Track: Total Credit Hours Required to Finish the Degree ( 36 Credit Hours ) as Follows
Specialization Requirements
Students must pass all of the following courses
Course Number |
Course Name |
Weekly Hours |
Cr. Hrs. |
Prerequisite |
||
---|---|---|---|---|---|---|
Theoretical |
Practical |
|||||
151626050 | RESEARCH METHODOLOGIES | 3 | - | 3 |
- |
|
151626100 | INFORMATION AND NETWORK SECURITY | This course provides students with the detailed concepts and tools of information and Network Security. Security threats; types and effects; tools and methods to discover, halt or deal with threats; biometrics and other authentication tools; database security; and managing information and network security in different scenarios are the main topics that will covered within the course. | 3 | - | 3 |
- |
151626150 | CYBERCRIME | Nowadays, computer crimes are considered as a major threat to the economy and to the stability of all societies. The course details the current status of cybercrimes in terms of types, degree of complexity, and the best available methods to stop or fight them. The student will explore the current cybercrime issues through searching the latest research. | 3 | - | 3 |
- |
151626200 | COMPUTER FORENSICS | Conducting digital forensic examination of computers, removable media and other electronic devices are the main goal of this course. The development and implementation of forensic incident response plans, policies and procedures will be covered in this course. Students will use digital forensics tools and techniques to analyze digital evidence pursuant to an investigation, while utilizing industry standards and best practices. The student will implement different modern techniques using different tools (hardware and software) in computer forensics. | 3 | - | 3 |
- |
151626250 | APPLIED CRYPTOGRAPHY | This course describes how cryptographic algorithms keys and protocols, and an appropriate hardware (software) environment can solve security problems (confidentiality, integrity, authenticity). It shows how security is achieved in real ¬life systems such as telecom, government/identity, buildings/transportation, payment. Real-life applications of encryption, Message Authentication Codes (MAC) and Digital Signatures and RFID technology are discussed in this course. The student will implement different modern techniques using different algorithms (hardware and software) that are used in cryptography. | 3 | - | 3 |
- |
151626300 | NETWORK FORENSICS | This course is considered the main step to evolve research progress for each student within the last phase of the Master program in which the student will propose and discuss his research ideas and suggestions. At the end of this course, the student is expected to publish a survey paper about a specific topic. | 3 | - | 3 |
- |
Students must pass ( 18 ) credit hours from any of the following courses
Course Number |
Course Name |
Weekly Hours |
Cr. Hrs. |
Prerequisite |
||
---|---|---|---|---|---|---|
Theoretical |
Practical |
|||||
151626350 | OPERATING SYSTEMS AND DATABASE FORENSICS | The course will provide students with a practical understanding of the fundamental procedures required to correctly conduct digital forensics on Windows, Linux, and Macintosh operating systems, file systems, and associated applications. The course details the storage of data on the cloud and the ramifications of that on digital forensics. The student will explore different types of attacks and will use different techniques to deal with these attacks. | 3 | - | 3 |
- |
151626400 | SEMINAR (1) | This course is considered the main step to evolve research progress for each student within the last phase of the Master program in which the student will propose and discuss his research ideas and suggestions. At the end of this course, the student is expected to publish a survey paper about a specific topic. | 3 | - | 3 |
- |
151626450 | MULTIMEDIA FORENSICS | This course prepares students to examine multimedia evidence such as images, videos and audio files, and to examine multimedia files manually and through automated processes utilized by digital forensic tools. The course provides students with the knowledge from the fundamental of multimedia types to be able to identify anomalies in the files and recognize file creation attributes. | 3 | - | 3 |
- |
151626500 | MOBILE FORENSICS | Mobile forensics course will focus on analysing mobile devices to recover digital evidence. This course is designed to provide the student with the required theoretical knowledge and practical experience to conduct mobile forensics investigation in accordance with the current body of knowledge. | 3 | - | 3 |
- |
151626550 | INVESTIGATIVE TECHNIQUES AND REASONING | Digital Forensics Investigation refers to the scientific and systematic methodology applied to the collection, analysis, preservation, storage, transportation and presentation of the digital evidence in courtrooms with respect to both criminal and civil laws. This course is designed to build on the student’s theoretical understanding of the principles, methodologies, laws and standards of digital forensics. Specifically, it will develop the students’ ability to carry out a complete forensics investigation using industry-leading digital forensic solutions to solve hypothetical cases that mimics the ones that they might face in the real world. | 3 | - | 3 |
- |
151626600 | CLOUD FORENSICS | This course gives students a deep understanding on crimes related to cloud computing. It will start by illustrating definitions of cloud computing forensics tools and the different dimension of cloud computing forensics. | 3 | - | 3 |
- |
151626650 | SEMINAR (2) | This course is a continuation the Seminar 1 course in which, the student will extend his / her work that started in seminar 1. At the end of this course, the student is expected to publish a scientific paper about a specific topic. | 3 | - | 3 |
151626400 SEMINAR (1) This course is considered the main step to evolve research progress for each student within the last phase of the Master program in which the student will propose and discuss his research ideas and suggestions. At the end of this course, the student is expected to publish a survey paper about a specific topic. |
151626700 | THE FORENSIC EXPERT IN THE COURTROOM | Understanding of the responsibilities of expert witnesses in different cases and how they can present their evidence to the court panel effectively are the main objectives of the course. Students will be provided with Hands-on experience in developing and presenting digital evidences. | 3 | - | 3 |
- |
151626750 | BIOMETRICS | Biometric Technology is one of the rapidly growing areas of computer science, concerned with representation, storage, matching, synthesis and visualization of biometric information. Tremendous advance has been achieved over the last few years in both fundamental theoretical development of fundamental algorithms for biometric identification, matching and synthesis, and in biometric hardware and software production. | 3 | - | 3 |
- |
151626800 | SELECTED TOPICS IN CYBERCRIME AND DIGITAL EVIDENCE ANALYSIS | This course teaches the students the emerging trends and the new technologies in digital forensics. Moreover, this course teaches how these new technologies and emerging trends can be applied in the forensic investigation process including evidence collecting, analysis and presentation. This course will cover several topics and challenges in digital forensics such as audio/video, internet of things, cloud, big data, social networks and crypto currency. This course needs to be continuously updated to address the new challenges and advances in digital forensics. | 3 | - | 3 |
- |
Thesis\Treatise Track: Total Credit Hours Required to Finish the Degree ( 36 Credit Hours ) as Follows
Specialization Requirements
Students must pass all of the following courses plus ( 6 ) credit hours for the Thesis
Course Number |
Course Name |
Weekly Hours |
Cr. Hrs. |
Prerequisite |
||
---|---|---|---|---|---|---|
Theoretical |
Practical |
|||||
151626050 | RESEARCH METHODOLOGIES | 3 | - | 3 |
- |
|
151626100 | INFORMATION AND NETWORK SECURITY | This course provides students with the detailed concepts and tools of information and Network Security. Security threats; types and effects; tools and methods to discover, halt or deal with threats; biometrics and other authentication tools; database security; and managing information and network security in different scenarios are the main topics that will covered within the course. | 3 | - | 3 |
- |
151626150 | CYBERCRIME | Nowadays, computer crimes are considered as a major threat to the economy and to the stability of all societies. The course details the current status of cybercrimes in terms of types, degree of complexity, and the best available methods to stop or fight them. The student will explore the current cybercrime issues through searching the latest research. | 3 | - | 3 |
- |
151626200 | COMPUTER FORENSICS | Conducting digital forensic examination of computers, removable media and other electronic devices are the main goal of this course. The development and implementation of forensic incident response plans, policies and procedures will be covered in this course. Students will use digital forensics tools and techniques to analyze digital evidence pursuant to an investigation, while utilizing industry standards and best practices. The student will implement different modern techniques using different tools (hardware and software) in computer forensics. | 3 | - | 3 |
- |
151626250 | APPLIED CRYPTOGRAPHY | This course describes how cryptographic algorithms keys and protocols, and an appropriate hardware (software) environment can solve security problems (confidentiality, integrity, authenticity). It shows how security is achieved in real ¬life systems such as telecom, government/identity, buildings/transportation, payment. Real-life applications of encryption, Message Authentication Codes (MAC) and Digital Signatures and RFID technology are discussed in this course. The student will implement different modern techniques using different algorithms (hardware and software) that are used in cryptography. | 3 | - | 3 |
- |
151626300 | NETWORK FORENSICS | This course is considered the main step to evolve research progress for each student within the last phase of the Master program in which the student will propose and discuss his research ideas and suggestions. At the end of this course, the student is expected to publish a survey paper about a specific topic. | 3 | - | 3 |
- |
Students must pass ( 12 ) credit hours from any of the following courses
Course Number |
Course Name |
Weekly Hours |
Cr. Hrs. |
Prerequisite |
||
---|---|---|---|---|---|---|
Theoretical |
Practical |
|||||
151626350 | OPERATING SYSTEMS AND DATABASE FORENSICS | The course will provide students with a practical understanding of the fundamental procedures required to correctly conduct digital forensics on Windows, Linux, and Macintosh operating systems, file systems, and associated applications. The course details the storage of data on the cloud and the ramifications of that on digital forensics. The student will explore different types of attacks and will use different techniques to deal with these attacks. | 3 | - | 3 |
- |
151626450 | MULTIMEDIA FORENSICS | This course prepares students to examine multimedia evidence such as images, videos and audio files, and to examine multimedia files manually and through automated processes utilized by digital forensic tools. The course provides students with the knowledge from the fundamental of multimedia types to be able to identify anomalies in the files and recognize file creation attributes. | 3 | - | 3 |
- |
151626500 | MOBILE FORENSICS | Mobile forensics course will focus on analysing mobile devices to recover digital evidence. This course is designed to provide the student with the required theoretical knowledge and practical experience to conduct mobile forensics investigation in accordance with the current body of knowledge. | 3 | - | 3 |
- |
151626550 | INVESTIGATIVE TECHNIQUES AND REASONING | Digital Forensics Investigation refers to the scientific and systematic methodology applied to the collection, analysis, preservation, storage, transportation and presentation of the digital evidence in courtrooms with respect to both criminal and civil laws. This course is designed to build on the student’s theoretical understanding of the principles, methodologies, laws and standards of digital forensics. Specifically, it will develop the students’ ability to carry out a complete forensics investigation using industry-leading digital forensic solutions to solve hypothetical cases that mimics the ones that they might face in the real world. | 3 | - | 3 |
- |
151626600 | CLOUD FORENSICS | This course gives students a deep understanding on crimes related to cloud computing. It will start by illustrating definitions of cloud computing forensics tools and the different dimension of cloud computing forensics. | 3 | - | 3 |
- |
151626700 | THE FORENSIC EXPERT IN THE COURTROOM | Understanding of the responsibilities of expert witnesses in different cases and how they can present their evidence to the court panel effectively are the main objectives of the course. Students will be provided with Hands-on experience in developing and presenting digital evidences. | 3 | - | 3 |
- |
151626750 | BIOMETRICS | Biometric Technology is one of the rapidly growing areas of computer science, concerned with representation, storage, matching, synthesis and visualization of biometric information. Tremendous advance has been achieved over the last few years in both fundamental theoretical development of fundamental algorithms for biometric identification, matching and synthesis, and in biometric hardware and software production. | 3 | - | 3 |
- |
151626800 | SELECTED TOPICS IN CYBERCRIME AND DIGITAL EVIDENCE ANALYSIS | This course teaches the students the emerging trends and the new technologies in digital forensics. Moreover, this course teaches how these new technologies and emerging trends can be applied in the forensic investigation process including evidence collecting, analysis and presentation. This course will cover several topics and challenges in digital forensics such as audio/video, internet of things, cloud, big data, social networks and crypto currency. This course needs to be continuously updated to address the new challenges and advances in digital forensics. | 3 | - | 3 |
- |
Hidden Text