Computer Forensics and Security Management
Prospective students should use this checklist to obtain specific admissions requirements on how to apply to Graduate School.
Program Contact Information
Dr. Nitesh Saxena
Department of Computer and Information Sciences
1300 University Blvd.
Birmingham, AL 35294-1170
The Master of Science in Computer Forensics and Security Management (MSCFSM) is an interdisciplinary program that prepares graduates for a professional career in the field of cyber security by developing in them the necessary skills crucial for success. The program also provides current practitioners the opportunity to obtain advanced-level training to facilitate career advancement. The program includes a set of core, required courses and the opportunity to select from two tracks of specialization.
Students accepted into the program will have earned a bachelor's degree from an accredited college or university or recognized university from abroad. Most of these students will have earned a cumulative undergraduate grade point average (GPA) of 3.0 or higher. Applicants whose native language is not English are required to take either the TOEFL or the IELTS and score 80 or higher on the TOEFL or 6.5 or higher on the IELTS.
Students seeking admission to the program who lack a background in computer science or information systems but meet the remaining minimum requirements for admission may be admitted contingent on them completing a set of prerequisite courses (or their equivalents) that include:
|Introduction to Computation|
and Introduction to Computation Lab
|IS 204||Introduction to Business Programming||3|
Master of Science in Computer Forensics and Security Management
A total of 30 semester hours are required for the degree, consisting of 15 hours of required core courses, 9-12 hours of course work in one of the two tracks and 3-6 hours of electives from an approved list of relevant courses. The two tracks are Cybercrime Investigations and IT Audit/Fraud Examination.
|CS 534L||Networking Laboratory||0|
|CS 623||Network Security||3|
|CS 623L||Network Security Laboratory||0|
|CS 636||Computer Security||3|
|IS 613||Information Security Management||3|
|JS 502||Introduction to Computer Forensics||3|
Cybercrime Investigations Track
|CS 519||Investigating Online Crimes||3|
|CS 537||Digital Media Forensics||3|
|JS 675||Law Evidence and Procedure||3|
|JS 696||Graduate Internship in Criminal Justice||3|
|Choose one (1) CS elective at the 500+ level 1||3|
IT Audit/Fraud Examination Track
|AC 572||Forensic Accounting and Information Technology Auditing||3|
|AC 573||Fraud Examination||3|
|LS 571||Legal Elements of Fraud Investigation||3|
|Select two (2) courses from the IS courses listed below or approved CS courses 1||6|
CS 600-level courses:CS 600, CS 601, CS 602, CS 610, CS 614, CS 616, CS 617, CS 620,CS 621 and CS 621L, CS 622, CS 624, CS 625, CS 626, CS 629, CS 630, CS 631, CS 632, CS 633, CS 634, CS 635,CS 639, CS 640, CS 641, CS 642, CS 646, CS 647, CS 649, CS 651, CS 652, CS 653, CS 654, CS 656, CS 659, CS 660, CS 662, CS 663, CS 665, CS 667, CS 669, CS 670, CS 671, CS 672, CS 673,CS 674, CS 675, CS 676, CS 680, CS 682, CS 683, CS 684, CS 690, CS 691, CS 692, CS 697, CS 698,CS 699
AC 572. Forensic Accounting and Information Technology Auditing. 3 Hours.
Introduction to the practice of forensic accounting and its relationship to auditing in settings characterized by extensive reliance on information technology. An emphasis on audit methodology as applied to accounting information systems.
AC 573. Fraud Examination. 3 Hours.
Advanced forensic accounting concepts with a primary focus on occupational fraud and abuse--its origins, perpetration, prevention, and detection.
CS 623. Network Security. 3 Hours.
Conventional network security (symmetric and public-key cryptography). Message encryption and authentication. Secure communication between computers in a hostile environment, including E-mail (PGP), virtual private networks (IPSec), remote access (SSH), and E-commerce (SSL), firewalls, intrusion detection and prevention, security of IEEE 802.11 wireless networks (WEP, WPA). Mandatory weekly Linux-based lab.
CS 623L. Network Security Laboratory. 0 Hours.
Laboratory to accompany CS 623.
CS 636. Computer Security. 3 Hours.
Study of the breadth of major computer security topics including cyber threats, malware, information assurance, authorization, applied cryptography, web security, mobile and wireless security, network security, systems/software security, database and storage security, user-centered security, and best security practices and countermeasures.
CS 654. Malware Analysis. 3 Hours.
Hands-on course teaching static, dynamic and contextual analysis of malware. Malware analysis and reverse-engineering techniques are taught through interaction with both "classroom" and "wild" malware samples. Defensive and counter-measure techniques for both corporate and law enforcement environments are explored.
IS 613. Information Security Management. 3 Hours.
Primary objectives of the course are for the student to develop an understanding of key information security concepts, develop an understanding of how people, technology, and organizational policies should be developed and managed to safeguard an organization's information resources, learn how to manage under uncertainty and risk, develop policies and procedures to make information systems secure, and learn how to audit and recover from security breaches.
JS 502. Introduction to Computer Forensics. 3 Hours.
Introduction to the use of analytical and investigative techniques in criminal or civil litigation to identify, collect, examine and preserve evidence/information magnetically stored or encoded.
JS 515. Investigating Online Crimes. 3 Hours.
Introduction to cyber investigative techniques, involving focused analysis of email and websites; Examination of legal process and preparing evidence in cyber crime cases. (Also CS591).
Prerequisites: JS 502 [Min Grade: C]
JS 530. Ethics and Computer Forensics. 3 Hours.
Overview of different systems of ethics; the role of ethics in computer forensics, cybercrime investigation, and information security; examination of ethical issues facing professionals involved in computer forensics, cybercrime investigation, and information security.
JS 675. Law Evidence and Procedure. 3 Hours.
Overview and examination of the legal aspects of physical evidence, including rules of evidence, procedural rules, and the role of expert witnesses.
JS 696. Graduate Internship in Criminal Justice. 1-6 Hour.
Field experience in criminal justice agency setting. May be repeated for a maximum of 6 hours credit.
LS 571. Legal Elements of Fraud Investigation. 3 Hours.
Key legal principles and courtroom procedures relevant to forensic accounting, and survey of related topics--criminology theories, evidence management, and litigation services.
CS 643. Cloud Security. 3 Hours.
Definition of cloud computing, cloud computing models, privacy, authenticity and integrity of outsourced data, proof of data possession / retrievability, cloud forensics, malware analysis as a service, remote verification of capability and reliability, proof of availability, economic attacks on clouds and outsourced computing, virtual machine security, trusted computing technology and clouds, verifiable resource accounting, cloud-centric regulatory compliance issues and mechanisms, business and security risk models, secure MapReduce, applications of secure cloud computing, private information retrieval and cloud cartography.
CS 645. Modern Cryptography. 3 Hours.
Theory and practices of modern cryptographic techniques, algorithms and protocols, including formal analysis. Secret key encryption algorithms, public key encryption algorithms, stream ciphers, one-way hashing algorithms, authentication and identification, digital signatures, signcryption, key establishment and management, secret sharing and data recovery, zero-knowledge proofs, public key infrastructures, efficient implementation, cryptanalytic attacks and countermeasures, security models, assumptions and proofs.
CS 657. Penetration Testing and Vulnerability Assessment. 3 Hours.
This course focuses on penetration testing and vulnerability analysis. It introduces methodologies, techniques and tools to analyze and identify vulnerabilities in stand-alone and networked applications. It also covers methodologies for legal and standards compliance.
|Byrd, Jim, Instructor of Accounting, 2013, B.S. (Auburn), M.B.A. (Georgia State), M.A., Ph.D. (UAB), CPA, CHFP|
|Earwood, Martha, Teaching Assistant Professor of Criminal Justice & Internship Coordinator, 2003, B.S., M.S. (Georgia State), Corrections, Victimology, Restorative Justice, Experiential Learning.|
|Hasan, Ragib, Assistant Professor of Computer and Information Sciences, 2011, B.S. (Bangladesh), M.S., Ph.D. (Illinois Urbana-Champaign)|
|Johnston, Allen, Associate Professor of Information Systems, Director of Information Systems Programs, 2007, B.S. (LSU), M.B.A., PhD. (Mississippi)|
|Leece, Ryan, Assistant Professor, BS (LSU); MSIS, PhD (Mississippi State)|
|Saxena, Nitesh, Associate Professor of Computer and Information Sciences; MS CFSM Program Co-Director, 2011, B.S. (Kharagpur), M.S., Ph.D. (University of California-Irvine)|
|Walker, Jeffery, Professor and Chair, 2015, PhD (Sam Houston), MA (Arkansas - Little Rock), BS (Arkansas)|
|Warner, Gary, Instructor and Director of Research in Computer Forensics, 2007, B.S. (UAB), Digital Forensics, Cybercrime and Security|
|Wheeler, Anne P., Teaching Assistant Professor, 2012, J.D. (Harvard), Criminal Law, Procedure and Evidence, Law and Society, Litigation Skills and Strategies, Professional Ethics|
|Worrell, James L., Associate Professor of Accounting, 2008, B.S., M.Ac., Ph.D. (Florida State)|
|Zheng, Yuliang, Professor and Chair, 2015, Ph.D. (Yokohama - Japan)|