Page 262 - Southwestern Community College Catalog 2019-2020
P. 262

256
COURSE DESCRIPTIONS
CCT 241 Advanced Data Recovery (2-3-3)
Prerequisite: CCT 240
This course further explores the methodologies necessary to assist in the investigation and
analysis of cyber crimes. Topics include commercial and open-source software tools for working with evidence acquisition, data recovery, and encryption. Upon completion, students should be able to perform the data recovery and analysis for a complete criminal or corporate investigation.
CCT 250 Network Vulnerabilities I (2-2-3)
Prerequisite: CTI 120
This course introduces students to penetration testing, network vulnerabilities, and
hacking. Topics include an overview of traditional network security, system hardening, and known weaknesses. Upon completion, students will be able to evaluate weaknesses related to traditional networks, wireless technologies, remote access, and network security devices such as  rewalls and intrusion detection systems.
CCT 251 Network Vulnerabilities II (2-2-3)
Prerequisite: CCT 250
This course is a continuation of CCT 250 Network Vulnerabilities I. Topics include analyz-
ing advanced techniques for circumventing network security hardware and software. Upon completion, students will be able to assemble a test kit for multiple operating systems, scan and footprint networks, and test all aspects of network vulnerability.
CCT 271 Mac Digital Forensics (1-4-3)
This course provides students with the unique knowledge and skills necessary to analyze Macintosh operating system artifacts and  le system mechanics. Topics include Macintosh architecture, HFS (+) based  le systems, Macintosh decryption, address book and chat archives, Internet artifacts related to Safari and Firefox. Upon completion, students will be able to use the course processes and methodologies to forensically analyze a Mac computer.
CCT 272 Forensic Password Recovery (1-4-3)
This course introduces the unique skills and methodologies necessary to assist in the in- vestigation and prosecution of cyber crimes involving decryption. Topics include decryption of PGP key rings, private keys, EFS hard drives, and encrypted containers. Upon completion, students will be able to use the course processes and methodologies to obtain forensic evi- dence from encrypted  les, folders, and systems.
CCT 285 Trends in Cyber Crime (2-2-3)
Prerequisite: CCT 110
This course covers and explores advances and developments in cyber crime technologies.
Emphasis is placed on computer forensics tools, information protection and security, threat response, and professional development. Upon completion, students should be able to ar- ticulate understanding of the current state of the industry as well as emerging technologies for cyber crime technology.
CCT 289 Capstone Project (1-6-3)
Prerequisite: CCT 231
This course provides experience in cyber crime investigations or technology security au-
dits in either the public or private domain. Emphasis is placed on student involvement with businesses or agencies dealing with technology security issues or computer crime activities. Upon completion, students should be able to successfully analyze, retrieve erased evidence and testify in mock proceedings against these criminal entrepreneurs.
2019-20 Catalog


































































































   260   261   262   263   264