Earning your MS ISDF at Niagara University:
- prepares you to sit for the Certified Information Systems Security Professional (CISSP) designation, which proves you have what it takes to effectively design, implement and manage a world class cybersecurity program.
- provides you with one full year of experience counted towards the work experience requirement for the CISSP designation
- enables you to sit for the Associate CISSP exam
Niagara University is an official training center for Cellebrite (mobile forensics), which means that you will be eligible to earn your AccessData Certified Examiner (ACE) designation upon successful completion of:
- CIS 565 - Computer Forensics I
- CIS 585 - Computer Forensics II
Our master's degree program in information security and digital forensics (ISDF) is designed to prepare students and working professionals for an exciting and rewarding career in cybersecurity, both in government and in private business. The 36 credit hour program can be completed in four semesters of full-time study and equips individuals with the knowledge necessary for the Certified Information Systems Security Management Professionals (CISSP) certification.
Students are trained utilizing professional applications in computer and mobile forensics, and provided knowledge and expertise in network security, ethical hacking and privacy. This training occurs in one of our new on-campus information security labs.
Presents students with the opportunity to explore and discuss information security, to learn about current information security threats and how to protect information. Students will gain experience in the use of network protection mechanisms such as firewalls, intrusion detection systems, and other security tools. Three (3) Credit Hours
Introduces the students to research and topics in Data Privacy. Privacy is increasingly becoming critical to both organizations and private citizens. This course explores privacy from various fronts including its
impact on businesses. Additionally, students will examine privacy from a global perspective, in particular, how international privacy policies concerning information security compare to those in the US. Three (3) Credit Hours
A study of the existing risk management frameworks, models, processes and tools to equip students with the theory, science and practical knowledge to operationalize risk management in an organization or government agency. Three (3) Credit Hours
Presents students with the opportunity to explore and discuss ethical hacking, and to specifically learn about methods used to prevent unauthorized access to networks. Students will gain experience in the use of penetration testing tools, vulnerability assessment tools as well as reporting. Furthermore, students will look at exploits in detail to understand preventative measures. Three (3) Credit Hours
Introduces network firewall security. It will cover basic installation techniques, discuss how to make an intelligent choice of firewall technology and present basic firewall troubleshooting. Moreover, it will cover different intrusion detection systems and their signatures. Students will complete hands-on exercises and case projects for testing and evaluating various firewall techniques. Three (3) Credit Hours
Introduces students to research in foundations of software security. Basic static and dynamic enforcement of security policies to enhance software security will be investigated. Language-based security and tools for specifying security policies for different programming languages will also be discussed. Three (3) Credit Hours
Introduces students to the techniques and tools of computer forensic investigations. Students will learn how to utilize computer forensic tools in investigations. The course maps to the objectives of the IACIS certification. Topics include coverage of the latest technology including cell phones, and portable devices. Three (3) Credit Hours
Advances student’s knowledge of computer forensics and allows students to sit for the ACE certification. Topics include password recovery, network forensics and forensic case investigations. Additionally, students will research current computer forensics issues in a changing digital world. Three (3) Credit Hours
Introduces students to the foundations of modern cryptography, with an eye toward practical applications. The objective of this course is to provide a foundation of cryptography in an applied manner so that students can grasp its importance in relation to the rest of the information security field. The course covers the principles of number theories and cryptographic algorithms and cryptanalysis. Three (3) Credit Hours
Will familiarize students with mobile devices and technology used by carriers as it relates to mobile forensics. Students will identify data that can be retrieved from mobile devices, such as cell phones, smartphones, and GPS devices. Recovered data will be analyzed and investigated to recreate crime scenes. Three (3) Credit Hours
The combination of theory, principles, best practices, methodologies, tools, and technologies associated with Information Security and digital forensics. The Capstone seminar uses scholarly research methods to develop analytics, problem- solving, and research skills required to solve a real-world information security challenges. Three (3) Credit Hours
The combination of theory, principles, best practices, methodologies, tools, and technologies associated with Information Security and digital forensics. The Capstone seminar uses scholarly research methods to develop analytics, problem- solving, and research skills required to solve a real-world information security challenges. CIS 600/601 require ISDF students to present their findings/research to an open forum on campus, Three (3) Credit Hours