Students undertake an in-depth study of decisions by the U.S. Supreme Court and other appellate courts that affect rights of criminal suspects from the time of investigation to trial. This class will follow landmark and current cases of the Supreme Court and other appellate courts as the courts struggle with the effects of technology and global terror.
This course examines the nature of justice through careful reading of selected texts in the classical and modern traditions. The importance of justice to the administration of law is emphasized.
This course focuses on psychological research and its contribution to understanding legal issues and processes, with particular emphasis on judicial decision-making.
Using case analysis and personal experimentation, students explore aspects of government decision making, factors that influence the decisions, and their impact on the justice system.
Students explore the history of intelligence gathering and will develop a thorough understanding of the U.S. intelligence community, including its formation, development, analytical theories, and current status as influenced by the events of 9/11 and the U.S. Patriot Act. Legal and ethical issues will be analyzed. Students will also focus on relevant psychological principles and the roles played by politics, technology and media.
Students examine issues facing justice practitioners and leaders from a management perspective, with an emphasis on structure, policies, discipline, budgetary problems, public relations, and civil liberties in an increasingly technological global environment.
This course will provide instruction for current and future managers and leaders who will be called upon to use the Incident Command System (ICS). It will provide a standards-based language to coordinate their response as they begin to understand their role in a complex multi-jurisdictional response to an all-hazard event. Students will learn that all hazards are "local," but can escalate into an event of global significance and consequence. The course will give the students a chance to understand how this training applies to the "Whole of Nations."
This course will introduce students to the principles of digital forensics. The essentials covered in this class will include computer system storage fundamentals, operating systems and data transmission, computer network architecture, digital forensic best practices, proper evidence collection and storage, and federal rules and criminal codes. Upon successful completion of this class, the student will be ready to proceed into more advanced and technical classes such as computer forensics, mobile device forensics and malicious code forensics.
This course will build upon the concepts taught in Principles of Digital Forensics. The student will be introduced to forensic software not limited to Forensic Tool Kit (FTK), Encase, and a suite of free open source software not limited to The Sleuth Kit, Autopsy, SANS SIFT, and Kali. The student will be introduced to forensic hardware and learn how to properly image computer media in a forensically sound manner.
This course explores the relatively new discipline of cyberthreat analysis at a basic level, introducing students to the methodology of investigation, the threat environment (cyberspace), some of the online tools used by analysts, and their application in real world examples. Students will be introduced to the key concepts, tools, and terminologies used by professionals in the field, and apply what they learn in practical exercises that model real-world events.
This course explores the relatively new discipline of cyberthreat management. This course will introduce students to the threat landscape and help them to understand the methodology used to mitigate threats to personnel and their agencies. Students will learn about some of the tools and resources currently used by technicians so that they will gain a better understanding of how investigations may be more successful in a constitutionally ethical process. Students will understand the necessity of cyberdisruption planning with a goal of redundancy and resiliency. Economics will inevitably force managers to regionalize services and facilitate an interoperable solution. Students will develop this knowledge from a basic understanding of risk management and control, along with a study of legal and compliance topics. The field of forensics will be explored including a demonstration of how a forensic analysis is performed, and how to manage the process of a technical investigation.
The field of cyberintelligence has expanded and is evolving as a critical part of situational awareness for the nearly 200 countries connected to the Internet today. In addition to these countries, criminal organizations, extremist groups and terrorists have also developed cyber intelligence capabilities to further their efforts to use the Internet for their overt and covert activities. Cyberterrorism has emerged as a growing threat to national security. This is true not only for the U.S., but also for many countries around the world. Terrorists have recognized the value of the Internet for recruiting and covert communication, as well as a weapon against their adversaries. This program will provide unique insight into how terrorists use the Internet and will give the students insights into the challenges that we face.
This course focuses on drugs/substances that impair an individual. Drug users exhibit symptoms that can impair judgment while driving a vehicle, as well as affect a person's abilities in the workplace and schools. The course will also cover how drugs and other substances can affect a student's ability to learn effectively and how illegal substances affect today's society, locally as well as globally. This course is important to all disciplines operating in a homeland security environment.
The challenge to "do more with less" is being felt across all the sectors of our nation, for-profit businesses, nonprofits, and government, alike. Guided by their organization's mission, successful leaders possess the skills necessary to confront budgetary constraints through innovative solutions and partnerships. One such approach involves a paradigm shift and engaging the philanthropic community. The question is not, "How can they help you achieve your mission?" but rather, "How can you help them achieve theirs?" Students with little or no grant-writing experience will be introduced to the process of utilizing an agency's budget as a foundation for planning, researching, selecting, collaborating, creating fundable ideas and developing the essential components and budget for an effective grant proposal. The role of philanthropy, along with a brief historical perspective, will be explored, particularly as it relates to the grant-makers in American society. The course will place emphasis upon practical application to the student's place of employment or area of interest, whenever possible. Students will gain specific knowledge to assist them in maneuvering through the myriad of funding opportunities, and develop the ability to research, identify and distinguish between various types of funding sources.
This course will explore the relationship between cultural issues and criminal justice processing. Citizens from various cultural communities in our global environment are challenged by perceptions and misconceptions. Executive leaders, not limited to law enforcement, must gain a respect for the intended and unintended consequences of their actions, training, and education. Students will learn to foster cultural competencies through examples of quantified, qualified, and theoretical research and the application of this knowledge to everyday life.
This course will introduce students to the topic of network security and provide them with a background on networking fundamentals such as common protocols, port numbers and relevant security appliances (firewalls, web filtering, IDPS). An emphasis will be placed on covering different types of network intrusion events and proposing countermeasures that can be applied by network defenders to detect/prevent these types of attacks. Students will also be trained on how to perform live collection & analysis of network events through the examination of packet capture (PCAP) files via Wireshark in order to understand the different pieces of evidence that can be gathered from such evidence and subsequently deployed as signatures to perform attack sensing and warning (AS&W) across an enterprise network.
The class will be an overview of the Nature of Cyber Intelligence, which will discuss the theory, the objectives, challenges and differences between Government and Private sector Cyber Intelligence objectives, and how cyber analysts create effective intelligence reports. Real world case studies will be used, aimed at providing a forum for the students to understand intelligence indicators and methods, for providing decision makers with various options that remove conjecture and bias. The course will also reinforce the importance of analytic methods, critical to understanding the next generation of intelligence.
The Mobile Forensics course includes the collection, preservation and analysis of data from mobile devices such as cell phones, tablets, and PDA's. The course will expand on the principles of digital forensics, teaching students how to review data stored on mobile devices including phone calls, text, internet history, photos and videos. It will teach the students how to acquire and analyze a forensically sound image of a wide range of mobile devices such as iPhones, Android devices, and GPS units using a portfolio of forensic devices and software. This course will primarily take place in a lab setting with the majority of the course work devoted to technical hands-on work and technical writing.
This course will challenge students to think more systemically about the current threat landscape as it relates to insider threats. This course is designed to assist management, human services, and information technology professionals with the prevention, detection, and mitigation of risks associated with Insider Threats. Instructional methods include readings, written assignments, online discussion forums, and computer lab assignments.
Malware, also known as malicious software, can harm computers and networks. It can destroy and corrupt files leading to the exposure of sensitive information, loss of money, and useless resources. Students registered for this highly technical course will learn the basics of malware code. This includes how malicious code is created and how it behaves on a host/network. Students will make use of a virtual machine environment in order to safely run and reverse engineer real world samples of malicious code, conduct static and dynamic code analysis, and incorporate their findings and analysis into technical forensic reports.
This course examines the effects of terrorism on the global security environment. It analyzes the challenges of combating terrorists and terrorist organizations while assessing the effectiveness of counterterrorism efforts, both at home and abroad. Students will gain a perspective of global counterterrorism and investigate new and innovative ways to respond to these changes into the future.
This course examines a wide range of quantitative and qualitative statistical techniques, and the applied use of survey instruments, transpersonal research methods, and data visualization best practices. Upon completion, students will have the ability to both interpret data and present research findings to senior decision makers to allow them to make informed policy-level choices.
The primary focus of this course will be on examining the various methods and information alternatives that exist in gathering information and intelligence. The students will gain a thorough background in analytical technology and methodology by developing projects and performing research that principally focuses on organizing, problem-solving, and strengthening project management strategies.
This course studies the response of law enforcement and information systems scientists to the use of computers and related technologies for criminal purposes. While no prior computer knowledge is required, students will use computers as a part of this class. Major policy issues surrounding this area will also be discussed.
This course is designed to broaden individual understanding of the ever changing threatscape posed to American infrastructure by advanced and persistent state sponsored adversaries The class will also prepare students to begin a career in a cyber Security Operations Center (SOC), Computer Emergency Response Team (CERT) or as a cyber intelligence analyst by fostering technical and analytical skills against known APT skill sets and tool kits.
This course provides an opportunity to explore current topics not covered in regularly offered courses. Evolving technologies and contemporary trends in justice and homeland security law and practice may create opportunities to present the most timely and important topics to students. All students may individualize their program of study to access special topics classes with collaboration and permission from the program director. Recent topics have included: The Philosophy of Police, Strategic Planning for Law Enforcement Executives, Community Policing, Organized Crime, White Collar Crime, Contemporary Issues in Undercover Operations, Police Use of Force, and Advanced Community Policing.
The internship is an individual work experience or project in an organization (normally off-campus) under the supervision of a practicing professional and structured by a Salve Regina University faculty member. Although the specific nature of the internship varies with the student's academic interest, there should be a close relationship between the program of study and the non-academic setting. The internship is a supervised learning experience for academic credit typically consisting of a minimum of 120 hours (40 hours/credit) of on-the-job experience occurring within a semester. This course may be repeated for a total of six credits.