1314-02 Digital Forensics Major, 2013 December 2

Online content

Fullscreen
Senate Bill 1314-02 
 
UNIVERSITY SENATE 
 
UNVERSITY AT ALBANY 
STATE UNIVERSITY OF NEW YORK 
 
 
 
Introduced by:  
UAC 
 
Date:  
 
 November 25, 2013 
 
 
 
PROPOSAL  
TO CREATE A BACHELOR OF SCIENCE DEGREE IN DIGITAL FORENSICS 
 
 
 
 
IT IS HEREBY PROPOSED THAT: 
 
 
1. The University Senate approve the following proposal to create a Bachelor of Science 
degree in Digital Forensics, as recommended by the Undergraduate Academic Council. 
2. That these changes take effect beginning with the Fall 2014 semester. 
3. This bill be forwarded to the President for approval. 
 
 
Updated	
  last	
  11/25/13	
  10:43pm	
  
	
  
 
 
 
 
 
 
 
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
A	
  PROPOSAL	
  FOR	
  UNDERGRADUATE	
  ACADEMIC	
  PROGRAMS	
  LEADING	
  TO 
THE	
  B.S.	
  IN DIGITAL FORENSICS 
	
  
	
  
Submitted to 
	
  
	
  
THE UNIVERSITY AT ALBANY UNIVERSITY SENATE 
	
  
By 
	
  
THE SCHOOL OF BUSINESS 
UNIVERSITY AT ALBANY, STATE UNIVERSITY OF NEW YORK 
	
  
	
  
	
  
	
  
	
  
April 5, 2013 
 
	
  
	
  
2	
  
TABLE	
  OF	
  CONTENTS	
  
TABLE	
  OF	
  CONTENTS	
  ..........................................................................................................................	
  2	
  
I.	
  	
  	
  	
  INTRODUCTION	
  ..............................................................................................................................	
  3	
  
I.1.	
   PREAMBLE	
  .......................................................................................................................................................	
  3	
  
I.2.	
   EXECUTIVE	
  SUMMARY	
  ....................................................................................................................................	
  4	
  
II.	
  	
  	
  	
  PROGRAM	
  SUMMARY	
  ..................................................................................................................	
  5	
  
II.1.	
   MISSION	
  ..........................................................................................................................................................	
  5	
  
II.2	
  	
   RATIONALE	
  FOR	
  THE	
  PROPOSED	
  PROGRAMS	
  AND	
  INSTITUTIONAL	
  CONTEXT	
  .....................................	
  7	
  
II.3	
  	
   LEARNING	
  OUTCOMES	
  AND	
  ASSESSMENT	
  ..................................................................................................	
  9	
  
II.3.1	
  	
   Learning	
  Outcomes	
  for	
  B.S.	
  Program	
  in	
  Digital	
  Forensics	
  ..................................................	
  9	
  
II.3.2	
  	
   Assessment	
  Practice	
  and	
  Methodology	
  .....................................................................................	
  10	
  
II.4	
  	
   ADMISSION	
  ..................................................................................................................................................	
  11	
  
II.4.1	
   Direct	
  Admission	
  of	
  Freshmen	
  .......................................................................................................	
  11	
  
II.4.2	
  Retention	
  and	
  Movement	
  to	
  Upper	
  Division	
  ................................................................................	
  12	
  
II.4.3	
  Admission	
  with	
  Advanced	
  Standing	
  Status	
  ..................................................................................	
  12	
  
II.4.4.	
  Admission	
  of	
  Transfers	
  with	
  Advanced	
  Standing	
  .....................................................................	
  12	
  
II.5	
   ADMISSIONS	
  AND	
  ACADEMIC	
  STANDING	
  ..................................................................................................	
  13	
  
II.5.1	
   Appeals	
  of	
  Admission	
  Decisions	
  .....................................................................................................	
  13	
  
II.5.2	
   Grade	
  Grievances	
  .................................................................................................................................	
  13	
  
II.5.3	
   Reinstatement	
  to	
  the	
  Major	
  from	
  a	
  University	
  Dismissal	
  ..................................................	
  13	
  
II.5.4	
   Student	
  Advisement	
  and	
  Mentoring	
  ............................................................................................	
  14	
  
II.6	
  	
   CURRICULUM	
  OUTLINE	
  ..............................................................................................................................	
  14	
  
II.6.1	
  	
   Program	
  Components	
  and	
  Rubrics	
  .............................................................................................	
  14	
  
II.6.2	
  	
   Program	
  Requirements	
  ....................................................................................................................	
  15	
  
II.6.3	
  	
   General	
  Education	
  Requirements	
  ................................................................................................	
  15	
  
II.6.4	
  	
   Digital	
   Forensics	
   Semester-­‐by-­‐Semester	
   Major	
   Academic	
   Pathway	
   (MAP)	
   and	
  
Course	
  Matrix	
  ........................................................................................................................................................	
  18	
  
II.6.5	
  	
   Student	
  Advising	
  and	
  Career	
  Development	
  .............................................................................	
  20	
  
III.	
  ENROLLMENT	
  ................................................................................................................................	
  20	
  
V.	
  	
   FACULTY	
  .......................................................................................................................................	
  22	
  
APPENDIX	
  VI.1	
  DIGITAL	
  FORENSICS	
  MAJOR	
  COURSE	
  CATALOGUE	
  DESCRIPTIONS	
  ....	
  23	
  
APPENDIX	
  VI.2	
  UNDERGRADUATE	
  “DIGITAL	
  FORENSICS”	
  AT	
  OTHER	
  INSTITUTIONS28	
  
APPENDIX	
  VI.3	
  INCORPORATING	
  ACADEMIC	
  COMPETENCIES	
  INTO	
  MAJOR	
  .................	
  31	
  
APPENDIX	
  VI.4	
  LETTERS	
  OF	
  COMMITMENT	
  .............................................................................	
  38	
  
APPENDIX	
  VI.5	
  TRANSFER	
  AGREEMENT	
  OUTREACH	
  ACTIVITIES	
  .....................................	
  44	
  
APPENDIX	
  VI.6	
  SYLLABI	
  FOR	
  NEW	
  BFOR	
  AND	
  BACC	
  COURSES	
  ...........................................	
  49	
  
	
  
	
  
	
  
	
  
	
  
3	
  
I.	
  	
  	
  	
  INTRODUCTION	
  
I.1.	
  
PREAMBLE	
  
As	
  discussed	
  in	
  the	
  NY	
  SUNY	
  2020	
  UAlbany	
  Impact	
  Proposal	
  for	
  New	
  Faculty	
  and	
  in	
  accordance	
  
with	
  the	
  School	
  of	
  Business	
  (SOB)	
  Faculty	
  Charter	
  and	
  Bylaws,	
  the	
  School	
  of	
  Business	
  Charter	
  and	
  
Bylaws,	
  the	
  School	
  of	
  Business	
  standing	
  “Undergraduate	
  Affairs	
  Committee”,	
  the	
  faculty	
  formally	
  
approved	
  the	
  proposal	
  on	
  April	
  17,	
  2013	
  for	
  undergraduate	
  curriculum	
  for	
  a	
  baccalaureate	
  degree	
  
in	
  Digital	
  Forensics.	
  The	
  School	
  of	
  Business	
  resolved	
  to	
  formally	
  advance	
  this	
  curriculum	
  for	
  review	
  
and	
  approval	
  of	
  the	
  baccalaureate	
  degree	
  in	
  Digital	
  Forensics	
  per	
  the	
  policies	
  and	
  guidelines	
  of	
  the	
  
School	
  of	
  Business,	
  the	
  University	
  at	
  Albany	
  University	
  Senate,	
  the	
  University	
  at	
  Albany,	
  the	
  State	
  
University	
  of	
  New	
  York,	
  and	
  the	
  New	
  York	
  State	
  Education	
  Department.	
  	
  
	
  
While	
  information	
  security	
  education	
  has	
  grown	
  significantly	
  over	
  the	
  past	
  10	
  years,	
  education	
  in	
  
Digital	
   Forensics	
   has	
   only	
   recently	
   emerged	
   as	
   critical	
   specialty	
   –	
   distinct	
   from	
   information	
  
security.	
  Digital	
  Forensics	
  is	
  a	
  branch	
  of	
  forensic	
  science	
  that	
  involves	
  investigation,	
  recovery,	
  an	
  
analysis	
  of	
  information	
  from	
  digital	
  devices	
  –	
  typically	
  related	
  to	
  computer	
  crime.	
  These	
  devices	
  can	
  
include	
   computers,	
   smartphones,	
   mp3	
   players,	
   digital	
   cameras,	
   etc.	
   While	
   information	
   security	
  
deals	
   with	
   protection	
   of	
   computers	
   and	
   networks,	
   Digital	
   Forensics	
   deals	
   with	
   post-­‐mortem	
  
analysis	
   of	
   computer	
   attacks	
   and	
   fraud;	
   collection	
   and	
   presentation	
   of	
   criminal	
   evidence;	
   and	
  
determinations	
  of	
  responsibility	
  and	
  consequences.	
  The	
  Digital	
  Forensics	
  field	
  is	
  multidisciplinary.	
  
It	
   involves	
   application	
   of	
   information	
   technologies	
   and	
   strategies	
   within	
   the	
   public	
   sector	
   and	
  
private	
  industry,	
  international	
  collaboration	
  towards	
  legislation	
  development	
  and	
  law	
  enforcement,	
  
as	
   well	
   as	
   an	
   understanding	
   of	
   human	
   behavior.	
   These	
   activities	
   have	
   obvious	
   benefits	
   to	
   the	
  
community-­‐at-­‐large	
  by	
  providing	
  the	
  capabilities	
  and	
  workforce	
  to	
  fill	
  the	
  demand	
  for	
  professionals	
  
to	
  ensure	
  the	
  security	
  and	
  safety	
  of	
  citizens	
  and	
  the	
  preservation	
  of	
  justice.	
  	
  
	
  
The	
   National	
   Academies	
   of	
   Science	
   have	
   warned	
   that	
   the	
   people	
   of	
   the	
   United	
   States	
   will	
   face	
   a	
  
lower	
  standard	
  of	
  living	
  if	
  knowledge-­‐intensive	
  jobs	
  further	
  decline	
  in	
  the	
  US.1	
  American	
  workers	
  
face	
   increased	
   job	
   competition	
   from	
   lower-­‐wage	
   workers	
   internationally,	
   with	
   leading-­‐edge	
  
scientific	
   and	
   technology	
   jobs	
   being	
   performed	
   in	
   many	
   parts	
   of	
   the	
   world.	
   Consequently,	
   large	
  
numbers	
  of	
  students	
  are	
  moving	
  away	
  from	
  STEM	
  fields	
  including	
  computing	
  and	
  engineering2.	
  To	
  
increase	
   enrollments	
   in	
   these	
   fields,	
   Denning	
   and	
   McGettrick 3 	
  have	
   suggested	
   reengineering	
  
traditional	
  computing	
  education	
  to	
  focus	
  on	
  specialized	
  fields.	
  As	
  enrollments	
  drop	
  in	
  technology-­‐
based	
   disciplines,	
   new	
   programs	
   are	
   emerging	
   in	
   specialized	
   fields,	
   such	
   as	
   Digital	
   Forensics,	
   to	
  
attract	
  students	
  disenfranchised	
  by	
  traditional	
  computing.	
  In	
  the	
  past,	
  demand	
  for	
  professionals	
  
in	
  this	
  field	
  primarily	
  came	
  from	
  law	
  enforcement	
  agencies4;	
  today,	
  the	
  demand	
  is	
  largely	
  
coming	
  from	
  private-­‐sector	
  organizations	
  and	
  is	
  being	
  driven	
  by	
  business	
  needs	
  including:	
  
data	
   recovery,	
   electronic	
   discovery,	
   incident	
   response,	
   policy	
   auditing	
   and	
   third-­‐party	
  
forensic	
  analysis	
  services5.	
  According	
  to	
  the	
  Bureau	
  of	
  Labor	
  Statistics,	
  jobs	
  in	
  Digital	
  Forensics	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
1	
  National	
  Academies	
  of	
  Science	
  (NAS).	
  Committee	
  on	
  Science,	
  Engineering,	
  and	
  Public	
  Policy.	
  (2007).	
  Rising	
  above	
  the	
  
2	
  Seymour,	
  E.	
  &	
  Hewitt,	
  N.	
  M.	
  (2000).	
  	
  Talking	
  about	
  leaving:	
  why	
  undergraduates	
  leave	
  the	
  sciences.	
  Boulder,	
  CO,	
  USA:	
  
Westview	
  Press.  
3	
  Denning,	
  P.	
  J.	
  &	
  McGettrick,	
  A.	
  (2005,	
  November).	
  Recentering	
  computer	
  science.	
  Communications	
  of	
  the	
  ACM,	
  48(11),	
  
15-­‐19.	
  
4	
  	
  Yasinsac,	
   A.,	
   Erbacher,	
   R.	
   F.,	
   Marks,	
   D.	
   G.,	
   Pollitt,	
   M.	
   M.,	
   Sommer,	
   P.	
   M.	
   (2003).	
   Computer	
   forensics	
   education.	
   IEEE	
  
Security	
  &	
  Privacy,	
  2003(1),	
  15–23.	
  	
  
5	
  Kessler,	
  G.	
  C.	
  &	
  Haggerty,	
  D.	
  A.	
  (2010).	
  An	
  online	
  graduate	
  program	
  in	
  digital	
  investigation	
  management:	
  pedagogy	
  and	
  
overview.	
  Journal	
  of.	
  Digital	
  Forensic	
  Practice	
  3(1),	
  11-­‐22.	
  
	
  
	
  
4	
  
are	
  expected	
  to	
  grow	
  over	
  13.3%	
  by	
  20166.	
  Creating	
  a	
  Digital	
  Forensics	
  program	
  is	
  a	
  natural	
  next	
  
step	
  that	
  builds	
  on	
  our	
  past	
  successes	
  in	
  the	
  area	
  of	
  information	
  security	
  and	
  will	
  place	
  UAlbany	
  at	
  
the	
  forefront	
  in	
  this	
  area.	
  	
  
	
  
The	
  demand	
  for	
  Digital	
  Forensics	
  training	
  is	
  outpacing	
  supply	
  –	
  leading	
  to	
  an	
  acute	
  shortage	
  
of	
  training	
  in	
  Digital	
  Forensics	
  nationally	
  and	
  internationally.	
  The	
  need	
  for	
  Digital	
  Forensics	
  
education	
   is	
   more	
   recent	
   and	
   has	
   grown	
   as	
   use	
   of	
   computers	
   in	
   crime	
   and	
   fraud	
   has	
   become	
   a	
  
significant	
   threat	
   in	
   the	
   United	
   States	
   but	
   around	
   the	
   world.	
   According	
   to	
   Norton	
   Cybercrime	
  
Report	
  20117,	
  net	
  cybercrime	
  costs	
  globally	
  equal	
  $388	
  billion	
  across	
  24	
  countries	
  –	
  more	
  than	
  the	
  
black	
  markets	
  for	
  marijuana,	
  cocaine,	
  and	
  heroin	
  combined	
  ($288	
  billion)	
  and	
  close	
  to	
  the	
  value	
  of	
  
the	
  total	
  global	
  drug	
  trafficking	
  market	
  ($488	
  billion).	
  Our	
  program	
  will	
  also	
  make	
  use	
  of	
  online	
  and	
  
blended	
  learning	
  especially	
  in	
  the	
  third	
  year	
  of	
  the	
  program.	
  Given	
  the	
  attractive	
  option	
  of	
  partial	
  
online	
  education,	
  our	
  program	
  here	
  at	
  UAlbany	
  will	
  attract	
  students	
  not	
  only	
  from	
  other	
  states,	
  but	
  
also	
   from	
   other	
   countries.	
   We	
   are	
   already	
   building	
   collaborations	
   with	
   international	
   partners	
   in	
  
offering	
   our	
   information	
   security	
   graduate	
   certificate	
   courses	
   internationally	
   (Russia,	
   Armenia,	
  
Spain,	
  Georgia).	
  We	
  will	
  leverage	
  these	
  international	
  connections	
  to	
  spread	
  our	
  Digital	
  Forensics	
  
curriculum	
  worldwide.	
  The	
  paucity	
  of	
  Digital	
  Forensics	
  programs	
  provides	
  us	
  a	
  captive	
  audience	
  of	
  
students	
   who	
   have	
   few	
   choices	
   for	
   advancing	
   their	
   skills	
   and	
   gives	
   UAlbany	
   an	
   early	
   mover	
  
advantage	
  to	
  build	
  one	
  of	
  the	
  leading	
  programs	
  in	
  this	
  field.	
  We	
  will	
  be	
  the	
  first	
  SUNY	
  and	
  public	
  
state	
  institution	
  in	
  New	
  York	
  that	
  offers	
  a	
  bachelor’s	
  degree	
  in	
  Digital	
  Forensics.	
  	
  	
  
	
  
This	
   document	
   outlines	
   the	
   curriculum	
   proposed	
   for	
   a	
   B.S.	
   in	
   Digital	
   Forensics,	
   which	
   was	
  
unanimously	
   approved	
   by	
   the	
   faculty	
   of	
   the	
   School	
   of	
   Business.	
   The	
   School	
   of	
   Business	
  
Undergraduate	
   Affairs	
   committee	
   that	
   reviews	
   all	
   curricular	
   changes	
   in	
   the	
   School	
   of	
   Business	
  
approved	
  the	
  program	
  on	
  February	
  5,	
  2013.	
  The	
  document	
  containing	
  the	
  curriculum	
  proposal	
  is	
  
presented	
  in	
  what	
  follows	
  in	
  a	
  unified	
  format	
  to	
  facilitate	
  review	
  and	
  evaluation,	
  is	
  being	
  submitted	
  
to	
  the	
  University	
  at	
  Albany	
  University	
  Senate	
  for	
  assessment	
  and	
  action.	
  
I.2.	
  
EXECUTIVE	
  SUMMARY	
  
The	
  School	
  of	
  Business	
  (SOB)	
  of	
  the	
  University	
  at	
  Albany,	
  State	
  University	
  of	
  New	
  York	
  (UAlbany)	
  
proposes	
   academic	
   curriculum	
   leading	
   towards	
   the	
   degree	
   of	
   Bachelor	
   of	
   Science	
   in	
   Digital	
  
Forensics.	
   The	
   curriculum	
   proposed	
   is	
   intended	
   to	
   attract	
   and	
   retain	
   at	
   UAlbany	
   a	
   significant	
  
portion	
  of	
  the	
  undergraduate	
  student	
  population	
  that	
  is	
  presently	
  inaccessible	
  to	
  SUNY	
  and	
  most	
  of	
  
the	
  private	
  institutions	
  of	
  learning	
  in	
  New	
  York	
  State.	
  	
  This	
  inaccessibility	
  is	
  driven	
  by	
  the	
  lack	
  of	
  
the	
  four-­‐year	
  undergraduate	
  digital	
  forensics	
  degree	
  that	
  is	
  sought	
  by	
  this	
  rapidly	
  growing	
  sector	
  of	
  
the	
  university	
  clientele.	
  Digital	
  forensic	
  analysts	
  are	
  in	
  high	
  demand	
  in	
  this	
  technologically-­‐driven	
  
world	
   and	
   with	
   abundant	
   opportunities	
   in	
   both	
   public	
   and	
   private	
   sectors,	
   the	
   job	
   outlook	
   is	
  
excellent.	
  
 
The	
   curriculum	
   represents	
   a	
   120-­‐credit	
   program	
   designed	
   for	
   completion	
   in	
   eight	
   academic	
  
semesters	
   and	
   is	
   consistent	
   with	
   the	
   SUNY	
   General	
   Education	
   Program	
   requirements,	
   as	
  
implemented	
   at	
   UAlbany.	
   The	
   curriculum	
   comprises	
   a	
   cutting-­‐edge,	
   inherently	
   interdisciplinary,	
  
academic	
   program	
   centered	
   on	
   scholarly	
   excellence,	
   educational	
   quality,	
   and	
   technical	
   and	
  
pedagogical	
   innovation.	
   	
   	
   The	
   outcome	
   is	
   a	
   unique	
   undergraduate	
   experience	
   that	
   taps	
   into	
   the	
  
existing	
  strength	
  of	
  the	
  School	
  of	
  Business	
  in	
  the	
  area	
  of	
  information	
  security	
  and	
  digital	
  forensics	
  
to	
   attract	
   and	
   educate	
   a	
   diverse	
   and	
   talented	
   pool	
   of	
   students	
   at	
   the	
   baccalaureate	
   level,	
   and	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
6	
  United	
  States.	
  Department	
  of	
  Labor.	
  Bureau	
  of	
  Labor	
  Statistics.(2009).	
  Occupational	
  Outlook	
  Handbook,	
  2008-­‐09	
  Edition.	
  	
  
7
	
  	
  
Symantec.	
  
(2011).	
  
Norton	
  
Cyber	
  
Crime	
  
Report	
  
2011.	
  
Retrieved	
  
from:	
  
http://www.symantec.com/content/en/us/home_homeoffice/html/cybercrimereport/	
  
	
  
	
  
5	
  
position	
  UAlbany	
  to	
  further	
  cement	
  its	
  role	
  as	
  a	
  competitive	
  and	
  valuable	
  educational	
  resource	
  to	
  
the	
  State	
  University	
  of	
  New	
  York	
  and	
  the	
  State	
  of	
  New	
  York.	
  	
  
	
  
Blueprint	
  of	
  the	
  curriculum	
  is	
  comprised	
  of	
  four	
  basic	
  components:	
  1)	
  a	
  “Foundational	
  Principles’”	
  
component,	
   2)	
   a	
   “Core	
   Competency”	
   component,	
   3)	
   a	
   “Concentration”	
   component	
   and,	
   4)	
   a	
  
“Capstone”	
  component.	
  	
  The	
  first	
  two	
  components	
  are	
  designed	
  to	
  integrate	
  the	
  dissemination	
  of	
  
fundamental	
   principles	
   with	
   the	
   cultivation	
   of	
   the	
   critical	
   skill	
   set	
   necessary	
   for	
   advanced	
  
undergraduate	
  coursework	
  and	
  interdisciplinary	
  research.	
  The	
  remaining	
  two	
  components	
  expand	
  
on	
   these	
   foundational	
   skills	
   to	
   develop	
   the	
   topical	
   expertise,	
   technical	
   depth,	
   and	
   independent	
  
analytic	
  abilities	
  that	
  are	
  essential	
  to	
  a	
  well-­‐rounded	
  undergraduate	
  educational	
  experience.	
  	
  The	
  
curriculum	
   offers	
   ability	
   for	
   students	
   to	
   take	
   elective	
   courses	
   across	
   campus	
   to	
   build	
   more	
  
expertise	
  in	
  the	
  areas	
  of	
  law	
  enforcement,	
  information	
  security,	
  or	
  business.	
  We	
  plan	
  on	
  working	
  
with	
  the	
  College	
  of	
  Computing	
  and	
  Information	
  Computer	
  Science	
  Department	
  and	
  the	
  Rockefeller	
  
College	
  Department	
  of	
  Political	
  Science	
  in	
  the	
  future	
  to	
  create	
  elective	
  courses	
  geared	
  towards	
  this	
  
degree	
  program.	
  
	
  
The	
  proposed	
  undergraduate	
  curricula	
  will	
  hold	
  a	
  scholarly	
  profile	
  and	
  pedagogical	
  impact	
  that	
  is	
  
singularly	
  distinct	
  from	
  and	
  highly	
  complementary	
  to	
  current	
  academic	
  offerings	
  at	
  the	
  remaining	
  
SUNY	
  campuses	
  and	
  other	
  New	
  York	
  State	
  institutions	
  of	
  higher	
  learning.	
  	
  The	
  curricula	
  will	
  also	
  
serve	
  as	
  an	
  effective	
  tool	
  in	
  the	
  attraction	
  of	
  the	
  highest	
  quality	
  undergraduate	
  students	
  both	
  from	
  
within	
  the	
  United	
  States	
  and	
  from	
  other	
  countries	
  to	
  UAlbany	
  further	
  advancing	
  its	
  stature	
  as	
  a	
  top-­‐
flight	
   academic	
   institution.	
   In	
   what	
   follows,	
   relevant	
   admission	
   criteria	
   based	
   on	
   pertinent	
  
secondary	
   education	
   preparation	
   are	
   described,	
   along	
   with	
   the	
   underlying	
   undergraduate	
  
advisement	
   philosophy	
   and	
   resulting	
   administrative	
   and	
   programmatic	
   structures	
   that	
   ensure	
  
student	
  success	
  while	
  maximizing	
  academic	
  options	
  throughout	
  the	
  student’s	
  undergraduate	
  career	
  
at	
  the	
  University	
  at	
  Albany.	
  
II.	
  	
  	
  	
  PROGRAM	
  SUMMARY	
  
II.1.	
   MISSION	
  
The	
  proposed	
  undergraduate	
  curriculum	
  in	
  digital	
  forensics	
  is	
  designed	
  to	
  provide	
  a	
  high	
  quality	
  
educational	
  experience	
  that	
  will	
  not	
  only	
  develop	
  a	
  foundation	
  of	
  fundamental	
  knowledge	
  of	
  and	
  
basic	
  proficiency	
  with	
  digital	
  forensics,	
  but	
  also	
  nurture	
  the	
  development	
  of	
  students	
  who	
  are	
  able	
  
to	
  think	
  critically,	
  perform	
  high-­‐level	
  analysis,	
  adapt	
  to	
  changing	
  environments	
  through	
  innovation	
  
and	
   exploration,	
   and	
   have	
   a	
   deep	
   understanding	
   of	
   the	
   technical,	
   legal,	
   financial,	
   and	
   socio-­‐
psychological	
   influences	
   that	
   are	
   related	
   to	
   the	
   practice	
   of	
   digital	
   forensics	
   and	
   investigation	
   of	
  
cyber	
  crime.	
  	
  
	
  
The	
   proposed	
   new	
   undergraduate	
   major	
   in	
   digital	
   forensics	
   coincides	
   with	
   many	
   aspects	
   of	
  
UAlbany’s	
  Strategic	
  Plan	
  and	
  UAlbany	
  Impact.	
  This	
  is	
  a	
  subject	
  influenced	
  by	
  multiple	
  disciplines	
  
and	
   ties	
   in	
   several	
   Units	
   across	
   the	
   University:	
   Information	
   Technology	
   Management,	
   Criminal	
  
Justice,	
  and	
  Accounting	
  &	
  Law.	
  This	
  program	
  will	
  dramatically	
  increase	
  undergraduate	
  enrollments	
  
through	
  the	
  creation	
  of	
  a	
  new	
  undergraduate	
  major	
  that	
  does	
  not	
  compete	
  with	
  nor	
  detract	
  from	
  
enrollment	
   in	
   other	
   majors.	
   This	
   program	
   will	
   serve	
   as	
   the	
   first	
   SUNY	
   program	
   and	
   public	
   state	
  
school	
   offering	
   a	
   bachelor’s	
   degree	
   in	
   digital	
   forensics	
   –	
   ensuring	
   a	
   captive	
   market	
   in	
  
undergraduate	
   education.	
   Digital	
   forensics	
   jobs	
   often	
   require	
   four-­‐year	
   degrees	
   and	
   current	
  
availability	
  of	
  programs	
  has	
  made	
  this	
  profession	
  prohibitive	
  to	
  certain	
  students	
  in	
  the	
  past.	
  Our	
  
use	
   of	
   distance	
   delivery	
   and	
   innovative	
   pedagogical	
   practices	
   also	
   make	
   it	
   more	
   feasible	
   for	
  
	
  
	
  
6	
  
students	
   who	
   come	
   from	
   lower	
   socioeconomic	
   or	
   non-­‐traditional	
   backgrounds	
   to	
   more	
   readily	
  
achieve	
  success	
  in	
  their	
  academic	
  programs	
  and	
  future	
  careers.	
  	
  
	
  
In	
  addition	
  to	
  traditional	
  UAlbany	
  students	
  from	
  high	
  schools,	
  we	
  plan	
  to	
  offer	
  our	
  program	
  as	
  part	
  
of	
   executive	
   education,	
   internationally,	
   and	
   to	
   community	
   college	
   students	
   through	
   articulation	
  
agreements	
  with	
  them.	
  The	
  Digital	
  Forensics	
  program	
  will	
  leverage	
  internal	
  resources	
  at	
  UAlbany	
  
and	
   build	
   collaborations	
   with	
   two-­‐year	
   community	
   colleges	
   in	
   the	
   surrounding	
   area.	
   This	
   will	
  
create	
   a	
   pipeline	
   of	
   students	
   from	
   community	
   colleges	
   to	
   our	
   digital	
   forensics	
   program.	
   By	
  
collaborating	
  and	
  developing	
  strong	
  partnerships	
  with	
  in-­‐state	
  community	
  colleges	
  as	
  well	
  as	
  using	
  
innovative	
   pedagogic	
   methods,	
   e.g.	
   distance	
   delivery,	
   cloud-­‐based	
   labs,	
   the	
   program	
   takes	
  
advantage	
   of	
   SUNY	
   “systemness”	
   to	
   provide	
   an	
   opportunity	
   for	
   students	
   who	
   are	
   limited	
   by	
  
socioeconomic	
  conditions	
  to	
  pursue	
  a	
  four-­‐year	
  degree	
  in	
  digital	
  forensics.	
  Our	
  program	
  is	
  expected	
  
to	
   contribute	
   roughly	
   10%	
   of	
   the	
   University’s	
   overall	
   target	
   for	
   increasing	
   undergraduate	
  
enrollment	
   to	
   13,415	
   from	
   the	
   current	
   enrollment	
   of	
   12,834.	
   In	
   addition,	
   through	
   the	
   pipeline	
  
created,	
   we	
   expect	
   to	
   also	
   add	
   to	
   graduate	
   enrollments	
   and	
   meet	
   7-­‐12%	
   of	
   the	
   target	
   for	
   300	
  
additional	
  graduate	
  enrollments.	
  The	
  proposal	
  will	
  strengthen	
  existing	
  ties	
  between	
  several	
  units	
  in	
  
the	
  University,	
  build	
  critical	
  mass	
  in	
  this	
  area,	
  and	
  increase	
  external	
  funding	
  potential	
  –	
  where	
  we	
  
have	
  had	
  a	
  history	
  of	
  success.	
  With	
  these	
  new	
  hires,	
  we	
  hope	
  to	
  be	
  able	
  to	
  offer	
  programs	
  that	
  will	
  
significantly	
  improve	
  student	
  recruitment	
  and	
  success.	
  
	
  
The	
  digital	
  forensics	
  program	
  is	
  well	
  aligned	
  with	
  the	
  Power	
  of	
  SUNY	
  Strategic	
  Plan	
  that	
  defines	
  the	
  
future	
  mission	
  of	
  the	
  SUNY	
  system	
  as	
  a	
  whole.	
  It	
  is	
  specifically	
  matched	
  up	
  with	
  three	
  important	
  
objectives:	
  
	
  
1. SUNY	
  and	
  Seamless	
  Education	
  Pipeline:	
  	
  The	
  program	
  is	
  designed	
  to	
  facilitate	
  the	
  transfer	
  of	
  
students	
   from	
   community	
   colleges	
   in	
   New	
   York	
   to	
   the	
   UAlbany	
   in	
   the	
   junior	
   year	
   of	
   the	
  
digital	
  forensics	
  program.	
  Articulation	
  agreements	
  are	
  already	
  being	
  developed	
  with	
  these	
  
community	
  colleges.	
  	
  
2. SUNY	
  Works:	
  SUNY	
  Works	
  promotes	
  experiential	
  learning,	
  which	
  is	
  built	
  into	
  the	
  design	
  of	
  
our	
   program.	
   	
   We	
   have	
   started	
   working	
   with	
   private	
   firms	
   to	
   build	
   relations	
   for	
   our	
  
students	
   to	
   get	
   internships.	
   We	
   will	
   be	
   co-­‐developing	
   curriculum	
   with	
   some	
   of	
   these	
  
organizations	
   to	
   align	
   the	
   course	
   work	
   to	
   industry	
   demands	
   and	
   make	
   the	
   students	
  
attractive	
   for	
   internships.	
   These	
   internships	
   are	
   intended	
   to	
   be	
   supplemental	
   to	
   the	
  
academic	
  program.	
  
3. SUNY	
   and	
   the	
   Entrepreneurial	
   Century:	
   Digital	
   Forensics	
   is	
   one	
   of	
   the	
   four	
   key	
   areas	
   of	
  
UAlbany	
  2020	
  plan	
  and	
  our	
  goal	
  is	
  to	
  create	
  a	
  talented	
  workforce	
  and	
  attract	
  entrepreneurs	
  
in	
  digital	
  forensics	
  to	
  the	
  business	
  incubator	
  that	
  is	
  being	
  developed	
  on	
  campus.	
  	
  
	
  
The	
   proposed	
   B.S.	
   in	
   Digital	
   Forensics	
   qualifies	
   as	
   fulfilling	
   “Strategic	
   Initiative	
   2:	
   Emerging	
  
Technologies:	
  Improving	
  Human	
  Efficiency	
  through	
  Computational	
  and	
  Forensic	
  Sciences”	
   listed	
   in	
  
UAlbany	
  Impact.	
  	
  
In	
  addition,	
  this	
  program	
  is	
  aligned	
  with	
  multiple	
  values	
  and	
  goals	
  listed	
  in	
  the	
  UAlbany	
  Strategic	
  
Plan.	
  The	
  offering	
  of	
  this	
  program	
  is	
  fully	
  in	
  line	
  with	
  the	
  values	
  of	
  Excellence,	
  Access,	
  Collaboration,	
  
and	
  Engagement.	
  This	
  proposed	
  program	
  also	
  embodies	
  the	
  following	
  goals:	
  
“To	
  enhance	
  the	
  quality	
  of	
  undergraduate	
  education	
  at	
  UAlbany	
  and	
  attract	
  and	
  serve	
  a	
  highly	
  
qualified	
  and	
  diverse	
  group	
  of	
  students”	
  
	
  
	
  
	
  
7	
  
“To	
   create	
   an	
   excellent	
   student	
   experience	
   that	
   integrates	
   academic	
   and	
   co-­‐curricular	
  
experiences,	
  engages	
  the	
  surrounding	
  community	
  and	
  the	
  world,	
  and	
  fosters	
  lifelong	
  pride	
  in	
  
the	
  University”	
  
	
  
“To	
   increase	
   UAlbany’s	
   visibility	
   in,	
   and	
   resources	
   for,	
   advancing	
   and	
   disseminating	
  
knowledge,	
  discovery,	
  and	
  scholarship”	
  
	
  
The	
  mission	
  statements	
  for	
  the	
  curriculum	
  follow.	
  
	
  
II.1.A	
   Mission	
  Statement	
  for	
  the	
  Academic	
  Program	
  Leading	
  to	
  the	
  B.S.	
  in	
  Digital	
  Forensics	
  
	
  
The	
  curriculum	
  is	
  dedicated	
  to	
  providing	
  quality	
  undergraduate	
  education	
  in	
  the	
  interdisciplinary	
  
field	
  of	
  digital	
  forensics.	
  The	
  program	
  will	
  provide	
  students	
  with	
  foundational	
  technology	
  skills	
  in	
  
the	
   areas	
   of	
   communications	
   and	
   networking,	
   computer	
   hardware,	
   software	
   development	
   and	
  
database	
   design,	
   information	
   security,	
   and	
   law.	
   It	
   will	
   build	
   core	
   competency	
   on	
   top	
   of	
   the	
  
foundational	
  skills	
  in	
  the	
  area	
  of	
  data	
  preservation,	
  examination,	
  and	
  discovery	
  for	
  multiple	
  areas	
  
including	
   information	
   security,	
   criminal	
   investigations,	
   accounting,	
   and	
   finance.	
   The	
   program	
  
culminates	
  with	
  capstone	
  courses	
  that	
  consolidate	
  the	
  student	
  learning	
  in	
  context	
  of	
  real	
  problems.	
  
Overall,	
  the	
  program	
  offers	
  an	
  academically	
  rigorous	
  preparation	
  for	
  students	
  intending	
  to	
  pursue	
  
careers	
   in	
   digital	
   forensics	
   related	
   fields	
   as	
   well	
   as	
   to	
   pursue	
   graduate	
   education	
   in	
   the	
   area	
   of	
  
information	
  security,	
  digital	
  forensics,	
  data	
  analytics,	
  and	
  law.	
  
II.2	
  	
   RATIONALE	
  FOR	
  THE	
  PROPOSED	
  PROGRAMS	
  AND	
  INSTITUTIONAL	
  CONTEXT	
  
	
  
While	
  information	
  security	
  education	
  has	
  grown	
  significantly	
  over	
  the	
  past	
  10	
  years,	
  education	
  in	
  
Digital	
  Forensics	
  has	
  only	
  recently	
  emerged	
  as	
  critical	
  specialty	
  –	
  distinct	
  from	
  information	
  security.	
  
Digital	
  Forensics	
  is	
  a	
  branch	
  of	
  forensic	
  science	
  that	
  involves	
  investigation,	
  recovery,	
  an	
  analysis	
  of	
  
information	
  from	
  digital	
  devices	
  –	
  typically	
  related	
  to	
  computer	
  crime.	
  These	
  devices	
  can	
  include	
  
computers,	
  smartphones,	
  mp3	
  players,	
  digital	
  cameras,	
  etc.	
  While	
  information	
  security	
  deals	
  with	
  
protection	
   of	
   computers	
   and	
   networks,	
   Digital	
   forensics	
   deals	
   with	
   post-­‐mortem	
   analysis	
   of	
  
computer	
  attacks	
  and	
  fraud;	
  collection	
  and	
  presentation	
  of	
  criminal	
  evidence;	
  and	
  determinations	
  
of	
   responsibility	
   and	
   consequences.	
   The	
   digital	
   forensics	
   field	
   is	
   multidisciplinary.	
   It	
   involves	
  
application	
  of	
  information	
  technologies	
  and	
  strategies	
  within	
  the	
  public	
  sector	
  and	
  private	
  industry,	
  
international	
   collaboration	
   towards	
   legislation	
   development	
   and	
   law	
   enforcement,	
   as	
   well	
   as	
   an	
  
understanding	
  of	
  human	
  behavior.	
  These	
  activities	
  have	
  obvious	
  benefits	
  to	
  the	
  community-­‐at-­‐large	
  
by	
   providing	
   the	
   capabilities	
   and	
   workforce	
   to	
   fill	
   the	
   demand	
   for	
   professionals	
   to	
   ensure	
   the	
  
security	
  and	
  safety	
  of	
  citizens	
  and	
  the	
  preservation	
  of	
  justice.	
  	
  
	
  
The	
   National	
   Academies	
   of	
   Science	
   have	
   warned	
   that	
   the	
   people	
   of	
   the	
   United	
   States	
   will	
   face	
   a	
  
lower	
  standard	
  of	
  living	
  if	
  knowledge-­‐intensive	
  jobs	
  further	
  decline	
  in	
  the	
  US.8	
  American	
  workers	
  
face	
   increased	
   job	
   competition	
   from	
   lower-­‐wage	
   workers	
   internationally,	
   with	
   leading-­‐edge	
  
scientific	
   and	
   technology	
   jobs	
   being	
   performed	
   in	
   many	
   parts	
   of	
   the	
   world.	
   Consequently,	
   large	
  
numbers	
  of	
  students	
  are	
  moving	
  away	
  from	
  STEM	
  fields	
  including	
  computing	
  and	
  engineering9.	
  To	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
8	
  National	
  Academies	
  of	
  Science	
  (NAS).	
  Committee	
  on	
  Science,	
  Engineering,	
  and	
  Public	
  Policy.	
  (2007).	
  Rising	
  above	
  the	
  
gathering	
  storm:	
  energizing	
  and	
  employing	
  America	
  for	
  a	
  brighter	
  economic	
  future.	
   Washington,	
   DC,	
   USA:	
   The	
   National	
  
Academies	
  Press. 
9	
  Seymour,	
  E.	
  &	
  Hewitt,	
  N.	
  M.	
  (2000).	
  	
  Talking	
  about	
  leaving:	
  why	
  undergraduates	
  leave	
  the	
  sciences.	
  Boulder,	
  CO,	
  USA:	
  
Westview	
  Press.  
	
  
	
  
8	
  
increase	
   enrollments	
   in	
   these	
   fields,	
   Denning	
   and	
   McGettrick10	
  have	
   suggested	
   reengineering	
  
traditional	
  computing	
  education	
  to	
  focus	
  on	
  specialized	
  fields.	
  As	
  enrollments	
  drop	
  in	
  technology-­‐
based	
   disciplines,	
   new	
   programs	
   are	
   emerging	
   in	
   specialized	
   fields,	
   such	
   as	
   digital	
   forensics,	
   to	
  
attract	
  students	
  disenfranchised	
  by	
  traditional	
  computing.	
  In	
  the	
  past,	
  demand	
  for	
  professionals	
  in	
  
this	
   field	
   primarily	
   came	
   from	
   law	
   enforcement	
   agencies11;	
   today,	
   the	
   demand	
   is	
   largely	
   coming	
  
from	
  private-­‐sector	
  organizations	
  and	
  is	
  being	
  driven	
  by	
  business	
  needs	
  including:	
  data	
  recovery,	
  
electronic	
  discovery,	
  incident	
  response,	
  policy	
  auditing	
  and	
  third-­‐party	
  forensic	
  analysis	
  services12.	
  	
  
	
  
In	
  2009,	
  the	
  National	
  Research	
  Council	
  (NRC)	
  published	
  a	
  report	
  outlining	
  findings	
  of	
  the	
  current	
  
state	
   of	
   forensic	
   science	
   laboratories.	
   Critical	
   findings	
   included	
   inadequate	
   educational	
   forensic	
  
programs,	
  lack	
  of	
  forensic	
  science	
  research	
  and	
  training,	
  as	
  well	
  as	
  lack	
  of	
  strong	
  ties	
  to	
  research	
  
universities	
   and	
   national	
   science	
   assets.	
   The	
   NRC	
   report	
   made	
   several	
   recommendations	
   for	
   the	
  
forensic	
  science	
  community	
  to	
  improve	
  education,	
  training,	
  and	
  personnel	
  standards.	
  According	
  to	
  
the	
  Bureau	
  of	
  Labor	
  Statistics,	
  jobs	
  in	
  digital	
  forensics	
  are	
  expected	
  to	
  grow	
  over	
  13.3%	
  by	
  201613.	
  
Creating	
  a	
  digital	
  forensics	
  program	
  is	
  a	
  natural	
  next	
  step	
  that	
  builds	
  on	
  our	
  past	
  successes	
  in	
  the	
  
area	
  of	
  information	
  security	
  and	
  will	
  place	
  UAlbany	
  at	
  the	
  forefront	
  in	
  this	
  area.	
  	
  
	
  
The	
   demand	
   for	
   digital	
   forensics	
   training	
   is	
   outpacing	
   supply	
   –	
   leading	
   to	
   an	
   acute	
   shortage	
   of	
  
training	
  in	
  digital	
  forensics	
  nationally	
  and	
  internationally.	
  The	
  need	
  for	
  digital	
  forensics	
  education	
  
is	
  more	
  recent	
  and	
  has	
  grown,	
  as	
  use	
  of	
  computers	
  in	
  crime	
  and	
  fraud	
  has	
  become	
  a	
  significant	
  
threat	
  not	
  only	
  in	
  the	
  United	
  States,	
  but	
  around	
  the	
  world.	
  According	
  to	
  Norton	
  Cybercrime	
  Report	
  
201114,	
  net	
  cybercrime	
  costs	
  globally	
  equal	
  $388	
  billion	
  across	
  24	
  countries	
  –	
  more	
  than	
  the	
  black	
  
markets	
  for	
  marijuana,	
  cocaine,	
  and	
  heroin	
  combined	
  ($288	
  billion)	
  and	
  close	
  to	
  the	
  value	
  of	
  the	
  
total	
  global	
  drug	
  trafficking	
  market	
  ($488	
  billion).	
  	
  
	
  
There	
   are	
   currently	
   three	
   four-­‐year	
   institutions	
   in	
   New	
   York	
   that	
   offer	
   programs	
   in	
   Digital	
  
Forensics:	
  1)	
  John	
  Jay	
  College	
  of	
  Criminal	
  Justice	
  (New	
  York	
  City,	
  NY)	
  offers	
  a	
  master’s	
  degree	
  in	
  
Digital	
  Forensics;	
  2)	
  Medialle	
  college	
  (Buffalo,	
  NY)	
  offers	
  a	
  16-­‐credit	
  certificate	
  program	
  designed	
  
for	
  law	
  enforcement	
  personnel,	
  financial	
  business	
  officers,	
  private	
  investigators,	
  computer	
  systems	
  
administrators,	
   and	
   criminal	
   justice	
   majors;	
   and	
   3)	
   Utica	
   College	
   offers	
   a	
   master’s	
   program	
   in	
  
Digital	
   Forensics.	
   	
  There	
   is	
   no	
   program	
   at	
   the	
   bachelor’s	
   level.	
   Two	
   colleges	
   in	
   Vermont	
   have	
  
programs	
  in	
  Digital	
  Forensics:	
  1)	
  Norwich	
  University	
  (Northfield,	
  VT),	
  and	
  2)	
  Champlain	
  College	
  
(Burlington,	
   VT).	
   Norwich	
   University	
   offers	
   a	
   bachelor	
   of	
   science	
   in	
   computer	
   security	
   with	
  
concentrations	
   in	
   Cyber	
   Forensics.	
   Champlain	
   College	
   offers	
   a	
   bachelor’s	
   and	
   master’s	
   degree	
   in	
  
Digital	
   Forensics.	
   There	
   is	
   no	
   undergraduate	
   program	
   Digital	
   Forensics	
   in	
   any	
   SUNY	
   4-­‐year	
  
institution.	
  
	
  
Given	
  the	
  attractive	
  option	
   of	
  partial	
  online	
  education,	
  the	
  program	
  here	
  at	
  UAlbany	
  will	
  attract	
  
students	
  not	
  only	
  from	
  other	
  states,	
  but	
  also	
  from	
  other	
  countries.	
  School	
  of	
  Business	
  is	
  already	
  
building	
  collaborations	
  with	
  international	
  partners	
  in	
  offering	
  our	
  information	
  security	
  graduate	
  
certificate	
   courses	
   internationally	
   (Russia,	
   Armenia,	
   Spain,	
   Georgia).	
   We	
   will	
   leverage	
   these	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
10	
  Denning,	
  P.	
  J.	
  &	
  McGettrick,	
  A.	
  (2005,	
  November).	
  Recentering	
  computer	
  science.	
  Communications	
  of	
  the	
  ACM,	
  48(11),	
  
15-­‐19.	
  
11	
  	
  Yasinsac,	
  A.,	
  Erbacher,	
  R.	
  F.,	
  Marks,	
  D.	
  G.,	
  Pollitt,	
  M.	
  M.,	
  Sommer,	
  P.	
  M.	
  (2003).	
  Computer	
  forensics	
  education.	
  IEEE	
  
Security	
  &	
  Privacy,	
  2003(1),	
  15–23.	
  	
  
12	
  Kessler,	
  G.	
  C.	
  &	
  Haggerty,	
  D.	
  A.	
  (2010).	
  An	
  online	
  graduate	
  program	
  in	
  digital	
  investigation	
  management:	
  pedagogy	
  and	
  
overview.	
  Journal	
  of.	
  Digital	
  Forensic	
  Practice	
  3(1),	
  11-­‐22.	
  
13	
  United	
  States.	
  Department	
  of	
  Labor.	
  Bureau	
  of	
  Labor	
  Statistics.(2009).	
  Occupational	
  Outlook	
  Handbook,	
  2008-­‐09	
  Edition.	
  	
  
14
	
  	
  
Symantec.	
  
(2011).	
  
Norton	
  
Cyber	
  
Crime	
  
Report	
  
2011.	
  
Retrieved	
  
from:	
  
http://www.symantec.com/content/en/us/home_homeoffice/html/cybercrimereport/	
  
	
  
	
  
9	
  
international	
   connections	
   to	
   spread	
   our	
   digital	
   forensics	
   curriculum	
   worldwide.	
   The	
   scarcity	
   of	
  
four-­‐year	
  digital	
  forensics	
  programs	
  provides	
  a	
  captive	
  audience	
  of	
  students	
  who	
  have	
  few	
  choices	
  
for	
   advancing	
   their	
   skills	
   and	
   gives	
   UAlbany	
   an	
   early-­‐mover	
   advantage	
   in	
   building	
   one	
   of	
   the	
  
leading	
  programs	
  in	
  this	
  field.	
  UAlbany	
  will	
  be	
  the	
  first	
  SUNY	
  and	
  public	
  New	
  York	
  State	
  institution	
  
that	
  offers	
  a	
  bachelor’s	
  degree	
  in	
  digital	
  forensics.	
  	
  	
  
II.3	
  	
   LEARNING	
  OUTCOMES	
  AND	
  ASSESSMENT	
  
	
  
UAlbany	
   is	
   committed	
   to	
   ensuring	
   that	
   baccalaurean	
   graduates	
   meet	
   and	
   exceed	
   academic	
  
standards	
   of	
   scholarly	
   excellence	
   required	
   to	
   succeed	
   as	
   analysts	
   and	
   professionals	
   who	
   can	
  
successfully	
  navigate	
  careers	
  in	
  digital	
  forensics,	
  and	
  in	
  turn,	
  deliver	
  the	
  technological	
  and	
  forensic	
  
innovations	
  that	
  are	
  the	
  future	
  of	
  academic	
  institutions,	
  the	
  nation	
  and	
  global	
  marketplace.	
  This	
  
Digital	
  Forensics	
  program	
  includes	
  a	
  comprehensive	
  and	
  integrated	
  set	
  of	
  basic	
  learning	
  outcomes	
  
that	
  must	
  be	
  met	
  by	
  students	
  in	
  order	
  to	
  qualify	
  for	
  graduation.	
  Each	
  learning	
  outcome	
  has	
  been	
  
customized	
  to	
  reflect	
  the	
  specific	
  mission,	
  goals	
  and	
  objectives	
  of	
  the	
  B.S.	
  in	
  Digital	
  Forensics.	
  This	
  is	
  
complementary	
   to	
   current	
   academic,	
   corporate,	
   and	
   government	
   performance	
   metrics	
   for	
   the	
  
emerging	
  digital	
  forensics	
  discipline.	
  
 
Learning	
   outcomes	
   will	
   be	
   measured	
   through	
   performance	
   evaluation	
   and	
   learning	
   assessment	
  
methodology	
   to	
   track	
   and	
   measure	
   student	
   progress	
   towards	
   educational	
   goals	
   and	
   degree	
  
requirements	
  throughout	
  the	
  student’s	
  undergraduate	
  career	
  in	
  digital	
  forensics.	
  This	
  will	
  include	
  
advisement	
  intervention,	
  course	
  performance	
  and	
  individual	
  student	
  assessment.	
  This	
  assessment	
  
methodology	
  is	
  designed	
  to	
  begin	
  with	
  entering	
  UAlbany	
  direct-­‐admit	
  freshmen,	
  qualified	
  transfer	
  
students,	
   and	
   distance	
   learners	
   who	
   are	
   interested	
   in	
   the	
   digital	
   forensics	
   field	
   to	
   analyze	
   and	
  
measure	
  their	
  aptitude	
  and	
  ability	
  to	
  pursue	
  the	
  B.S.	
  degrees	
  in	
  Digital	
  Forensics;	
  by	
  doing	
  this,	
  we	
  
want	
  to	
  offer	
  students	
  accurate	
  guidance	
  and	
  pertinent	
  advice	
  in	
  terms	
  of	
  appropriateness	
  of	
  such	
  a	
  
career	
  path	
  versus	
  other	
  opportunities	
  for	
  undergraduate	
  study	
  at	
  UAlbany.	
  
	
  
II.3.1	
  	
   LEARNING	
  OUTCOMES	
  FOR	
  B.S.	
  PROGRAM	
  IN	
  DIGITAL	
  FORENSICS	
  
The	
  learning	
  outcomes	
  are	
  designed	
  to	
  ensure	
  that	
  the	
  graduates	
  of	
  the	
  program	
  demonstrate	
  the	
  
technical	
   and	
   professional	
   proficiencies	
   necessary	
   to	
   enable	
   the	
   forensic	
   identification,	
  
investigation,	
  collection	
  and	
  examination	
  of	
  digital	
  and	
  multimedia	
  information	
  or	
  evidence;	
  and,	
  as	
  
a	
   result,	
   become	
   highly	
   successful	
   analysts,	
   educators,	
   and	
   leaders	
   in	
   global	
   and	
   technological	
  
“innovation”	
  of	
  the	
  21st	
  century.	
  	
  
	
  
Digital	
  Forensics	
  Outcome	
  1	
  
Digital	
   Forensics	
   graduates	
   will	
   be	
   prepared	
   to	
   conduct	
   cyber-­‐crime	
   investigations	
   involving	
  
computers	
  and	
  the	
  Internet,	
  while	
  utilizing	
  investigative	
  methodology,	
  legal	
  processes	
  and	
  forensic	
  
techniques	
  that	
  facilitate	
  such	
  investigations	
  in	
  public	
  and	
  private	
  sectors.	
  	
  
	
  
Digital	
  Forensics	
  Outcome	
  2	
  	
  
Digital	
   Forensics	
   graduates	
   will	
   be	
   knowledgeable	
   in	
   forensic	
   concepts,	
   binary	
   and	
   hexadecimal	
  
values,	
  hardware	
  and	
  software	
  essentials,	
  as	
  well	
  as,	
  forensic	
  analysis	
  techniques	
  and	
  methodology	
  
involving	
  digital	
  and	
  multimedia	
  data	
  or	
  evidence.	
  	
  
	
  
Digital	
  Forensics	
  Outcome	
  3	
  
Digital	
   Forensics	
   graduates	
   will	
   have	
   the	
   ability	
   to	
   utilize	
   proper	
   techniques	
   for	
   collecting	
   and	
  
preserving	
  digital	
  information	
  and	
  data	
  found	
  in	
  the	
  cloud,	
  as	
  well	
  as,	
  physical	
  cyber-­‐crime	
  scenes.	
  
Graduates	
  will	
  be	
  able	
  to	
  collect,	
  preserve,	
  and	
  examine	
  “live”	
  networks	
  and	
  mobile	
  devices,	
  such	
  as	
  
	
  
	
  
10	
  
smartphones,	
  tablets,	
  gaming	
  consoles	
  and	
  other	
  relevant	
  “live”	
  networked	
  data	
  that	
  may	
  be	
  critical	
  
to	
  an	
  investigation.	
  	
  
	
  
Digital	
  Forensics	
  Outcome	
  4	
  
Digital	
  Forensics	
  graduates	
  will	
  have	
  the	
  ability	
  to	
  conduct	
  forensic	
  analysis	
  of	
  binary	
  data	
  found	
  in	
  
computers,	
   removable	
   media,	
   and	
   other	
   electronic	
   devices	
   through	
   hands-­‐on	
   experience	
   with	
  
digital	
  forensics	
  utilities,	
  tools	
  and	
  techniques	
  to	
  analyze	
  digital	
  data	
  or	
  evidence	
  utilizing	
  industry	
  
standards	
  and	
  best	
  practices.	
  	
  	
  
	
  
Digital	
  Forensics	
  Outcome	
  5	
  
Digital	
   Forensics	
   graduates	
   will	
   have	
   a	
   foundation	
   to	
   manage	
   basic	
   corporate	
   incident	
   response	
  
challenges,	
  as	
  well	
  as	
  perform	
  proper	
  collection,	
  archival	
  and	
  retrieval	
  methodology	
  for	
  electronic	
  
data	
  that	
  may	
  be	
  subject	
  to	
  legal	
  and	
  regulatory	
  requirements.	
  Graduates	
  will	
  be	
  knowledgeable	
  in	
  
electronic	
  discovery	
  statutes,	
  case	
  law,	
  and	
  the	
  management	
  of	
  corporate	
  digital	
  information.	
  	
  
	
  
Digital	
  Forensics	
  Outcome	
  6	
  
Digital	
   Forensics	
   graduates	
   will	
   be	
   prepared	
   to	
   compose	
   and	
   present	
   oral	
   and	
   written	
   reports,	
  
which	
  outline	
  digital	
  forensic	
  analysis	
  findings.	
  These	
  reports	
  are	
  professionally	
  and	
  scientifically	
  
acceptable	
  in	
  corporate,	
  administrative	
  and	
  legal	
  proceedings.	
  	
  
	
  
Digital	
  Forensics	
  Outcome	
  7	
  
Digital	
   Forensics	
   graduates	
   will	
   be	
   knowledgeable	
   in	
   the	
   development	
   and	
   implementation	
   of	
  
corporate	
  and	
  government	
  policies	
  and	
  procedures	
  for	
  computer	
  forensic	
  laboratory	
  operations,	
  
quality	
  control	
  and	
  training	
  programs.	
  	
  	
  	
  
	
  
Digital	
  Forensics	
  Outcome	
  8	
  	
  
Digital	
  Forensics	
  graduates	
  will	
  be	
  able	
  to	
  develop	
  incident	
  response,	
  examination	
  and	
  analytical	
  
plans	
  to	
  guide	
  the	
  forensic	
  investigation.	
  	
  
	
  
Digital	
  Forensics	
  Outcome	
  9	
  	
  
Digital	
   Forensics	
   graduates	
   will	
   be	
   able	
   to	
   present	
   digital	
   forensics	
   analysis	
   findings,	
   as	
   well	
   as	
  
provide	
  expert	
  witness	
  testimony	
  related	
  to	
  digital	
  evidence	
  (including	
  how	
  to	
  deal	
  with	
  opposing	
  
counsel	
  cross-­‐examinations	
  and	
  how	
  to	
  effectively	
  relay	
  information	
  to	
  a	
  judge	
  and	
  jury).	
  	
  
	
  
II.3.2	
  	
   ASSESSMENT	
  PRACTICE	
  AND	
  METHODOLOGY	
  	
  
A	
   systematic,	
   broad-­‐based,	
   and	
   multi-­‐pronged	
   approach	
   will	
   be	
   employed	
   to	
   assess	
   student’s	
  
progress	
   towards	
   and	
   achievement	
   of	
   the	
   learning	
   outcomes	
   outlined	
   in	
   Section	
   II.3.1.	
   This	
  
approach	
   employs	
   three	
   primary	
   metrics:	
   course-­‐embedded	
   assessment;	
   lab	
   assessment;	
   and	
  
capstone	
   experience-­‐driven	
   assessment.	
   	
   These	
   metrics	
   are	
   defined	
   using	
   the	
   four	
   pedagogical	
  
pillars	
  and	
  rubrics	
  of	
  each	
  undergraduate	
  degree,	
  as	
  described	
  in	
  Section	
  II.6.1.	
  
II.3.3.1	
  COURSE-­‐EMBEDDED	
  ASSESSMENT	
  METRIC	
  
This	
   metric	
   employs	
   the	
   well-­‐documented	
   quantitative	
   (grading)	
   system	
   typically	
   applied	
   in	
  
individual	
   courses	
   including	
   quizzes,	
   exams,	
   and	
   assignments.	
   	
   In	
   addition	
   to	
   the	
   conventional	
  
examinations	
   and	
   out-­‐of-­‐class	
   assignments,	
   this	
   approach	
   will	
   also	
   employ	
   case	
   analysis,	
  
discussions,	
  presentations,	
  and	
  papers.	
  	
  
II.3.3.2	
  LABORATORY	
  EXERCISES	
  ASSESSMENT	
  METRIC	
  
Laboratory	
   exercises	
   will	
   be	
   a	
   major	
   part	
   of	
   the	
   curriculum	
   and	
   would	
   require	
   students	
   to	
  
satisfactorily	
   perform	
   the	
   assigned	
   tasks	
   as	
   a	
   part	
   of	
   the	
   evaluation.	
   Students	
   will	
   receive	
  
	
  
	
  
11	
  
quantitative	
   grades	
   for	
   their	
   performance	
   in	
   the	
   laboratories.	
   These	
   laboratory	
   exercises	
   will	
   be	
  
incorporated	
   in	
   all	
   of	
   the	
   BFOR	
   courses	
   to	
   varying	
   degrees	
   to	
   encourage	
   hands-­‐on	
   learning	
   and	
  
practical	
  experience	
  necessary	
  in	
  such	
  a	
  technical	
  field.	
  
II.3.3.3	
  CAPSTONE	
  EXPERIENCE	
  –MOOT	
  COURTS	
  
One	
   of	
   the	
   key	
   highlights	
   of	
   the	
   program	
   is	
   a	
   capstone	
   course	
   on	
   presenting	
   digital	
   forensic	
  
testimony	
   through	
   moot	
   courts	
   built	
   on	
   previous	
   digital	
   forensic	
   analysis.	
   The	
   assessment	
  
methodology	
  for	
  this	
  capstone	
  experience	
  focuses	
  on	
  the	
  direct	
  evaluation	
  of	
  student	
  performance	
  
by	
  the	
  faculty	
  and/or	
  and	
  evaluation	
  team	
  regarding	
  the	
  student’s	
  ability	
  to	
  assimilate	
  the	
  learning	
  
into	
  real-­‐life	
  scenarios,	
  the	
  student’s	
  oral	
  and	
  written	
  communication	
  skills	
  and	
  ability	
  to	
  work	
  well	
  
within	
  a	
  team	
  environment.	
  	
  	
  
II.4	
  	
   ADMISSION	
  	
  
The	
   process	
   for	
   admission	
   to	
   the	
   proposed	
   undergraduate	
   programs	
   for	
   both	
   freshmen	
   and	
  
transfer	
  applicants	
  will	
  follow	
  the	
  standard	
  UAlbany	
  application	
  procedures.	
  Applicable	
  admission	
  
requirements	
  are	
  outlined	
  below	
  for	
  the	
  three	
  potential	
  scenarios	
  of	
  applications,	
  namely,	
  1)	
  direct	
  
admits	
   (freshmen),	
   2)	
   advanced	
   standing,	
   and	
   3)	
   transfer.	
   	
   It	
   should	
   be	
   noted	
   that	
   only	
  
undergraduate	
  students	
  formally	
  admitted	
  to	
  the	
  Digital	
  Forensics	
  program	
  are	
  eligible	
  to	
  enroll	
  in	
  
some	
  of	
  the	
  Technical	
  Concentration	
  Courses	
  or	
  Capstone	
  Courses	
  in	
  the	
  School	
  of	
  Business	
  (see	
  
Section	
  II.6.2	
  Program	
  Requirements).	
  For	
  direct	
  admit	
  students,	
  UAlbany	
  GPAs	
  will	
  be	
  primarily	
  
used	
  in	
  determining	
  admission	
  and	
  retention.	
  Courses	
  from	
  other	
  institutions	
  may	
  be	
  used	
  at	
  the	
  
discretion	
  of	
  the	
  program	
  director.	
  	
  
	
  
II.4.1	
   DIRECT	
  ADMISSION	
  OF	
  FRESHMEN	
  
During	
  the	
  application	
  period	
  for	
  traditional	
  freshmen	
  admission,	
  an	
  applicant	
  interested	
  in	
  Digital	
  
Forensics	
  and	
  who	
  meets	
  the	
  minimum	
  established	
  criteria	
  would	
  be	
  offered	
  an	
  opportunity	
  for	
  
direct	
  freshman	
  admission	
  to	
  the	
  proposed	
  digital	
  forensics	
  undergraduate	
  major.	
  	
  The	
  standard	
  
eligibility	
  for	
  consideration	
  will	
  be	
  a	
  minimum	
  HSGPA	
  of	
  at	
  least	
  89	
  and	
  a	
  minimum	
  SAT	
  of	
  at	
  least	
  
1200	
  (1600	
  scale)	
  and/or	
  a	
  minimum	
  ACT	
  of	
  25.	
  Students	
  selected	
  for	
  Direct	
  Freshmen	
  Admission	
  
in	
  Digital	
  Forensics	
  will	
  be	
  required	
  to	
  document	
  their	
  intent	
  to	
  declare	
  their	
  major	
  accordingly.	
  	
  	
  
	
  
The	
   overarching	
   goal	
   of	
   direct	
   admission	
   to	
   the	
   digital	
   forensics	
   undergraduate	
   program	
   is	
   the	
  
identification	
  of	
  outstanding	
  and	
  singularly	
  prepared	
  students	
  who	
  are	
  poised	
  for	
  success	
  in	
  the	
  
field	
   of	
   digital	
   forensics.	
   	
   It	
   is	
   expected	
   that	
   these	
   students	
   will	
   rapidly	
   excel	
   and	
   perform	
   in	
  
accordance	
  with	
  the	
  highest	
  academic	
  standards	
  at	
  UAlbany.	
  There	
  are	
  several	
  benefits	
  to	
  being	
  a	
  
direct	
   admit	
   student	
   in	
   the	
   Digital	
   Forensics	
   major.	
   Based	
   on	
   experience	
   with	
   the	
   direct	
   admit	
  
program	
  for	
  SOB,	
  direct	
  admit	
  students	
  to	
  the	
  proposed	
  Digital	
  Forensics	
  major	
  would	
  receive	
  extra	
  
opportunities	
   for	
   career	
   building	
   and	
   networking	
   with	
   alumni	
   and	
   recruiters.	
   In	
   addition,	
   they	
  
receive	
   extra	
   guidance	
   towards	
   their	
   academic	
   and	
   professional	
   goals	
   with	
   supplementary	
  
advisement	
   from	
   SOB.	
   In	
   addition,	
   being	
   a	
   direct	
   admit	
   is	
   a	
   positive	
   addition	
   to	
   a	
   resume	
   for	
  
internship	
  and	
  job	
  applications.	
  The	
  rationale	
  for	
  having	
  additional	
  requirements	
  for	
  continuation	
  
is	
  based	
  on	
  student	
  performance	
  in	
  the	
  SOB	
  direct	
  admit	
  program.	
  25-­‐30%	
  of	
  direct	
  admit	
  students	
  
had	
  below	
  a	
  3.0	
  GPA	
  with	
  some	
  GPAs	
  like	
  1.5.	
  Based	
  on	
  student	
  feedback,	
  this	
  is	
  seen	
  as	
  an	
  unfair	
  
system,	
   which	
   allows	
   admittance	
   of	
   students	
   with	
   inferior	
   performance	
   when	
   better	
   performers	
  
not	
  in	
  the	
  direct	
  admit	
  program	
  are	
  not	
  granted	
  admission.	
  	
  It	
  also	
  impacts	
  student	
  satisfaction	
  and	
  
performance	
  
	
  By	
  requiring	
  students	
  to	
  meet	
  the	
  academic	
  criteria	
  for	
  continuance,	
  we	
  hope	
  to	
  motivate	
  students	
  
to	
  work	
  hard	
  during	
  their	
  first	
  two	
  semesters	
  and	
  ensure	
  that	
  they	
  are	
  able	
  to	
  capably	
  manage	
  the	
  
rigor	
  of	
  the	
  program.	
  	
  
	
  
	
  
12	
  
	
  
	
  
II.4.2	
  RETENTION	
  AND	
  MOVEMENT	
  TO	
  UPPER	
  DIVISION	
  
The	
  following	
  qualitative	
  academic	
  criteria	
  will	
  be	
  used	
  in	
  determining	
  movement	
  to	
  upper	
  division	
  
status	
  and	
  enrollment	
  in	
  300-­‐	
  and	
  400-­‐level	
  courses	
  required	
  in	
  this	
  major:	
  
• 
At	
  the	
  end	
  of	
  four	
  semesters,	
  if	
  a	
  student	
  is	
  admitted	
  as	
  a	
  Direct	
  Admit,	
  a	
  student	
  must	
  have	
  
completed	
  the	
  following	
  core	
  courses	
  with	
  a	
  minimum	
  GPA	
  of	
  3.0:	
  RCRJ	
  281	
  or	
  AMAT	
  108,	
  
ASOC	
  115,	
  BACC	
  211,	
  BFOR100,	
  BFOR	
  201,	
  BFOR	
  202,	
  and	
  BFOR	
  203.	
  	
  
• 
If	
  not	
  in	
  the	
  Direct	
  Admit	
  program,	
  the	
  student	
  must	
  have	
  a	
  cumulative	
  overall	
  GPA	
  of	
  3.25	
  
at	
  the	
  University	
  at	
  Albany	
  and	
  a	
  cumulative	
  GPA	
  of	
  3.0	
  in	
  designated	
  courses	
  (RCRJ	
  281	
  or	
  
AMAT	
  108,	
  ASOC	
  115,	
  BACC	
  211,	
  BFOR	
  100,	
  BFOR	
  201,	
  BFOR	
  202,	
  and	
  BFOR	
  203).	
  
• 
Completion	
  of	
  a	
  minimum	
  of	
  56-­‐degree	
  applicable	
  credits.	
  
• 
Students	
  who	
  do	
  not	
  fulfill	
  the	
  requirements	
  above,	
  but	
  petition	
  the	
  director	
  of	
  the	
  program	
  
and	
  gain	
  written	
  approval,	
  will	
  gain	
  either	
  continued	
  status	
  or	
  admission	
  with	
  advanced	
  
standing,	
  	
  
	
  
II.4.3	
  ADMISSION	
  WITH	
  ADVANCED	
  STANDING	
  STATUS	
  
Undergraduate	
   students	
   at	
   UAlbany,	
   who	
   are	
   not	
   formally	
   enrolled	
   in	
   the	
   digital	
   forensics	
  
undergraduate	
  program	
  as	
  direct	
  admits,	
  are	
  offered	
  an	
  opportunity	
  for	
  admission	
  to	
  the	
  program	
  
after	
  completing	
  the	
  first	
  four	
  semesters	
  of	
  the	
  program	
  as	
  outlined	
  in	
  the	
  program	
  sequence	
  chart	
  
at	
   UAlbany.	
   The	
   student	
   must	
   have	
   completed	
   the	
   criteria	
   listed	
   above	
   under	
   II.4.2.	
   The	
   goal	
   of	
  
Admission	
   with	
   Advanced	
   Standing	
   is	
   the	
   identification	
   of	
   outstanding	
   students	
   who	
   have	
  
demonstrated	
   the	
   ability	
   to	
   excel	
   at	
   the	
   university	
   level	
   and	
   a	
   scholarly	
   aptitude	
   for	
   the	
   field	
   of	
  
digital	
  forensics.	
  Some	
  students	
  may	
  be	
  granted	
  conditional	
  status	
  with	
  admission	
  to	
  the	
  program	
  
contingent	
  upon	
  satisfactory	
  completion	
  of	
  a	
  specific	
  academic	
  contract.	
  
	
  
II.4.4.	
  ADMISSION	
  OF	
  TRANSFERS	
  WITH	
  ADVANCED	
  STANDING	
  
This	
  program	
  is	
  designed	
  to	
  facilitate	
  the	
  transfer	
  from	
  particular	
  two-­‐year	
  schools	
  within	
  SUNY,	
  
directly	
   into	
   the	
   junior	
   year	
   of	
   the	
   Digital	
   Forensics	
   Program.	
   Articulation	
   agreements	
   will	
   be	
  
designed	
  and	
  agreed	
  to	
  by	
  all	
  parties	
  to	
  facilitate	
  the	
  easy	
  transition	
  from	
  a	
  two-­‐year	
  program	
  into	
  
the	
  junior	
  year	
  of	
  the	
  Digital	
  Forensics	
  major.	
  	
  Students	
  who	
  are	
  admitted	
  “Transfer”	
  students	
  are	
  
offered	
  the	
  opportunity	
  for	
  admission	
  to	
  the	
  digital	
  forensics	
  program,	
  if	
  they	
  meet	
  the	
  following	
  
criteria:	
  
I. 
Transfer	
  students	
  must	
  complete	
  the	
  following	
  courses	
  with	
  a	
  cumulative	
  GPA	
  of	
  3.0:	
  
Statistics,	
  Introduction	
  to	
  Sociology,	
  and	
  the	
  equivalent	
  of	
  the	
  University	
  at	
  Albany’s	
  
Financial	
  Accounting	
  (BACC	
  211).	
  Additionally,	
  courses	
  deemed	
  equivalent	
  to	
  BFOR	
  100,	
  
201,	
  202,	
  and	
  203	
  must	
  also	
  be	
  completed	
  with	
  a	
  GPA	
  of	
  3.0.	
  Students	
  must	
  have	
  an	
  overall	
  
cumulative	
  GPA	
  of	
  3.25	
  at	
  their	
  respective	
  community	
  college	
  or	
  two-­‐year	
  institution.	
  	
  
II. Completion	
  of	
  a	
  minimum	
  of	
  56	
  degree-­‐applicable	
  credits.	
  
	
  
Students	
  from	
  institutions	
  without	
  an	
  articulation	
  agreement	
  in	
  place	
  who	
  want	
  to	
  transfer	
  to	
  the	
  
digital	
  forensics	
  undergraduate	
  program	
  will	
  be	
  considered	
  on	
  a	
  case-­‐by-­‐case	
  basis	
  at	
  the	
  
discretion	
  of	
  the	
  program	
  director.	
  	
  
	
  
II.4.5	
  RATIONALE	
  FOR	
  RESTRICTED	
  ADMISSION	
  
The	
  requirements	
  for	
  admission	
  to	
  the	
  Digital	
  Forensics	
  major	
  are	
  a	
  minimum	
  3.25	
  overall	
  GPA	
  and	
  
a	
  minimum	
  3.0	
  in	
  designated	
  core	
  courses	
  (RCRJ	
  281	
  or	
  AMAT	
  108,	
  ASOC	
  115,	
  BACC	
  211,	
  BFOR	
  100,	
  
BFOR	
  201,	
  BFOR	
  202,	
  and	
  BFOR	
  203)	
  
	
  
	
  
	
  
13	
  
University	
  Senate	
  Bill-­‐1213-­‐05,	
  introduced	
  April	
  19,	
  2013,	
  specified	
  allowable	
  criteria	
  for	
  GPA	
  
restrictions	
  on	
  majors	
  and	
  minors.	
  These	
  included	
  Program	
  Quality	
  (“quality	
  threatened	
  due	
  to	
  
instructional	
  resource	
  limitations”),	
  Prerequisites	
  (“essential	
  incoming	
  competence	
  or	
  
preparation”),	
  and	
  Quantitative	
  Considerations	
  (“inability	
  of	
  students	
  to	
  finish	
  in	
  four	
  years”	
  and	
  
“finite	
  number	
  of	
  student	
  spaces	
  in	
  the	
  program”).	
  	
  
	
  
SOB	
  majors,	
  and	
  the	
  upper	
  level	
  courses	
  associated	
  with	
  SOB	
  majors,	
  presently	
  have	
  GPA	
  
restrictions	
  justified	
  under	
  the	
  criteria	
  above;	
  the	
  program	
  restrictions	
  for	
  the	
  proposed	
  Digital	
  
Forensics	
  major	
  are	
  aligned	
  with	
  the	
  other	
  majors	
  in	
  SOB.	
  These	
  restrictions	
  were	
  imposed	
  since	
  
the	
  Digital	
  Forensics	
  program	
  is	
  selective	
  with	
  small	
  class	
  sizes	
  necessitated	
  by	
  the	
  lab-­‐intensive	
  
nature	
  of	
  curriculum.	
  The	
  program	
  size	
  is	
  based	
  on	
  the	
  faculty	
  resources	
  allocated	
  to	
  the	
  program.	
  
Increasing	
  the	
  size	
  of	
  the	
  program	
  will	
  require	
  additional	
  sections,	
  and	
  in	
  turn,	
  additional	
  faculty;	
  
new	
  faculty	
  lines	
  cannot	
  be	
  guaranteed.	
  A	
  relaxation	
  of	
  the	
  admissions	
  criteria	
  could	
  substantially	
  
lower	
  the	
  necessary	
  levels	
  of	
  academic	
  achievement	
  and	
  preparation	
  that	
  is	
  essential	
  to	
  ensure	
  a	
  
high	
  program	
  quality	
  that	
  is	
  a	
  prerequisite	
  for	
  placement	
  in	
  the	
  field.	
  	
  
II.5	
  
ADMISSIONS	
  AND	
  ACADEMIC	
  STANDING	
  
The	
   SOB	
   maintains	
   a	
   formal	
   Undergraduate	
   Committee	
   on	
   Academic	
   Affairs.	
   	
   In	
   addition	
   to	
   the	
  
implementation	
  of	
  the	
  admissions	
  process	
  as	
  outlined	
  in	
  Section	
  II.4,	
  the	
  committee	
  is	
  responsible	
  
for	
  reviewing	
  the	
  following	
  matters	
  brought	
  to	
  its	
  attention,	
  and	
  making	
  a	
  recommendation	
  to	
  the	
  
director	
   of	
   the	
   program	
   for	
   disposition	
   of	
   those	
   matters.	
   The	
   process	
   and	
   deliberations	
   follow	
  
established	
  University	
  policies	
  and	
  protocol	
  for	
  due	
  process.	
  The	
  Committee	
  tasks	
  include:	
  
	
  
II.5.1	
   APPEALS	
  OF	
  ADMISSION	
  DECISIONS	
  
The	
   committee	
   hears	
   admissions	
   appeals	
   from	
   those	
   students	
   who	
   fail	
   to	
   meet	
   the	
   retention	
  
standards	
  after	
  the	
  first	
  two	
  years.	
  It	
  will	
  also	
  entertain	
  appeals	
  from	
  students	
  seeking	
  to	
  transfer	
  
from	
  a	
  two-­‐year	
  institution	
  whose	
  academic	
  record	
  does	
  not	
  meet	
  the	
  minimum	
  criteria	
  stated	
  in	
  I.	
  
b.	
  above.	
  	
  
I. 
The	
  committee’s	
  decision	
  is	
  then	
  presented	
  to	
  the	
  Director	
  of	
  the	
  program.	
  An	
  official	
  letter	
  
will	
  be	
  sent	
  by	
  the	
  program	
  Director	
  or	
  his	
  designee	
  to	
  the	
  student	
  indicating	
  the	
  decision	
  of	
  
the	
  committee	
  regarding	
  the	
  student’s	
  appeal	
  to	
  admission	
  to	
  the	
  upper	
  division	
  status.	
  	
  
II. The	
  review	
  of	
  the	
  appeal	
  would	
  include,	
  but	
  is	
  not	
  limited	
  to,	
  the	
  student’s	
  written	
  appeal	
  
and	
  any	
  documentation	
  supporting	
  the	
  student’s	
  contentions.	
  
III. The	
  committee	
  can	
  make	
  one	
  of	
  three	
  decisions.	
  	
  
a. Reinstate	
  the	
  student	
  
b. Do	
  not	
  reinstate	
  the	
  student	
  
c. Place	
  the	
  student	
  on	
  a	
  one	
  semester	
  academic	
  contract	
  for	
  the	
  Fall	
  of	
  the	
  third	
  year,	
  
where	
  the	
  student	
  will	
  be	
  asked	
  to	
  achieve	
  a	
  certain	
  semester	
  grade	
  point	
  average	
  and	
  
a	
  certain	
  average	
  from	
  the	
  300	
  level	
  BFOR	
  (Digital	
  Forensics)	
  courses.	
  	
  
	
  
II.5.2	
   GRADE	
  GRIEVANCES	
  
The	
  committee	
  will	
  investigate	
  and	
  deliberate	
  on	
  cases	
  brought	
  by	
  students	
  who	
  consider	
  that	
  they	
  
were	
   aggrieved	
   by	
   the	
   grading	
   process.	
   The	
   committee	
   will	
   review	
   the	
   evidence	
   and	
   make	
   a	
  
recommendation	
  for	
  disposition	
  of	
  the	
  grievance	
  to	
  the	
  Director.	
  	
  The	
  Director	
  will	
  make	
  the	
  final	
  
decision,	
  which	
  will	
  be	
  communicated	
  to	
  the	
  student	
  via	
  the	
  Office	
  of	
  Student	
  Services.	
  	
  The	
  process	
  
and	
  deliberations	
  will	
  follow	
  established	
  University	
  policies	
  and	
  protocol	
  for	
  due	
  process.	
  
	
  
II.5.3	
   REINSTATEMENT	
  TO	
  THE	
  MAJOR	
  FROM	
  A	
  UNIVERSITY	
  DISMISSAL	
  
	
  
	
  
14	
  
In	
   cases	
   of	
   students	
   dismissed	
   from	
   the	
   University,	
   reinstatement	
   of	
   a	
   student	
   will	
   be	
   at	
   the	
  
discretion	
  of	
  the	
  director	
  of	
  the	
  Digital	
  Forensics	
  program	
  pursuant	
  to	
  the	
  University	
  guidelines	
  for	
  
handling	
  such	
  cases.	
  
	
  
II.5.4	
   STUDENT	
  ADVISEMENT	
  AND	
  MENTORING	
  
I. 
Direct	
  Admits	
  
a. Students	
  directly	
  admitted	
  to	
  the	
  Digital	
  Forensics	
  program	
  will	
  be	
  advised	
  in	
  the	
  first	
  
year	
  by	
  the	
  Advisement	
  Services	
  Center.	
  In	
  their	
  second	
  year,	
  the	
  direct	
  admit	
  students	
  
will	
  be	
  advised	
  by	
  the	
  Assistant	
  Dean	
  for	
  Academic	
  Programs	
  and	
  program	
  faculty	
  in	
  
the	
  School	
  of	
  Business.	
  At	
  the	
  conclusion	
  of	
  the	
  second	
  year,	
  Digital	
  Forensics	
  students	
  
who	
  move	
  into	
  upper	
  division	
  status	
  will	
  be	
  advised	
  by	
  the	
  well-­‐established	
  School	
  of	
  
Business	
  Office	
  of	
  Undergraduate	
  Student	
  Services,	
  which	
  has	
  been	
  functioning	
  as	
  the	
  
main	
  advisement	
  center	
  for	
  40	
  years.	
  	
  
b. All	
   majors	
   in	
   this	
   program	
   will	
   be	
   encouraged	
   to	
   select	
   a	
   faculty	
   mentor	
   to	
   discuss	
  
appropriate	
   elective	
   courses,	
   as	
   well	
   as	
   various	
   career	
   opportunities,	
   and	
   advance	
  
study	
  in	
  this	
  field.	
  
	
  
II. Transfer	
  Students	
  
a. Students	
  admitted	
  to	
  upper	
  division	
  status	
  from	
  collaborating	
  community	
  colleges	
  will	
  
receive	
   advisement	
   from	
   the	
   School	
   of	
   Business	
   Office	
   of	
   Undergraduate	
   Student	
  
Services.	
  
b. All	
   majors	
   in	
   this	
   program	
   will	
   be	
   encouraged	
   to	
   select	
   a	
   faculty	
   mentor	
   to	
   discuss	
  
appropriate	
   elective	
   courses,	
   as	
   well	
   as,	
   various	
   career	
   opportunities	
   and	
   advance	
  
study	
  in	
  this	
  field.	
  
II.6	
  	
   CURRICULUM	
  OUTLINE	
  
II.6.1	
  	
   PROGRAM	
  COMPONENTS	
  AND	
  RUBRICS	
  
Building	
  on	
  the	
  innovation	
  and	
  success	
  School	
  of	
  Business’s	
  undergraduate	
  and	
  graduate	
  programs,	
  
the	
  proposed	
  undergraduate	
  academic	
  program	
  is	
  comprised	
  of	
  four	
  building	
  blocks	
  designed	
  to	
  
preserve	
   both	
   the	
   inherent	
   flexibility	
   required	
   for	
   an	
   undergraduate	
   degree	
   with	
   true	
  
interdisciplinary	
  elements	
  and	
  the	
  academic	
  rigor	
  and	
  scholarly	
  excellence	
  demanded	
  by	
  the	
  fields	
  
of	
  digital	
  forensics.	
  
	
  
II.6.1.1	
  FOUNDATIONAL	
  PRINCIPLES	
  FOR	
  DIGITAL	
  FORENSICS	
  	
  
The	
  foundational	
  principles	
  components	
  of	
  the	
  Digital	
  Forensics	
  degree	
  are	
  designed	
  to	
  provide	
  the	
  
background	
   and	
   intellectual	
   “skill	
   sets”	
   required	
   to	
   ensure	
   elementary	
   understanding	
   and	
   basic	
  
knowledge	
  of	
  the	
  digital	
  forensics	
  discipline,	
  as	
  well	
  as,	
  to	
  ensure	
  a	
  broad	
  background	
  imparted	
  
through	
  general	
  education	
  courses.	
  	
  
	
  
II.6.1.2	
  CORE	
  COMPETENCIES	
  IN	
  DIGITAL	
  FORENSICS	
  	
  
The	
  core	
  competency	
  courses	
  are	
  designed	
  to	
  provide	
  the	
  foundation	
  in	
  the	
  forensics	
  discipline	
  on	
  
which	
   advanced	
   learning	
   can	
   be	
   built.	
   These	
   courses	
   introduce	
   the	
   students	
   to	
   functional	
   areas,	
  
such	
  as,	
  criminal	
  justice,	
  accounting,	
  and	
  information	
  security.	
  
	
  
II.6.1.3	
  CONCENTRATION	
  COURSES	
  IN	
  DIGITAL	
  FORENSICS	
  	
  
Concentration	
  courses	
  in	
  digital	
  forensics	
  are	
  comprised	
  of	
  specialized	
  undergraduate	
  coursework	
  
to	
   develop	
   deeper	
   skills	
   in	
   the	
   digital	
   forensics	
   discipline.	
   Combined	
   with	
   upper-­‐level	
   elective	
  
courses,	
   this	
   component	
   of	
   the	
   degree	
   permits	
   a	
   high	
   degree	
   of	
   interdisciplinary	
   instructional	
  
customization.	
  	
  
	
  
	
  
15	
  
	
  
II.6.1.4	
  CAPSTONE	
  COURSES	
  IN	
  DIGITAL	
  FORENSICS	
  
This	
  component	
  includes	
  an	
  advanced	
  coursework	
  in	
  digital	
  forensics	
  including	
  analysis,	
  reporting,	
  
and	
  expert	
  witness	
  testimony	
  through	
  moot	
  court	
  experience.	
  
	
  
Taken	
   as	
   a	
   whole,	
   the	
   four	
   components	
   of	
   the	
   degree	
   merge	
   and	
   integrate	
   basic	
   and	
   advanced	
  
topics	
   with	
   hands-­‐on	
   laboratory	
   work	
   for	
   customized	
   skills	
   training.	
   	
   This	
   combination	
   of	
  
pedagogical	
  tools	
  ensures	
  a	
  coherent	
  undergraduate	
  degree	
  program	
  and	
  teaches	
  the	
  student	
  how	
  
to	
   learn	
   new	
   skills	
   in	
   a	
   quickly	
   evolving	
   discipline.	
   From	
   an	
   implementation	
   perspective,	
   it	
   is	
  
recommended	
  that	
  the	
  University	
  establish	
  a	
  new	
  course	
  rubric	
  BFOR	
   to	
   be	
   associated	
   with	
   the	
  
Digital	
  Forensics	
  undergraduate	
  academic	
  offerings.	
  These	
  rubrics	
  may	
  or	
  may	
  not	
  be	
  expanded	
  to	
  
include	
  current	
  or	
  future	
  graduate	
  course	
  offerings	
  in	
  information	
  security.	
  	
  
	
  
II.6.2	
  	
   PROGRAM	
  REQUIREMENTS	
  
The	
   digital	
   forensics	
   undergraduate	
   program	
   requires	
   the	
   completion	
   of	
   seventy	
   (70)	
   credits	
   of	
  
major-­‐specific	
  coursework.	
  
	
  
II.6.2.1	
  REQUIREMENTS	
  FOR	
  THE	
  B.S.	
  IN	
  DIGITAL	
  FORENSICS	
  	
  	
  
The	
  B.S.	
  program	
  in	
  Digital	
  Forensics	
  requires	
  the	
  completion	
  of	
  the	
  following	
  courses	
  clustered	
  in	
  
four	
  categories:	
  
	
  
1. ‘Foundational	
  Principles’	
   Courses.	
   	
   Twenty-­‐five	
   (25)	
   credits	
   of	
   APSY101,	
   ASOC	
   115,	
   BACC	
  
211,	
  BFOR	
  100,	
  BITM	
  215,	
  RCRJ	
  201,	
  RCRJ	
  203,	
  and	
  RCRJ	
  281.	
  RCRJ	
  281	
  may	
  be	
  replaced	
  by	
  
AMAT	
  108.	
  
	
  
2. ‘Core	
  Competencies’	
  Courses.	
  Sixteen	
  (16)	
  credits	
  of	
  RCRJ	
  202,	
  BFOR	
  203,	
  BFOR	
  204,	
  BFOR	
  
300,	
  and	
  BACC	
  400.	
  
	
  
3. ‘Concentrations’	
  Courses.	
  Twenty-­‐one	
  (21)	
  credits	
  of	
  BFOR	
  201,	
  BFOR	
  202,	
  BFOR	
  301,	
  BFOR	
  
302,	
  BFOR	
  303,	
  BFOR	
  304,	
  and	
  BACC	
  401.	
  
	
  
4. ‘Capstone’	
  Courses.	
  	
  Eight	
  (8)	
  credits	
  of	
  BFOR	
  401W	
  and	
  BFOR	
  402.	
  
	
  
II.6.3	
  	
   GENERAL	
  EDUCATION	
  REQUIREMENTS	
  
The	
  General	
  Education	
  Program	
  at	
  the	
  University	
  at	
  Albany	
  consists	
  of	
  a	
  minimum	
  of	
  30	
  credits	
  of	
  
coursework	
  that	
  in	
  intended	
  to	
  provide	
  a	
  foundation	
  for	
  coursework	
  in	
  student	
  major	
  and	
  minor	
  
fields.	
   	
   The	
   goal	
   is	
   to	
   provide	
   exposure	
   to	
   interdisciplinary	
   fields,	
   provide	
   access	
   to	
   multiple	
  
different	
   perspectives,	
   emphasize	
   active	
   learning,	
   and	
   promote	
   critical	
   thinking.	
   The	
   General	
  
Education	
  Program	
  is	
  summarized	
  in	
  Table	
  I	
  below.	
  
	
  
The	
   “Math	
   and	
   Statistics”	
   General	
   Education	
   requirements	
   are	
   satisfied	
   by	
   the	
   RCRJ	
   281	
  
Introduction	
   to	
   Statistics	
   in	
   Criminal	
   Justice	
   or	
   its	
   substitute	
   AMAT	
   108	
   Elementary	
   Statistics	
  
courses.	
   In	
   addition,	
   the	
   “Social	
   Sciences”	
   requirement	
   is	
   fulfilled	
   by	
   APSY	
   101	
   Introduction	
   to	
  
Psychology	
   or	
   ASOC	
   115	
   Introduction	
   to	
   Sociology	
   –	
   both	
   are	
   courses	
   that	
   are	
   required	
   by	
   the	
  
major.	
  In	
  addition,	
  the	
  “Information	
  Literacy”	
  General	
  Education	
  requirement	
  is	
  met	
  by	
  BFOR	
  100	
  
Introduction	
  to	
  Information	
  Systems.	
  As	
  noted	
  in	
  the	
  University	
  at	
  Albany	
  Undergraduate	
  Bulletin,	
  
students	
   may	
   not	
   use	
   the	
   same	
   course	
   to	
   fulfill	
   both	
   the	
   Arts	
   and	
   the	
   Humanities	
   categories.	
  
Otherwise,	
  if	
  a	
  course	
  fulfills	
  more	
  than	
  one	
  category,	
  students	
  may	
  use	
  the	
  course	
  to	
  fulfill	
  all	
  of	
  
those	
   categories.	
   Although	
   such	
   “double	
   counting”	
   may	
   reduce	
   the	
   number	
   of	
   credits	
   needed	
   to	
  
fulfill	
   General	
   Education	
   requirements	
   to	
   graduate	
   from	
   the	
   University,	
   each	
   student	
   must	
   have	
  
	
  
	
  
16	
  
satisfactorily	
   completed	
   a	
   minimum	
   of	
   thirty	
   (30)	
   graduation	
   credits	
   in	
   courses	
   designated	
   as	
  
General	
  Education	
  requirements.	
  	
  
	
  
The	
   Information	
   Technology	
   Management	
   department	
   and	
   Accounting	
   &	
   Law	
   department	
   in	
   the	
  
School	
  of	
  Business	
  are	
  working	
  closely	
  with	
  the	
  School	
  of	
  Criminal	
  Justice	
  in	
  offering	
  this	
  program.	
  
All	
  departments	
  and	
  colleges	
  of	
  which	
  courses	
  are	
  included	
  in	
  the	
  program	
  have	
  given	
  permission	
  
for	
   the	
   participation	
   of	
   the	
   students	
   involved	
   in	
   this	
   major.	
   These	
   letters	
   of	
   commitment	
   are	
  
included	
  in	
  Appendix	
  VI.4.	
  	
  
	
  
The	
   rationale	
   for	
   including	
   APSY	
   101	
   and	
   ASOC	
   115	
   in	
   our	
   program	
   is	
   to	
   due	
   to	
   the	
   need	
   for	
  
grounding	
   in	
   the	
   social	
   sciences	
   for	
   an	
   interdisciplinary	
   digital	
   forensics	
   major.	
   Psychology	
   is	
  
especially	
   useful	
   related	
   to	
   conferring	
   expert	
   witness	
   testimony	
   and	
   interacting	
   with	
   legal	
  
personnel	
   as	
   well	
   as	
   juries.	
   In	
   addition,	
   there	
   is	
   the	
   field	
   of	
   psychological	
   digital	
   crime	
   scene	
  
analysis	
   and	
   “cyber	
   psychology”	
   which	
   is	
   directly	
   related	
   to	
   digital	
   forensics.	
   In	
   a	
   similar	
   way,	
  
sociology	
  is	
  useful	
  in	
  analyzing	
  criminal	
  networks.	
  	
  We	
  believe	
  that	
  knowledge	
  of	
  statistics	
  is	
  an	
  
important	
  foundational	
  element	
  for	
  our	
  Digital	
  Forensics	
  students.	
  They	
  will	
  need	
  to	
  understand	
  
the	
   value	
   of	
   statistics	
   for	
   analysis	
   of	
   cyber	
   crimes	
   and	
   determining	
   probabilities	
   of	
   occurrence.	
  
Statistics	
   can	
   be	
   used	
   to	
   determine	
   the	
   amount	
   of	
   random	
   sampling	
   that	
   is	
   sufficient	
   for	
   an	
  
investigation,	
  where	
  backlogs	
  of	
  caseload	
  are	
  common.	
  It	
  is	
  also	
  an	
  essential	
  basis	
  for	
  defining	
  if	
  
there	
  has	
  been	
  tampering	
  of	
  digital	
  images	
  (image	
  forensics).	
  We	
  allow	
  students	
  to	
  take	
  either	
  ACRJ	
  
208	
  or	
  AMAT	
  108	
  because	
  we	
  are	
  partnered	
  with	
  the	
  School	
  of	
  Criminal	
  Justice	
  in	
  delivering	
  this	
  
program	
  and	
  believe	
  that	
  students	
  may	
  benefit	
  from	
  a	
  criminal	
  justice	
  framing	
  of	
  statistics.	
  
	
  
There	
  are	
  four	
  additional	
  general	
  education	
  requirements	
  that	
  need	
  to	
  be	
  fulfilled	
  across	
  the	
  entire	
  
curriculum	
  i.e.	
  advanced	
  writing,	
  critical	
  thinking,	
  oral	
  discourse,	
  and	
  information	
  literacy.	
  The	
  
following	
  courses	
  would	
  fulfill	
  each	
  of	
  these	
  areas.	
  	
  	
  
1. Advanced	
  Writing:	
  BFOR	
  303,	
  BFOR	
  304,	
  BACC	
  401,	
  and	
  BFOR	
  401W	
  	
  
	
  
2. Critical	
  Thinking:	
  BFOR	
  201,	
  BFOR	
  202,	
  BFOR303,	
  BFOR	
  304,	
  BACC	
  400,	
  BFOR	
  401W,	
  and	
  
BFOR	
  402	
  
	
  
3. Oral	
  Discourse:	
  BFOR	
  303,	
  BFOR	
  304,	
  BACC	
  401,	
  BFOR	
  402,	
  	
  
	
  
4. Information	
  Literacy:	
  BFOR	
  100,	
  BFOR	
  204,	
  BFOR	
  302	
  
	
  
If	
   a	
   course	
   fulfilling	
   a	
   General	
   Education	
   category	
   also	
   meets	
   a	
   major	
   requirement,	
   there	
   is	
   no	
  
prohibition	
  against	
  counting	
  the	
  course	
  toward	
  General	
  Education	
  and	
  the	
  major.	
  	
  SOB	
  majors	
  will	
  
be	
   advised	
   to	
   make	
   appropriate	
   use	
   of	
   double-­‐counting	
   General	
   Education	
   courses	
   for	
   those	
  
categories	
  not	
  currently	
  met	
  through	
  waiver	
  by	
  appropriate	
  NYS	
  Regents	
  test	
  scores	
  (cf.	
  U.S.	
  history	
  
and	
  foreign	
  language),	
  Advanced	
  Placement	
  credit	
  (cf.	
  statistics,	
  psychology,	
  foreign	
  language,	
  U.S.	
  
history,	
   arts),	
   or	
   other	
   college-­‐level	
   coursework	
   earned	
   in	
   high	
   school.	
   SOB	
   has	
   prepared	
   an	
  
advising	
  chart	
  to	
  assist	
  its	
  students	
  in	
  appropriate	
  General	
  Education	
  course	
  selection	
  to	
  maximize	
  
their	
  educational	
  experience.	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
	
  
17	
  
Table I.  General Education Requirements for UAlbany Undergraduate Students 
 
Requirements	
  
Minimum	
  Credits	
  
Mathematics	
  and	
  Statistics	
  
3	
  
Writing	
  and	
  Critical	
  Inquiry*	
  
3	
  
Arts**	
  
3	
  
Humanities**	
  
3	
  
Natural	
  Sciences	
  
3	
  
Social	
  Sciences	
  
3	
  
U.S.	
  History	
  
3	
  
International	
  Perspectives	
  
3	
  
Foreign	
  Languages	
  
3	
  
Challenges	
  for	
  the	
  21st	
  century	
  
3	
  
Information	
  Literacy	
  
3	
  
	
  
*Writing	
  and	
   Critical	
   Inquiry	
   course	
  must	
   be	
   completed	
   with	
   a	
   grade	
   of	
   C	
   or	
   better.	
  	
  
**	
   No	
   single	
   course	
   can	
   be	
   used	
   to	
   satisfy	
   BOTH	
   the	
   Humanities	
   and	
   the	
   Arts	
   requirement.
 
Updated	
  last	
  11/25/13	
  10:43pm	
  
II.6.4	
  	
   DIGITAL	
  FORENSICS	
  SEMESTER-­‐BY-­‐SEMESTER	
  MAJOR	
  ACADEMIC	
  PATHWAY	
  (MAP)	
  AND	
  COURSE	
  MATRIX	
  
One	
  section	
  of	
  each	
  course	
  at	
  100-­‐level	
  will	
  be	
  offered	
  each	
  year	
  and	
  will	
  be	
  delivered	
  in	
  a	
  face-­‐to-­‐face	
  session	
  as	
  stipulated	
  in	
  
the	
  pathway	
  map	
  in	
  the	
  table	
  below.	
  One	
  section	
  of	
  each	
  course	
  at	
  200-­‐level	
  will	
  be	
  offered	
  once	
  each	
  year	
  in	
  a	
  face-­‐to-­‐face	
  
session	
  as	
  stipulated	
  in	
  the	
  pathway	
  map	
  in	
  the	
  table	
  below.	
  In	
  addition,	
  we	
  expect	
  to	
  offer	
  online	
  versions	
  of	
  BFOR	
  201,	
  BFOR	
  
202,	
  and	
  BFOR	
  204	
  as	
  a	
  part	
  of	
  our	
  grant	
  requirements	
  from	
  the	
  National	
  Science	
  Foundation.	
  	
  Two	
  sections	
  of	
  each	
  course	
  at	
  
the	
  300-­‐level	
  will	
  be	
  offered	
  with	
  one	
  section	
  online	
  and	
  the	
  other	
  face-­‐to-­‐face/blended	
  learning.	
  Two	
  sections	
  of	
  each	
  course	
  
will	
  be	
  offered	
  at	
  the	
  400-­‐level	
  that	
  will	
  be	
  face-­‐to-­‐face/blended	
  learning.	
  Additional	
  courses	
  and	
  sections	
  may	
  be	
  offered	
  
online	
  in	
  the	
  future	
  based	
  on	
  increased	
  international	
  and	
  internal	
  demand,	
  grant	
  requirements,	
  and	
  availability	
  of	
  resources.	
  
II.6.4.1	
  	
  	
  TABLE	
  II.	
  	
  B.S.	
  IN	
  DIGITAL	
  FORENSICS	
  SEMESTER-­‐BY-­‐SEMESTER	
  MAJOR	
  ACADEMIC	
  PATHWAY	
  (MAP)	
  	
  
Year	
  
Fall	
  
Credits	
  	
  
Spring	
  
	
  Credits	
  
1	
  
**ASOC	
  115	
  Introduction	
  to	
  Sociology2	
  
3	
  
BITM	
  215	
  Information	
  Technologies	
  for	
  Business	
  
3	
  
	
  
**BFOR	
  100	
  Introduction	
  to	
  Information	
  Systems	
  
3	
  
APSY	
  101	
  Introduction	
  to	
  Psychology2	
  
3	
  
	
  
GE	
  U.S.	
  History	
  
3	
  
**BFOR	
  201	
  Introduction	
  to	
  Digital	
  Forensics	
  	
  
3	
  
	
  
GE	
  Foreign	
  Language	
  	
  
3	
  
**RCRJ	
  281	
  Intro	
  to	
  Statistics1	
  or	
  AMAT	
  108	
  Elementary	
  Statistics1	
  	
  
3	
  
	
  
GE	
  UUNI	
  100	
  Writing	
  and	
  Critical	
  Inquiry	
  	
  
3	
  
GE	
  Natural	
  Science	
  
3	
  
	
  
	
  
15	
  
	
  
15	
  
2	
  
RCRJ	
  201	
  Introduction	
  to	
  Criminal	
  Justice	
  
3	
  
RCRJ	
  202	
  Introduction	
  to	
  Law	
  and	
  Criminal	
  Justice	
  w/	
  discussion	
  
4	
  
	
  
**BFOR	
  202	
  Cyber	
  Crime	
  Investigations	
  
3	
  
RCRJ	
  203	
  Criminology	
  w/	
  discussion	
  	
  
3	
  
	
  
**BFOR	
  203	
  Networking	
  -­‐	
  Introduction	
  to	
  Communication	
  w/	
  lab	
  	
  
3	
  
BFOR	
  204	
  Fundamentals	
  of	
  Information	
  and	
  Cyber	
  Security	
  	
  
3	
  
	
  
GE	
  Humanities	
  (suggested	
  APHI	
  210	
  Introduction	
  to	
  Logic)	
  
3	
  
GE	
  International	
  Perspectives	
  
3	
  
	
  
**BACC	
  211	
  Financial	
  Accounting	
  
3	
  
GE	
  Arts	
  	
  
3	
  
	
  
	
  	
  
15	
  
	
  	
  
16	
  
3	
  
BFOR	
  300	
  Databases	
  for	
  Digital	
  Forensics	
  
3	
  
BFOR	
  303	
  Computer	
  Forensics	
  II	
  
3	
  
	
  
BFOR	
  301	
  Computer	
  Forensics	
  I	
  
3	
  
BFOR	
  304	
  Network	
  and	
  Mobile	
  Forensics	
  
3	
  
	
  
BFOR	
  302	
  eDiscovery	
  Forensics	
  
3	
  
GE	
  Challenges	
  for	
  21st	
  Century	
  
3	
  
	
  
Elective	
  
3	
  
Elective	
  
3	
  
	
  
Elective	
  
3	
  
Elective	
  
3	
  
	
  
	
  	
  
15	
  
	
  	
  
15	
  
4	
  
BFOR	
  401W*	
  Advanced	
  Digital	
  Forensics	
  
4	
  
BFOR	
  402	
  Digital	
  Forensics	
  Moot	
  Court	
  
4	
  
	
  
BACC	
  400	
  Forensic	
  Accounting	
  and	
  Fraud	
  Detection	
  
3	
  
BACC	
  401	
  Forensic	
  Accounting	
  Investigative	
  Techniques	
  
3	
  
	
  
Elective	
  
3	
  
Elective	
  
3	
  
	
  
Elective	
  
3	
  
Elective	
  
3	
  
	
  
Elective	
  
3	
  
	
  
	
  
	
  
	
  	
  
	
  	
  	
  	
  	
  	
  16	
  
	
  	
  
13	
  
1	
   Satisfies	
   the	
   GE	
   Mathematics	
   and	
   Statistics	
   requirement;	
   2 	
   	
   Satisfies	
   the	
   GE	
   Social	
   Sciences	
   requirement; 3	
   Satisfies	
   GE	
   Information	
   Literacy	
   requirement.
	
  19	
  
II.6.4.2	
  PROPOSED	
  DIGITAL	
  FORENSICS	
  COURSE	
  MATRIX	
  
	
  
Table	
   III	
   lists	
   the	
   proposed	
   Digital	
   Forensics	
   courses	
   by	
   category.	
   Full	
   catalogue	
  
descriptions	
  are	
  given	
  in	
  Appendix	
  VI.1	
  	
  
	
  
Table	
   III.	
   	
   Digital	
   Forensics	
   Courses	
   by	
   Category	
   (Course	
   descriptions	
   in	
   Appendix	
  
VI.1.)	
  	
  
	
  
Foundational	
  Principle	
  Courses	
  in	
  Digital	
  Forensics	
   Credits	
  
APSY	
  101	
  	
  
Introduction	
  to	
  Psychology	
  
3	
  
ASOC	
  115	
  
Introduction	
  to	
  Sociology	
  
3	
  
BACC	
  211	
  	
  
Financial	
  Accounting	
  
3	
  
BFOR	
  100X	
  
Introduction	
  to	
  Information	
  Systems	
  
4	
  
BITM	
  215	
  
Information	
  Technologies	
  for	
  Business	
  
3	
  
RCRJ	
  201	
  
Introduction	
  to	
  Criminal	
  Justice	
  
3	
  
RCRJ	
  203	
  
Criminology	
  
3	
  
RCRJ	
  281	
  OR	
  
AMAT	
  108	
  
Introduction	
  to	
  Statistics	
  /	
  Elementary	
  Statistics	
  
3	
  
	
  
Core	
  Competency	
  Courses	
  in	
  Digital	
  Forensics	
  
Credits	
  
RCRJ	
  202	
  
Introduction	
  to	
  Law	
  and	
  Criminal	
  Justice	
  
4	
  
BFOR	
  203	
  
Networking	
  –	
  Introduction	
  to	
  Communications	
  
3	
  
BFOR	
  204	
  
Fundamentals	
  of	
  Information	
  and	
  Cyber	
  Security	
  
3	
  
BFOR	
  300	
  
Databases	
  for	
  Digital	
  Forensics	
  
3	
  
BACC	
  400	
  
Forensic	
  Accounting	
  and	
  Fraud	
  Detection	
  
3	
  
	
  
Concentration	
  Courses	
  in	
  Digital	
  Forensics	
  
Credits	
  
BFOR	
  201	
  
Introduction	
  to	
  Digital	
  Forensics	
  
3	
  
BFOR	
  202	
  
Cyber	
  Crime	
  Investigations	
  
3	
  
BFOR	
  301	
  
Computer	
  Forensics	
  I	
  
3	
  
BFOR	
  302	
  
eDiscovery	
  
3	
  
BFOR	
  303	
  
Computer	
  Forensics	
  II	
  
3	
  
BFOR	
  304	
  
Network	
  and	
  Mobile	
  Forensics	
  
3	
  
BACC	
  401	
  
Forensic	
  Accounting	
  Investigative	
  Techniques	
  
3	
  
	
  
Capstone	
  Courses	
  in	
  Digital	
  Forensics	
  
Credits	
  
BFOR	
  401W	
  
Advanced	
  Digital	
  Forensics	
  
4	
  
BFOR	
  402	
  
Digital	
  Forensics	
  Moot	
  Court	
  
4	
  
	
  
	
  	
  
	
  
	
  
20	
  
II.6.5	
  	
   STUDENT	
  ADVISING	
  AND	
  CAREER	
  DEVELOPMENT	
  
A	
  comprehensive	
  and	
  proactive	
  advisement	
  program,	
  coupled	
  to	
  a	
  flexible	
  assessment	
  system	
  (see	
  
Section	
  II.3.	
  Learning	
  Outcomes	
  and	
  Assessment),	
  is	
  essential	
  to	
  ensuring	
  top	
  academic	
  quality	
  and	
  
scholarly	
   excellence	
   of	
   the	
   Digital	
   Forensics	
   undergraduate	
   program	
   while	
   best	
   serving	
   the	
  
educational	
  and	
  career	
  interests	
  of	
  its	
  student	
  participants.	
  	
  All	
  freshmen	
  students	
  will	
  be	
  advised	
  
in	
  the	
  UAlbany	
  Advisement	
  Services	
  Center.	
  After	
  students	
  have	
  earned	
  admission	
  to	
  the	
  proposed	
  
Digital	
  Forensics	
  undergraduate	
  program	
  (juniors	
  in	
  the	
  major	
  and	
  2nd	
  year	
  direct	
  admits),	
  students	
  
will	
   work	
   with	
   Assistant	
   Dean	
   for	
   Academic	
   Programs	
   for	
   consultation	
   and	
   scheduling	
   of	
  
coursework.	
  All	
  administrative	
  and	
  programmatic	
  actions	
  with	
  regards	
  to	
  student	
  matters	
  will	
  be	
  
coordinated	
   through	
   the	
   SOB	
   Office	
   of	
   Student	
   Services.	
   Supplementary	
   advisement	
   by	
   program	
  
faculty	
  will	
  be	
  made	
  available	
  to	
  all	
  students	
  intending	
  to	
  be	
  in	
  the	
  major.	
  	
  
	
  
Periodic	
  communication	
  and	
  evaluation	
  of	
  progress	
  will	
  be	
  implemented	
  for	
  each	
  student	
  and	
  will	
  
center	
  on	
  individual	
  advisor/student	
  interactions	
  to	
  ensure	
  timely	
  completion	
  of	
  the	
  program	
  of	
  
study.	
   	
   We	
   expect	
   students	
   to	
   meet	
   with	
   their	
   academic	
   advisors	
   regularly	
   to	
   review	
   progress,	
  
solicit	
  guidance,	
  and	
  identify	
  opportunities	
  for	
  advancement.	
  Throughout	
  the	
  advisement	
  process,	
  
the	
  advisors	
  will	
  coordinate	
  their	
  actions	
  with	
  director	
  of	
  the	
  Digital	
  Forensics	
  program	
  to	
  ensure	
  
the	
  availability	
  of	
  the	
  faculty	
  resources	
  and	
  infrastructure	
  assets	
  necessary	
  to	
  support	
  the	
  student’s	
  
academic	
  path.	
  	
  
III.	
  ENROLLMENT	
  
SOB	
   is	
   committed	
   to	
   academically	
   rigorous	
   undergraduate	
   programs	
   serving	
   a	
   diverse	
   student	
  
clientele	
  from	
  New	
  York	
  State	
  and	
  beyond.	
  	
  As	
  such,	
  the	
  undergraduate	
  digital	
  forensics	
  curricula	
  
proposed	
  will	
  be	
  deployed	
  in	
  a	
  manner	
  that	
  maintains	
  the	
  scholarly	
  excellence,	
  educational	
  quality,	
  
and	
   technical	
   and	
   pedagogical	
   innovation	
   necessary	
   to	
   attract	
   and	
   educate	
   a	
   talented	
   pool	
   of	
  
qualified	
   students	
   at	
   the	
   baccalaureate	
   level.	
   	
   Accordingly,	
   enrollments	
   are	
   planned	
   to	
   increase	
  
gradually	
  in	
  accordance	
  with	
  the	
  plan	
  laid	
  out	
  in	
  the	
  SUNY	
  2020	
  proposal	
  as	
  see	
  in	
  the	
  table	
  below.	
  	
  
	
  
Table VI. Targeted enrollments in the proposed Digital Forensics Baccalaureate program.* 
 
	
  
2014	
  -­‐	
  2015	
  
2015	
  –	
  2016**	
  
2016	
  –	
  2017	
  
	
  
Fall	
  
Spring	
  
Fall	
  
Spring	
  
Fall	
  
Spring	
  
Freshmen	
  
23	
  
22	
  
25	
  
24	
  
30	
  
28	
  
Sophomores	
  
	
  
	
  
20	
  
20	
  
22	
  
22	
  
Juniors	
  
22	
  
20	
  
25	
  
23	
  
48	
  
42	
  
Seniors	
  
	
  
	
  
18	
  
16	
  
21	
  
20	
  
	
  
*	
  Student populations in the individual programs are not intended to represent a fixed ratio, and are 
expected to vary based on student interest and the yearly pool of potential applicants.	
  
**Although full program implementation is tentatively planned for Fall 2015, partial instructional 
activities have been initiated in Fall 2013. 
***	
   These enrollment numbers reflect fully admitted students for junior and seniors. Freshman and 
sophomore numbers will include direct admits as well as intended majors.  
****	
   The chart indicates the number of intended or fully admitted students based on class year and 
academic semester and intends to capture natural attrition in the major. For example, in the 2014-2015 
academic year, we expect 23 freshmen, and 22 transfers and then attribute a loss of 1 student from the 
freshmen class and 2 students from the junior class. 
 
	
  	
  
	
  
	
  
21	
  
IV.	
  	
  
Impact	
  of	
  Proposed	
  Program	
  on	
  Other	
  SUNY	
  Institutions	
  
The	
  Digital	
  Forensics	
  undergraduate	
  curricula	
  is	
  intended	
  to	
  attract	
  and	
  retain	
  the	
  large	
  numbers	
  of	
  
qualified	
   undergraduate	
   students	
   who	
   are	
   presently	
   inaccessible	
   to	
   SUNY	
   and	
   other	
   private	
  
institutions	
  of	
  higher	
  learning	
  in	
  New	
  York	
  State.	
  	
  This	
  inaccessibility	
  is	
  driven	
  by	
  the	
  lack	
  of	
  a	
  four-­‐
year	
  Digital	
  Forensics	
  baccalaureate	
  degree,	
  which	
  is	
  in	
  great	
  demand	
  in	
  both	
  the	
  public	
  sector	
  for	
  
law	
  enforcement	
  and	
  the	
  private	
  sector	
  for	
  corporate	
  investigative	
  work.	
  	
  
	
  
In	
  particular,	
  a	
  key	
  component	
  of	
  the	
  Digital	
  Forensics	
  undergraduate	
  program	
  is	
  to	
  address	
  the	
  
severe	
  shortage	
  in	
  the	
  availability	
  of	
  qualified	
  security	
  and	
  forensics	
  specialists	
  in	
  New	
  York	
  and	
  the	
  
U.S.	
  	
  	
  In	
  this	
  context,	
  no	
  similar	
  educational	
  program	
  is	
  currently	
  being	
  offered	
  at	
  any	
  other	
  
institution	
  of	
  higher	
  learning	
  in	
  New	
  York,	
  including	
  the	
  SUNY	
  system.	
  Instead,	
  a	
  very	
  small	
  
number	
  of	
  undergraduate	
  courses	
  dedicated	
  to	
  digital	
  forensics	
  are	
  currently	
  being	
  offered	
  at	
  other	
  
SUNY	
  campuses	
  (See	
  Appendix	
  VI.3).	
  	
  Consequently,	
  the	
  potential	
  negative	
  impacts	
  that	
  might	
  have	
  
otherwise	
  resulted	
  from	
  duplication	
  of	
  programs	
  offered	
  at	
  other	
  SUNY	
  colleges	
  or	
  universities	
  are	
  
non-­‐existent	
  in	
  this	
  case.	
  	
  To	
  the	
  contrary,	
  it	
  is	
  projected	
  that	
  the	
  undergraduate	
  degrees	
  proposed	
  
will	
  have	
  significant	
  positive	
  direct	
  consequences	
  and	
  beneficial	
  ripple	
  effects	
  at	
  a	
  number	
  of	
  SUNY	
  
institutions,	
  from	
  two-­‐year	
  colleges	
  to	
  university	
  centers.	
  	
  	
  
	
  
From	
  a	
  strategic	
  perspective,	
  the	
  establishment	
  of	
  world-­‐class	
  undergraduate	
  programs	
  in	
  digital	
  
forensics	
  will	
  further	
  advance	
  the	
  standing	
  and	
  reputation	
  of	
  SUNY	
  as	
  a	
  top	
  flight	
  university	
  system.	
  	
  
Additionally,	
   the	
   programs	
   will	
   act	
   as	
   an	
   effective	
   pipeline	
   for	
   the	
   graduation	
   of	
   exceptional	
  
students	
  who	
  could	
  serve	
  as	
  highly	
  qualified	
  candidates	
  for	
  graduate	
  programs	
  such	
  as	
  Computer	
  
Science,	
  Business,	
  and	
  Criminal	
  Justice	
  at	
  other	
  SUNY	
  Schools.	
  	
  The	
  proposed	
  programs	
  will	
  provide	
  
an	
   attractive	
   and	
   desirable	
   platform	
   for	
   SUNY	
   community	
   college	
   students	
   who	
   seek	
   more	
  
advanced	
  educational	
  and	
  training	
  opportunities	
  in	
  the	
  burgeoning	
  field	
  of	
  digital	
  forensics.	
  	
  From	
  a	
  
programmatic	
   perspective,	
   the	
   undergraduate	
   curricula	
   proposed	
   do	
   effectively	
   complement	
   the	
  
SUNY	
  community	
  colleges	
  currently	
  offering	
  or	
  contemplating	
  the	
  implementation	
  of	
  2-­‐year	
  degree	
  
programs	
  related	
  to	
  computer	
  science,	
  criminal	
  justice,	
  and	
  information	
  security.	
  	
  We	
  are	
  already	
  
working	
   with	
   several	
   community	
   colleges	
   including	
   Hudson	
   Valley,	
   Herkimer	
   County,	
   and	
  
Columbia-­‐Green	
  community	
  colleges	
  to	
  build	
  articulation	
  agreements	
  of	
  transfer	
  of	
  their	
  students	
  
into	
  the	
  junior	
  year	
  at	
  the	
  University	
  at	
  Albany	
  digital	
  forensics	
  baccalaureate	
  program.	
  
	
  
	
  
	
  	
  
	
  
	
  
22	
  
V.	
  	
  
FACULTY	
  
The	
  Digital	
  Forensics	
  program	
  will	
  feature	
  participation	
  of	
  existing	
  faculty	
  from	
  several	
  schools	
  and	
  
departments	
   including	
   the	
   School	
   of	
   Business	
   Information	
   Technology	
   Management	
   and	
  
Accounting	
  Departments,	
  and	
  the	
  School	
  of	
  Criminal	
  Justice.	
  In	
  addition,	
  we	
  have	
  recently	
  hired	
  two	
  
faculty	
  in	
  the	
  last	
  semester	
  and	
  expect	
  to	
  hire	
  two	
  more	
  in	
  the	
  upcoming	
  academic	
  year.	
  In	
  addition,	
  
we	
  expect	
  to	
  hire	
  an	
  additional	
  two	
  faculty	
  in	
  the	
  year	
  after.	
  These	
  major-­‐specific	
  hires	
  are	
  being	
  
supported	
  by	
  the	
  NY	
  SUNY	
  2020	
  UAlbany	
  Impact	
  Proposal	
  for	
  New	
  Faculty	
  approved	
  in	
  2012.	
  The	
  
team	
   of	
   professors,	
   educators,	
   and	
   academic	
   advisement	
   support	
   staff	
   below	
   will	
   serve	
   as	
   a	
  
resource	
   for	
   undergraduate	
   course	
   instruction,	
   mentoring,	
   academic	
   advisement,	
   and	
   future	
  
program	
  development.	
  	
  
	
  
A	
  listing	
  of	
  current	
  faculty,	
  instructors,	
  and	
  academic	
  advisement	
  staff	
  that	
  will	
  be	
  participating	
  in	
  
the	
  undergraduate	
  degree	
  programs	
  is	
  presented	
  below,	
  along	
  with	
  their	
  primary	
  affiliation.	
  
	
  
• 
James	
  R.	
  Acker,	
  Distinguished	
  Teaching	
  Professor	
  
School	
  of	
  Criminal	
  Justice	
  
• 
Fabio	
  R.	
  Auffant	
  II,	
  Lecturer	
  
Information	
  Technology	
  Management,	
  School	
  of	
  Business	
  
• 
Jason	
  Cotungo,	
  Undergraduate	
  Advisor	
  
Office	
  of	
  Student	
  Services,	
  School	
  of	
  Business	
  
• 
Jakov	
  J.	
  Crnkovic,	
  Service	
  Associate	
  Professor	
  
Information	
  Technology	
  Management,	
  School	
  of	
  Business	
  
• 
Ingrid	
  Fisher,	
  Chair	
  and	
  Associate	
  Professor	
  
Accounting	
  &	
  Law,	
  School	
  of	
  Business	
  
• 
Sanjay	
  Goel,	
  Chair	
  and	
  Associate	
  Professor	
  
Information	
  Technology	
  Management,	
  School	
  of	
  Business	
  
• 
Yuan	
  Hong,	
  Assistant	
  Professor	
  
Information	
  Technology	
  Management,	
  School	
  of	
  Business	
  
• 
Rey	
  Koslowski,	
  Associate	
  Professor	
  
Rockefeller	
  College,	
  Political	
  Science	
  
• 
John	
  Levato,	
  Assistant	
  Dean	
  for	
  Academic	
  Programs,	
  Career	
  Services	
  and	
  Alumni	
  Relations	
  	
  
School	
  of	
  Business	
  
• 
Siwei	
  Lyu,	
  Assistant	
  Professor	
  
College	
  of	
  Computing	
  and	
  Information,	
  Computer	
  Science	
  
• 
JoAnne	
  M.	
  Malatesta,	
  Assistant	
  Dean	
  
School	
  of	
  Criminal	
  Justice	
  
• 
Susan	
  Maloney,	
  Director	
  of	
  Undergraduate	
  Student	
  Services	
  	
  
School	
  of	
  Business	
  
• 
Michelle	
  R.	
  Moshier,	
  Lecturer	
  
Accounting	
  &	
  Law,	
  School	
  of	
  Business	
  
• 
Cynthia	
  Najdowski,	
  Assistant	
  Professor	
  
School	
  of	
  Criminal	
  Justice	
  
• 
Justin	
  T.	
  Pickett,	
  Assistant	
  Professor	
  
School	
  of	
  Criminal	
  Justice	
  
• 
Peter	
  J.	
  Ross,	
  Lecturer	
  
Information	
  Technology	
  Management,	
  School	
  of	
  Business	
  
• 
Robert	
  E.	
  Worden,	
  Associate	
  Professor	
  
School	
  of	
  Criminal	
  Justice	
  
	
  	
  
	
  
	
  
23	
  
APPENDIX	
  VI.1	
  DIGITAL	
  FORENSICS	
  MAJOR	
  COURSE	
  CATALOGUE	
  DESCRIPTIONS	
  
APSY	
  101	
  Introduction	
  to	
  Psychology	
  (3)	
  	
  
The	
   basic	
   methods	
   and	
   points	
   of	
   view	
   in	
   the	
   scientific	
   study	
   of	
   human	
   behavior.	
   Topics	
   include	
  
biological	
  bases	
  of	
  behavior,	
  personality	
  organization,	
  intelligence,	
  motivation,	
  emotions,	
  learning,	
  
and	
  social	
  relations.	
  For	
  psychology	
  majors	
  completing	
  their	
  major	
  requirements	
  as	
  outlined	
  in	
  this	
  
bulletin	
  or	
  subsequent	
  editions,	
  APSY	
  101	
  is	
  restricted	
  to	
  A-­‐E	
  grading	
  after	
  matriculation	
  at	
  Albany.	
  
Only	
  one	
  of	
  APSY	
  101,	
  102,	
  or	
  TPSY	
  102	
  may	
  be	
  taken	
  for	
  credit.	
  
	
  
ASOC	
  115/115Z	
  Introduction	
  to	
  Sociology	
  (3)	
  	
  
Nature	
   of	
   culture	
   and	
   of	
   human	
   society,	
   personality	
   development,	
   groups	
   and	
   group	
   structure,	
  
social	
  institutions,	
  the	
  processes	
  of	
  social	
  change.	
  Only	
  one	
  version	
  of	
  ASOC	
  115	
  may	
  be	
  taken	
  for	
  
credit.	
  
	
  
BACC	
  211	
  Financial	
  Accounting	
  (3)	
  
A	
   thorough	
   introduction	
   to	
   the	
   basic	
   financial	
   statements	
   including	
   the	
   balance	
   sheet,	
   income	
  
statement,	
  and	
  statement	
  of	
  cash	
  flows,	
  with	
  a	
  focus	
  on	
  accounting	
  information	
  that	
  is	
  available	
  to	
  
individuals	
   outside	
   an	
   organization.	
   The	
   course	
   provides	
   an	
   introduction	
   to	
   the	
   concepts,	
  
terminology	
   and	
   principles	
   of	
   financial	
   accounting.	
   Students	
   learn	
   about	
   accounting	
   as	
   an	
  
information	
   development	
   and	
   communication	
   function	
   that	
   supports	
   economic	
   decision-­‐
making.	
  The	
   course	
   enables	
   students	
   to	
   analyze	
   financial	
   statements;	
   derive	
   information	
   for	
  
personal	
  and	
  organizational	
  decisions	
  from	
  financial	
  statements;	
  and	
  better	
  understand	
  business	
  
entities.	
  Not	
  open	
  to	
  freshmen.	
  Intended	
  accounting	
  and	
  business	
  majors	
  should	
  enroll	
  in	
  BACC	
  211	
  
in	
  the	
  first	
  semester	
  of	
  their	
  sophomore	
  year.	
  Offered	
  fall	
  semester	
  only.	
  
	
  
BACC	
  400	
  Forensic	
  Accounting	
  and	
  Fraud	
  Detection	
  
This	
   course	
   provides	
   an	
   overview	
   of	
   occupational	
   fraud	
   including	
   misappropriation	
   of	
   assets,	
  
financial	
  statement	
  fraud	
  and	
  corruption	
  as	
  well	
  as	
  other	
  forensic	
  accounting	
  engagements	
  such	
  as	
  
tax	
   fraud	
   and	
   matrimonial	
   disputes.	
   The	
   course	
   will	
   explore	
   the	
   characteristics	
   of	
   specific	
   fraud	
  
schemes	
   along	
   with	
   the	
   characteristics	
   of	
   those	
   who	
   perpetrate	
   them	
   (according	
   to	
   the	
   Annual	
  
Report	
   to	
   the	
   Nations	
   compiled	
   by	
   the	
   Association	
   of	
   Certified	
   Fraud	
   Examiners).	
   Students	
   will	
  
acquire	
  an	
  understanding	
  of	
  the	
  generally	
  accepted	
  accounting	
  principles	
  violated	
  by	
  the	
  schemes.	
  
Students	
  will	
  become	
  versed	
  in	
  the	
  principles	
  of	
  internal	
  control	
  over	
  the	
  financial	
  reporting	
  system	
  
including	
  how	
  these	
  principles	
  work	
  to	
  deter	
  financial	
  fraud	
  and	
  ensure	
  compliance	
  with	
  external	
  
requirements.	
  Relevant	
  guidance	
  from	
  the	
  professional,	
  regulatory	
  and	
  legal	
  environment	
  will	
  be	
  
discussed.	
  Prerequisite(s):	
  BACC	
  211.	
  Offered	
  fall	
  semester	
  only.	
  
	
  
BACC	
  401	
  Forensic	
  Accounting	
  Investigative	
  Techniques	
  
Students	
   will	
   learn	
   the	
   process	
   and	
   principal	
   techniques	
   for	
   conducting	
   fraud	
   examinations	
   and	
  
other	
   forensic	
   investigations	
   as	
   well	
   as	
   why	
   careful	
   attention	
   to	
   them	
   is	
   critical	
   to	
   a	
   successful	
  
investigation.	
   Students	
   will	
   learn	
   the	
   role	
   of	
   analytical	
   review	
   procedures	
   in	
   the	
   investigation	
   of	
  
financial	
  fraud.	
  Document	
  analysis	
  and	
  the	
  art	
  of	
  effective	
  interviewing	
  during	
  investigations	
  will	
  be	
  
explored.	
  	
  Students	
  will	
  learn	
  the	
  proper	
  procedures	
  for	
  evidence	
  handling.	
  Finally	
  students	
  will	
  
learn	
  to	
  write	
  a	
  report	
  that	
  succinctly	
  and	
  effectively	
  communicates	
  the	
  completed	
  investigation.	
  
Relevant	
   guidance	
   from	
   the	
   professional,	
   regulatory	
   and	
   legal	
   environment	
   will	
   be	
   discussed.	
  
Prerequisite(s):	
  BACC	
  400.	
  Offered	
  spring	
  semester	
  only.	
  
	
  
BFOR	
  100	
  Introduction	
  to	
  Information	
  Systems	
  (4)	
  
This	
  course	
  provides	
  a	
  foundation	
  of	
  information	
  systems	
  concepts	
  that	
  can	
  be	
  applied	
  to	
  future	
  
learning	
   in	
   advanced	
   topics.	
   The	
   course	
   will	
   include	
   background	
   in	
   the	
   history	
   and	
   social	
  
	
  	
  
	
  
	
  
24	
  
implications	
   of	
   computing	
   including	
   cyber	
   ethics;	
   emergent	
   and	
   contemporary	
   information	
  
technology	
  and	
  its	
  nomenclature;	
  information	
  and	
  data	
  abstraction,	
  representation,	
  manipulation	
  
and	
  storage;	
  operating	
  systems;	
  networking	
  and	
  the	
  Internet,	
  programming	
  languages,	
  logic,	
  and	
  
algorithms;	
  database	
  systems;	
  digital	
  graphics	
  and	
  multimedia;	
  and	
  information	
  security.	
  	
  	
  
	
  
BFOR	
  201	
  Introduction	
  to	
  Digital	
  Forensics	
  (3)	
  
In	
   this	
   course,	
   students	
   will	
   learn	
   the	
   fundamental	
   process	
   of	
   analyzing	
   data	
   collected	
   from	
  
electronic	
  devices	
  (including	
  computers,	
  media,	
  and	
  other	
  digital	
  evidence).	
  Students	
  will	
  become	
  
familiar	
  with	
  proper	
  techniques	
  and	
  tools	
  utilized	
  for	
  securing,	
  handling	
  and	
  preserving	
  digital	
  and	
  
multimedia	
   evidence	
   at	
   physical	
   crime	
   scenes.	
   Students	
   will	
   utilize	
   examination	
   and	
   chain	
   of	
  
custody	
   forms,	
   as	
   well	
   as	
   prepare	
   crime	
   scene	
   &	
   digital	
   acquisition	
   reports	
   related	
   to	
  
administrative,	
  civil	
  and	
  criminal	
  investigations.	
  
	
  
BFOR	
  202	
  Cyber	
  Crime	
  Investigations	
  (3)	
  
This	
   course	
   will	
   teach	
   students	
   forensic	
   investigative	
   techniques	
   specifically	
   for	
   managing	
   cyber	
  
crimes	
  including	
  collection	
  and	
  preservation	
  of	
  data	
  from	
  different	
  sources,	
  such	
  as	
  the	
  Internet	
  
and	
  "cloud"	
  computing	
  environments.	
  Students	
  will	
  learn	
  the	
  legal	
  processes	
  available	
  for	
  collecting	
  
and	
  preserving	
  such	
  evidence	
  in	
  conducting	
  cyber	
  investigations.	
  Offered	
  fall	
  semester	
  only.	
  
	
  
BFOR	
  203	
  Networking	
  -­‐	
  Introduction	
  to	
  Data	
  Communication	
  w/	
  lab	
  (3)	
  
The	
  past	
  couple	
  of	
  decades	
  have	
  witnessed	
  the	
  digital	
  revolution	
  profoundly	
  altering	
  our	
  society.	
  
Most	
  of	
  the	
  business	
  affairs	
  have	
  been	
  linked	
  to	
  communication	
  and	
  networking	
  technologies.	
  With	
  
tremendous	
  advances	
  in	
  networking,	
  it	
  is	
  now	
  feasible	
  to	
  connect	
  all	
  the	
  devices	
  such	
  as	
  computers,	
  
tablets,	
  smart	
  phones,	
  and	
  mainframes	
  together.	
  However,	
  the	
  newly	
  innovative	
  communication	
  
and	
  networking	
  technologies	
  pose	
  additional	
  challenges	
  to	
  business	
  and	
  IT	
  management.	
  
Nowadays,	
  IT	
  professionals	
  must	
  have	
  an	
  elementary	
  understanding	
  of	
  those	
  technologies	
  that	
  
facilitate	
  them	
  better	
  impose	
  management	
  in	
  the	
  organization	
  or	
  perform	
  advanced	
  analysis	
  such	
  
as	
  for	
  network	
  forensics.	
  Balanced	
  technical	
  and	
  managerial	
  contents	
  are	
  incorporated	
  to	
  enable	
  
students	
  to	
  learn	
  from	
  various	
  perspectives.	
  This	
  course	
  will	
  introduce	
  the	
  student	
  to	
  the	
  
organization	
  and	
  design	
  of	
  data	
  networks.	
  Topics	
  include	
  networking	
  media,	
  Ethernet	
  technology,	
  
the	
  TCP/IP	
  protocol	
  suite,	
  subnets,	
  routers	
  and	
  routing	
  protocols,	
  Wide	
  Area	
  Networks	
  (WANs),	
  
and	
  fundamentals	
  of	
  network	
  management.	
  This	
  course	
  includes	
  hands-­‐on	
  experience	
  of	
  
networking	
  techniques.	
  Offered	
  fall	
  semester	
  only.	
  
	
  
BFOR	
  204	
  Fundamentals	
  of	
  Information	
  and	
  Cyber	
  Security	
  (3)	
  
This	
   course	
   covers	
   computer	
   and	
   network	
   security.	
   This	
   course	
   will	
   examine	
   general	
   security	
  
concepts	
   that	
   include:	
   communication	
   security,	
   infrastructure	
   security,	
   operation/organizational	
  
security,	
   basic	
   cryptography	
   and	
   steganography.	
   Students	
   will	
   learn	
   and	
   apply	
   de	
   facto	
   security	
  
best	
   practices	
   administering	
   clients,	
   servers	
   and	
   firewalls	
   in	
   a	
   dedicated	
   computer	
   network	
  
laboratory.	
   Students	
   will	
   have	
   the	
   opportunity	
   to	
   assess	
   vulnerabilities	
   and	
   administrate	
  
information	
  security.	
  Offered	
  spring	
  semester	
  only.	
  
	
  
BFOR	
  300	
  Databases	
  for	
  Digital	
  Forensics	
  (3)	
  
A	
  large	
  part	
  of	
  digital	
  forensics	
  deals	
  with	
  extraction	
  and	
  collection	
  of	
  data	
  across	
  electronic	
  devices	
  
each	
   of	
   which	
   has	
   different	
   architecture.	
   In	
   this	
   class	
   students	
   learn	
   the	
   traditional	
   relational	
  
database	
  design	
  and	
  then	
  understand	
  the	
  architecture	
  of	
  data	
  storage	
  in	
  mobile	
  electronic	
  devices.	
  
The	
  class	
  also	
  discusses	
  in	
  depth	
  the	
  storage	
  of	
  data	
  on	
  the	
  cloud	
  and	
  the	
  ramifications	
  of	
  that	
  on	
  
digital	
   forensics.	
   Students	
   also	
   learn	
   the	
   basic	
   techniques	
   for	
   analyzing	
   data	
   including	
   use	
   of	
  
Structured	
  Query	
  Language,	
  data	
  mining	
  techniques	
  and	
  social	
  network	
  analysis.	
  Students	
  will	
  also	
  
	
  	
  
	
  
	
  
25	
  
use	
  scripting	
  languages	
  to	
  efficiently	
  clean	
  up	
  data	
  from	
  text	
  files	
  and	
  extract	
  information	
  from	
  files.	
  
Prerequisite(s):	
  BFOR	
  100	
  or	
  permission	
  of	
  instructor.	
  Offered	
  fall	
  semester	
  only.	
  	
  
	
  
BFOR	
  301	
  Computer	
  Forensics	
  I	
  (3)	
  
This	
   course	
   prepares	
   students	
   to	
   conduct	
   digital	
   forensic	
   examination	
   of	
   computers,	
   removable	
  
media	
   and	
   other	
   electronic	
   devices.	
   Students	
   will	
   use	
   digital	
   forensics	
   tools	
   and	
   techniques	
   to	
  
analyze	
  digital	
  evidence	
  pursuant	
  to	
  an	
  investigation,	
  while	
  utilizing	
  industry	
  standards	
  and	
  best	
  
practices.	
   This	
   course	
   will	
   prepare	
   student	
   in	
   the	
   development	
   and	
   implementation	
   of	
   forensic	
  
incident	
   response	
   plans,	
   policies	
   and	
   procedures.	
   Students	
   will	
   engage	
   in	
   oral	
   and	
   written	
  
reporting	
  outlining	
  digital	
  forensic	
  analysis	
  findings	
  and	
  conclusions,	
  in	
  a	
  professionally	
  acceptable	
  
manner,	
  pursuant	
  to	
  administrative,	
  civil	
  and	
  criminal	
  legal	
  proceedings.	
  
Prerequisite(s):	
  BFOR	
  201	
  or	
  permission	
  of	
  instructor.	
  Offered	
  fall	
  semester	
  only.	
  
	
  
BFOR	
  302	
  eDiscovery	
  Forensics	
  (3)	
  
This	
   course	
   prepares	
   student	
   for	
   the	
   electronic	
   collection,	
   preservation	
   and	
   management	
   of	
  
corporate	
   information.	
   It	
   provides	
   a	
   foundation	
   on	
   basic	
   corporate	
   incident	
   response	
   challenges	
  
and	
   proper	
   collection	
   methods	
   for	
   electronic	
   data	
   subject	
   to	
   legal	
   and	
   regulatory	
   requirements.	
  
Student	
  will	
  utilize	
  forensics	
  tools	
  for	
  searching,	
  culling	
  and	
  presenting	
  corporate	
  data,	
  pursuant	
  to	
  
administrative	
  and	
  civil	
  eDiscovery	
  cases.	
  Offered	
  fall	
  semester	
  only.	
  	
  
	
  
BFOR	
  303	
  Computer	
  Forensics	
  II	
  (3)	
  
This	
   course	
   prepares	
   students	
   to	
   conduct	
   a	
   digital	
   forensic	
   examination	
   and	
   analysis	
   involving	
  
complex	
  cases,	
  electronic	
  devices	
  and	
  data,	
  as	
  well	
  as	
  other	
  forensic	
  processes	
  utilized	
  to	
  ensure	
  
government	
  and	
  corporate	
  continuity.	
  This	
  course	
  will	
  prepare	
  student	
  to	
  develop	
  and	
  implement	
  
policies	
   and	
   procedures	
   for	
   computer	
   forensic	
   laboratories	
   involving	
   operations	
   and	
   quality	
  
control	
  management.	
  It	
  prepares	
  students	
  to	
  compose	
  and	
  present	
  oral	
  and	
  written	
  reports	
  that	
  
include	
  laboratory	
  audits,	
  forensic	
  analysis	
  findings	
  and	
  court	
  presentation	
  material.	
  	
  
Prerequisite(s):	
  BFOR	
  301	
  or	
  permission	
  of	
  instructor.	
  Offered	
  spring	
  semester	
  only.	
  
	
  
BFOR	
  304	
  Network	
  and	
  Mobile	
  Forensics	
  (3)	
  
This	
   course	
   exposes	
   students	
   to	
   procedures	
   for	
   conducting	
   live	
   network	
   forensics	
   of	
   computer	
  
system	
   components	
   and	
   data.	
   It	
   prepares	
   students	
   to	
   collect,	
   preserve,	
   and	
   examines	
   networks,	
  
computers,	
  mobile	
  devices	
  and	
  relevant	
  data	
  that	
  may	
  be	
  critical	
  to	
  an	
  investigation.	
  Students	
  will	
  
develop	
  network	
  incident	
  response	
  plans,	
  policies	
  and	
  procedures	
  relevant	
  to	
  corporate	
  networks	
  
and	
   data,	
   as	
   well	
   as	
   mobile	
   corporate	
   assets,	
   such	
   as	
   mobile	
   devices.	
   It	
   prepares	
   students	
   to	
  
compose	
   and	
   present	
   oral	
   and	
   written	
   reports	
   that	
   outline	
   network	
   and	
   mobile	
   device	
   forensic	
  
analysis	
  findings	
  that	
  are	
  technically	
  and	
  legally	
  acceptable	
  in	
  administrative	
  hearings	
  and	
  court	
  
proceedings.	
  Prerequisite(s):	
  BFOR	
  203	
  &	
  BFOR	
  301.	
  Offered	
  spring	
  semester	
  only.	
  
	
  
BFOR	
  401W	
  Advanced	
  Digital	
  Forensics	
  (4)	
  
Instructor	
  will	
  guide	
  students	
  through	
  proficiency	
  testing	
  by	
  utilizing	
  digital	
  forensic	
  skills	
  obtained	
  
in	
   previous	
   coursework	
   to	
   develop	
   an	
   incident	
   response	
   plan	
   to	
   guide	
   a	
   forensic	
   investigation.	
  
Based	
  on	
  case-­‐study	
  scenario,	
  student	
  will	
  also	
  conduct	
  forensic	
  analysis	
  of	
  several	
  items	
  of	
  digital	
  
evidence,	
  preparing	
  comprehensive	
  written	
  forensic	
  laboratory	
  reports	
  and	
  present	
  findings	
  to	
  a	
  
panel	
   of	
   legal,	
   forensics	
   and	
   management	
   subject	
   matter	
   experts	
   for	
   constructive	
   feedback.	
  
Students	
  will	
  also	
  prepare	
  exhibits	
  and	
  other	
  materials	
  for	
  court	
  presentation	
  purposes	
  based	
  on	
  
the	
  case-­‐study	
  scenario,	
  forensic	
  analysis	
  findings	
  and	
  written	
  laboratory	
  reports.	
  Instructor	
  will	
  
conduct	
  quality	
  control	
  assessments	
  to	
  ensure	
  students	
  are	
  performing	
  forensic	
  analysis	
  that	
  is	
  in	
  
compliance	
   with	
   industry	
   standards	
   guiding	
   forensic	
   and	
   laboratory	
   work	
   environments	
  
Prerequisite(s):	
  BFOR	
  302,	
  BFOR	
  303,	
  and	
  BFOR	
  304.	
  Offered	
  fall	
  semester	
  only.	
  
	
  	
  
	
  
	
  
26	
  
	
  
BFOR	
  402	
  Digital	
  Forensics	
  Moot	
  Court	
  (4)	
  
This	
  is	
  a	
  capstone	
  course	
  where	
  students	
  will	
  learn	
  how	
  to	
  provide	
  expert	
  testimony	
  as	
  a	
  part	
  of	
  
presenting	
  their	
  findings	
  from	
  completion	
  of	
  an	
  advanced	
  level	
  digital	
  forensic	
  analysis.	
  Students	
  
will	
   learn	
   how	
   to	
   prepare	
   for	
   and	
   give	
   expert	
   witness	
   testimony	
   related	
   to	
   digital	
   evidence,	
  
including	
  how	
  to	
  deal	
  with	
  opposing	
  counsel	
  cross-­‐examinations	
  and	
  how	
  to	
  effectively	
  relay	
  such	
  
information	
  to	
  a	
  jury.	
  Students	
  will	
  engage	
  in	
  a	
  “mock”	
  court	
  grand	
  jury,	
  suppression	
  hearing,	
  and	
  
trial	
  proceedings.	
  Panel	
  of	
  subject	
  matter	
  experts	
  from	
  the	
  legal,	
  forensic	
  and	
  management	
  fields	
  
will	
   assist	
   in	
   the	
   guidance	
   and	
   constructive	
   feedback	
   of	
   students	
   participating	
   in	
   “mock”	
   court	
  
proceedings.	
  Instructor	
  will	
  assess	
  student’s	
  competence	
  in	
  providing	
  a	
  technical	
  testimony	
  to	
  a	
  
group	
   of	
   non-­‐technical	
   listeners,	
   such	
   as	
   judges,	
   juries,	
   as	
   well	
   as	
   administrative	
   and	
   human	
  
resource	
  officers.	
  Prerequisite(s):	
  BFOR	
  302,	
  BFOR	
  303,	
  BFOR	
  304	
  and	
  BFOR	
  401W	
  (BFOR	
  401W	
  
may	
  be	
  taken	
  concurrently).	
  Offered	
  spring	
  semester	
  only.	
  
	
  
BITM	
  215	
  Information	
  Technologies	
  for	
  Business	
  (3)	
  
This	
  course	
  focuses	
  on	
  the	
  role	
  of	
  information	
  systems	
  in	
  solving	
  business	
  problems.	
  The	
  topics	
  will	
  
include	
   software	
   applications,	
   information	
   security,	
   e-­‐commerce	
   and	
   cyber-­‐ethics.	
   Students	
   will	
  
develop	
  business-­‐oriented	
  applications	
  using	
  Microsoft	
  Excel	
  (comprehensive	
  level)	
  and	
  Microsoft	
  
Access	
  (introductory	
  level).	
  There	
  will	
  be	
  two	
  end-­‐of-­‐semester	
  projects	
  that	
  involve	
  developing	
  a	
  
business	
  application	
  by	
  interfacing	
  Excel,	
  Access	
  and	
  Word.	
  Students	
  may	
  take	
  both	
  BITM	
  215	
  and	
  
ICSI	
  101	
  for	
  credit.	
  Not	
  open	
  to	
  freshmen.	
  Offered	
  fall	
  and	
  spring	
  semesters.	
  
	
  
RCRJ	
  201	
  Introduction	
  to	
  the	
  Criminal	
  Justice	
  Process	
  (3)	
  
Analysis	
  of	
  the	
  decisions	
  made	
  in	
  the	
  process	
  whereby	
  citizens	
  become	
  suspects,	
  suspects	
  become	
  
defendants,	
  some	
  defendants	
  are	
  convicted	
  and	
  in	
  turn	
  become	
  probationers,	
  inmates	
  and	
  parolees.	
  
Analysis	
   of	
   operational	
   practices	
   at	
   the	
   major	
   criminal	
   justice	
   decision	
   stages.	
   Analysis	
   of	
  
innovative	
   programs	
   and	
   the	
   dilemmas	
   of	
   change	
   in	
   policing,	
   diversion,	
   court	
   administration,	
  
sentencing,	
  and	
  community	
  correctional	
  programs.	
  
	
  
TCRJ	
  201	
  Introduction	
  to	
  the	
  Criminal	
  Justice	
  Process	
  (3)	
  
TCRJ	
  201	
  is	
  the	
  Honors	
  College	
  version	
  of	
  RCRJ	
  201;	
  only	
  one	
  version	
  may	
  be	
  taken	
  for	
  credit.	
  Open	
  
to	
  Honors	
  College	
  students	
  only.	
  
	
  
RCRJ	
  202	
  Introduction	
  to	
  Law	
  and	
  Criminal	
  Justice	
  (4)	
  
Students	
   will	
   study	
   judicial	
   decisions	
   involving	
   constitutional	
   and	
   other	
   legal	
   issues	
   relevant	
   to	
  
criminal	
  justice,	
  including	
  the	
  government’s	
  power	
  to	
  define	
  conduct	
  as	
  criminal,	
  procedural	
  rights,	
  
defenses,	
  the	
  rights	
  of	
  juveniles,	
  and	
  punishment.	
  In	
  addition	
  to	
  class	
  meetings,	
  students	
  will	
  enroll	
  
in	
  a	
  discussion	
  section	
  where	
  they	
  will	
  engage	
  in	
  legal	
  writing	
  and	
  moot	
  court	
  exercises.	
  	
  
	
  
RCRJ	
  203	
  (=	
  ASOC	
  203)	
  Criminology	
  (3)	
  
Introduction	
   to	
   the	
   study	
   of	
   crime,	
   including	
   the	
   development	
   of	
   criminal	
   law,	
   the	
   relationship	
  
between	
  crime	
  and	
  social	
  structure,	
  and	
  the	
  individual	
  and	
  social	
  causes	
  of	
  crime.	
  Only	
  one	
  of	
  ASOC	
  
203;	
  ASOC	
  381;	
  or	
  RCRJ	
  203	
  can	
  be	
  taken	
  for	
  credit.	
  Prerequisite(s):	
  ASOC	
  115.	
  
	
  
RCRJ	
  281	
  Introduction	
  to	
  Statistics	
  in	
  Criminal	
  Justice	
  (3)	
  
Provides	
  an	
  introduction	
  to	
  statistical	
  methods	
  useful	
  for	
  analyzing	
  the	
  types	
  of	
  data	
  most	
  often	
  
encountered	
   in	
   criminal	
   justice	
   research,	
   and	
   it	
   is	
   intended	
   primarily	
   for	
   criminal	
   justice	
  
undergraduates.	
  The	
  course	
  has	
  a	
  “practitioner”	
  orientation,	
  emphasizing	
  how	
  to	
  understand	
  and	
  
use	
  statistics	
  rather	
  than	
  how	
  to	
  create	
  them.	
  A	
  variety	
  of	
  widely	
  used	
  statistical	
  methods	
  will	
  be	
  
considered,	
   including	
   descriptive	
   statistics,	
   correlation	
   and	
   regression,	
   hypothesis	
   testing	
  
	
  	
  
	
  
	
  
27	
  
(inferential	
  statistics),	
  and	
  contingency	
  tables.	
  A	
  working	
  knowledge	
  of	
  high	
  school	
  algebra	
  will	
  be	
  
assumed.	
  May	
  not	
  be	
  taken	
  for	
  credit	
  by	
  students	
  with	
  credit	
  for	
  ASOC	
  221.	
  
	
  
	
  	
  
	
  
	
  
28	
  
APPENDIX	
  VI.2	
  UNDERGRADUATE	
  “DIGITAL	
  FORENSICS”	
  AT	
  OTHER	
  INSTITUTIONS	
  
	
  
Often	
  times,	
  digital	
  forensics	
  is	
  combined	
  in	
  majors	
  for	
  computer	
  security	
  with	
  an	
  addition	
  of	
  one	
  to	
  
two	
   courses	
   in	
   B.S.	
   degrees	
   available	
   in	
   the	
   United	
   States;	
   however,	
   four-­‐year	
   undergraduate	
  
degrees	
   specifically	
   in	
   computer	
   or	
   digital	
   forensics	
   with	
   more	
   than	
   three	
   courses	
   in	
   digital	
  
forensics	
  are	
  fairly	
  rare,	
  especially	
  among	
  public	
  universities.	
  These	
  are:	
  	
  
	
  
Private	
  Universities	
  &	
  Colleges	
  
• 
The	
  University	
  of	
  Advancing	
  Technology,	
  Arizona	
  (B.S.	
  Technology	
  Forensics15),	
  	
  
• 
Westwood	
  College,	
  California/Virginia	
  (B.A.	
  Computer	
  Forensics16)	
  
• 
American	
  InterContinental	
  University,	
  Illinois	
  (B.I.T.	
  Specialization	
  in	
  Digital	
  Forensics17)	
  
• 
International	
  Academy	
  of	
  Design	
  &	
  Technology,	
  Illinois	
  (B.S.	
  Computer	
  Forensics18)	
  
• 
St.	
  Ambrose	
  University,	
  Iowa	
  (B.A.	
  Computer	
  Investigations	
  and	
  Criminal	
  Justice19)	
  	
  
• 
Defiance	
  College,	
  Ohio	
  (B.S.	
  Digital	
  Forensic	
  Science20)	
  
• 
Bloomsberg	
  University	
  of	
  Pennsylvania,	
  Pennsylvania	
  (B.S.	
  Digital	
  Forensics21)	
  
• 
Robert	
  Morris	
  University,	
  Pennsylvania	
  (B.S.	
  Cyber	
  Forensics	
  and	
  Information	
  Security22)	
  
• 
Champlain	
  College,	
  Vermont	
  (B.S.	
  Computer	
  &	
  Digital	
  Forensics23,	
  B.S.	
  Computer	
  and	
  Digital	
  
Investigations24	
  (online))	
  
	
  
Public	
  Universities	
  &	
  Colleges	
  
• 
University	
  of	
  Michigan	
  -­‐	
  Dearborn,	
  Michigan	
  (B.S.	
  Digital	
  Forensics25)	
  
• 
Metropolitan	
  State	
  University,	
  Minnesota	
  (B.A.S.	
  Computer	
  Forensics26)	
  	
  
	
  
While	
   New	
   York	
   and	
   SUNY	
   universities	
   and	
   colleges	
   do	
   not	
   offer	
   a	
   four-­‐year	
   digital	
   forensics	
  
degree,	
  we	
  will	
  list	
  courses	
  available	
  in	
  digital	
  forensics	
  in	
  SUNY	
  institutions	
  of	
  higher	
  learning	
  that	
  
offer	
  four-­‐year	
  degrees.	
  	
  
	
  
	
  
	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
15	
  http://majors.uat.edu/Tech-­‐Forensics/	
  
16	
  http://www.westwood.edu/programs/school-­‐of-­‐technology/computer-­‐forensics-­‐degree	
  
17 	
  http://www.aiuniv.edu/Degree-­‐Programs/Bachelor-­‐of-­‐Information-­‐Technology-­‐Specialization-­‐in-­‐Digital-­‐
Investigations	
  
18
http://www.aiuniv.edu/Degree-­‐Programs/Bachelor-­‐of-­‐Information-­‐Technology-­‐Specialization-­‐in-­‐Digital-­‐
Investigations	
  
19
	
  
http://www.sau.edu/academic_programs/computer_and_information_sciences/degrees_and_programs/com
puter_investigations_and_criminal_justice.html	
  
20	
  http://www.defiance.edu/pages/study_plans/cf_study_plans_even.pdf	
  
21	
  http://www.bloomu.edu/catalog/current/cost/mat_forensics_bs.php	
  
22
	
  
http://www.rmu.edu/OnTheMove/wpmajdegr.show_checksheet?icalledby=WPMAJDEGR&ipage=1195&it=&
iattr=M&icksht=2012UFR	
  
23	
  http://www.champlain.edu/computer-­‐forensics/computer-­‐and-­‐digital-­‐forensics-­‐major/curriculum	
  
24	
  http://www.champlain.edu/cyber-­‐security/online-­‐computer-­‐forensics-­‐digital-­‐investigation-­‐degree	
  
25	
  http://www.engin.umd.umich.edu/CIS/data/programs/Curr%20DFOR%20Fall%202012.pdf	
  
26	
  http://www.metrostate.edu/msweb/explore/cas/departments/csci/computer_forensics/index.html	
  
	
  	
  
	
  
	
  
29	
  
VI.2.1.	
  BINGHAMTON	
  UNIVERSITY,	
  SUNY	
  
	
  
MIS	
  450	
  Security	
  and	
  Forensics	
  (3)	
  
The	
  first	
  part	
  of	
  the	
  course	
  covers	
  description	
  of	
  different	
  security	
  technologies	
  including	
  firewalls,	
  
intrusion	
   detection,	
   and	
   cryptography	
   and	
   identification	
   of	
   potential	
   threats	
   such	
   as	
   malicious	
  
software,	
   social	
   engineering,	
   spoofing,	
   and	
   phishing.	
   Students	
   will	
   also	
   learn	
   about	
   managerial	
  
aspects	
   including	
   information	
   security	
   policies,	
   security	
   management	
   models	
   and	
   practices,	
   and	
  
risk	
  management.	
  The	
  second	
  part	
  of	
  the	
  course	
  covers	
  technical	
  and	
  legal	
  aspects	
  of	
  conducting	
  
computer	
   forensic	
   analysis	
   and	
   investigation.	
   Topics	
   include	
   requirements	
   of	
   processing	
   crime	
  
scenes,	
   investigation	
   of	
   digital	
   evidence	
   (computers,	
   laptops,	
   etc.),	
   network	
   forensics,	
   e-­‐mail	
  
investigation,	
  report	
  writing,	
  and	
  expert	
  testimony	
  in	
  high-­‐tech	
  investigations.	
  
	
  
EECE	
  660	
  Seminar	
  in	
  Digital	
  Forensics	
  (3)	
  
Topics	
  include	
  determining	
  the	
  origin	
  of	
  digital	
  media,	
  sensor	
  device-­‐metrics,	
  forensic	
  steganalysis,	
  
recovery	
   of	
   processing	
   history	
   of	
   digital	
   media.	
   Format:	
   lectures,	
   self-­‐study,	
   class	
   discussions,	
  
independent	
  research	
  work.	
  Prerequisites:	
  Probability	
  and	
  statistics,	
  familiarity	
  with	
  either	
  Matlab,	
  
C,	
  or	
  Java.	
  
VI.2.2	
   UNIVERSITY	
  AT	
  BUFFALO,	
  SUNY	
  
	
  
MGS	
  410	
  Digital	
  Forensics	
  (3)	
  
An	
   introduction	
   to	
   digital	
   forensics.	
   Students	
   will	
   acquire,	
   authenticate,	
   and	
   analyze	
   digital	
  
evidence.	
   We	
   will	
   explore	
   technical	
   and	
   managerial	
   topics,	
   and	
   provide	
   students	
   with	
   both	
  
theoretical	
  and	
  practical	
  hands-­‐on	
  experience	
  using	
  forensic	
  equipment	
  and	
  software.	
  	
  
VI.2.3	
   EMPIRE	
  STATE	
  COLLEGE	
  
SMT	
  273614	
  Cyber	
  Crime	
  and	
  Computer	
  Forensics	
  (4)	
  
Computer	
  forensics	
  is	
  one	
  of	
  the	
  fastest	
  growing	
  areas	
  in	
  computer	
  security	
  and	
  law	
  enforcement.	
  
Virtually	
  every	
  criminal	
  investigation	
  requires	
  that	
  any	
  computer	
  related	
  to	
  the	
  investigation	
  is	
  
seized	
  and	
  searched.	
  Studies	
  have	
  shown	
  that	
  about	
  90	
  percent	
  of	
  human	
  recording	
  of	
  words,	
  
images,	
  sounds,	
  etc.	
  is	
  in	
  digital	
  format,	
  making	
  computer	
  storage	
  a	
  gold	
  mine	
  for	
  investigators.	
  The	
  
expertise	
  for	
  conducting	
  investigations	
  requires	
  knowledge	
  ranging	
  from	
  disk	
  structure,	
  file	
  
formats,	
  commercial	
  software	
  to	
  investigation	
  techniques	
  and	
  expert	
  testimony.	
  This	
  course	
  will	
  
provide	
  an	
  introduction	
  to	
  the	
  field.	
  Note:	
  Students	
  must	
  have	
  the	
  ability	
  to	
  work	
  at	
  the	
  upper-­‐
level;	
  students	
  must	
  have	
  the	
  ability	
  to	
  install	
  software	
  and	
  a	
  computer	
  on	
  which	
  they	
  can	
  install	
  
required	
  software.	
  It	
  is	
  recommended,	
  but	
  not	
  required,	
  that	
  students	
  have	
  familiarity	
  with	
  criminal	
  
investigations,	
  trial	
  procedure	
  and	
  the	
  legal	
  system,	
  such	
  as	
  that	
  gained	
  in	
  law	
  enforcement	
  or	
  from	
  
a	
  course	
  such	
  as	
  Introduction	
  to	
  Law	
  and	
  the	
  Legal	
  System	
  or	
  Introduction	
  to	
  Criminal	
  Justice.	
  
V1.2.4	
  FARMINGDALE	
  STATE	
  COLLEGE	
  
	
  
CRJ	
  115	
  Computer	
  Forensics	
  (3)	
  
This	
  course	
  is	
  an	
  orientation	
  to	
  the	
  study	
  of	
  computer	
  forensic	
  methods.	
  The	
  course	
  will	
  include	
  an	
  
analysis	
   of	
   computer	
   hardware	
   that	
   is	
   utilized	
   in	
   forensic	
   investigations	
   such	
   as	
   motherboards,	
  
BIOS	
   settings,	
   hard	
   and	
   floppy	
   disk	
   drives	
   and	
   controllers,	
   SCSI	
   controllers	
   and	
   drives	
   and	
  
implementations,	
  RAID	
  controllers,	
  boot	
  sequences	
  and	
  related	
  components.	
  Also,	
  this	
  course	
  will	
  
introduce	
   the	
   student	
   to	
   methods	
   used	
   in	
   analyzing	
   data	
   storage	
   devices	
   and	
   will	
   include	
   an	
  
examination	
  of	
  the	
  physical	
  structures,	
  surfaces	
  and	
  formats	
  of	
  hard	
  disks	
  and	
  other	
  media.	
  
	
  
	
  	
  
	
  
	
  
30	
  
CRJ	
  217	
  Computer	
  Forensics	
  II	
  (3)	
  
Computer	
  Forensics	
  II	
  is	
  a	
  continuation	
  of	
  CRJ	
  115.	
  This	
  course	
  covers	
  topics	
  such	
  as	
  disk	
  geometry	
  
and	
   organization.	
   Master	
   boot	
   sector	
   record	
   and	
   volume	
   record	
   creation	
   and	
   organization,	
   file	
  
signatures	
   for	
   data	
   type	
   identification,	
   cyclic	
   redundancy	
   checksum	
   for	
   data	
   integrity	
   validation,	
  
and	
   RSA's	
   MD5	
   hash	
   values	
   for	
   file	
   authentication.	
   Other	
   subjects	
   introduced	
   include	
   the	
   UNIX	
  
"grep"	
  search	
  utility,	
  search	
  string	
  techniques	
  and	
  file	
  signature	
  matching,	
  and	
  recovery	
  of	
  files	
  that	
  
are	
   intentionally	
   deleted,	
   hidden,	
   or	
   renamed.	
   The	
   course	
   examines	
   advanced	
   computer-­‐based	
  
evidentiary	
   and	
   "discovery"	
   data	
   methodologies,	
   and	
   includes	
   a	
   study	
   of	
   evidence	
   identification,	
  
documentation,	
  and	
  chain	
  of	
  custody	
  procedures.  
	
  
CRJ	
  218	
  -­‐	
  Computer	
  Forensics	
  III	
  (3)	
  
This	
  course	
  examines	
  federal,	
  state,	
  and	
  local	
  computer	
  fraud	
  statutes	
  to	
  provide	
  the	
  student	
  with	
  a	
  
legal	
  foundation	
  to	
  approach	
  computer	
  investigations.	
  The	
  course	
  includes	
  lecture	
  elements	
  that	
  
provide	
  the	
  student	
  with	
  the	
  skills	
  necessary	
  to	
  conduct	
  successful	
  computer-­‐related	
  investigations,	
  
and	
   includes	
   an	
   examination	
   of	
   the	
   processes	
   involved	
   in	
   preparing	
   an	
   affidavit	
   for	
   a	
   search	
  
warrant. 
VI.2.5	
  ALFRED	
  STATE	
  UNIVERSITY	
  	
  
CISY	
  7023	
  Computer	
  Forensics	
  and	
  Legal	
  Issues	
  (3)	
  
This	
  course	
  will	
  provide	
  a	
  practical,	
  hands-­‐on	
  approach	
  to	
  the	
  process	
  of	
  scientifically	
  retrieving,	
  
examining	
  and	
  analyzing	
  data	
  from	
  computer	
  storage	
  media	
  so	
  that	
  data	
  can	
  be	
  used	
  as	
  evidence	
  in	
  
court.	
   The	
   course	
   assumes	
   a	
   prerequisite	
   knowledge	
   of	
   network	
   operating	
   systems	
   and	
   security	
  
concepts.	
  A	
  final	
  project	
  will	
  be	
  required.	
  
VI.2.6	
  SUNY	
  INSTITUTE	
  FOR	
  TECHNOLOGY	
  (SUNYIT)	
  
	
  
NCS	
  435	
  Computer	
  Forensics	
  (4)	
  
Introduction	
  into	
  the	
  field	
  of	
  computer	
  forensics	
  in	
  networked	
  systems.	
  	
  The	
  student	
  will	
  receive	
  
training	
   in	
   the	
   methods,	
   techniques	
   and	
   tools	
   used	
   by	
   those	
   practicing	
   computer	
   forensics	
   in	
  
support	
  of	
  audit,	
  security	
  privacy	
  and	
  legal	
  functions.	
  Specific	
  legal	
  issues	
  regarding	
  seizure	
  and	
  
chain	
   of	
   custody	
   will	
   be	
   addressed.	
   Students	
   will	
   have	
   opportunity	
   to	
   learn	
   computer	
   forensics	
  
applications,	
  methods	
  and	
  procedures	
  through	
  hands-­‐on	
  lab	
  activities.	
  Prerequisites:	
  NCS	
  210,	
  NCS	
  
315,	
  NCS	
  320.	
  
	
  
	
  
	
  	
  
	
  
	
  
31	
  
APPENDIX	
  VI.3	
  INCORPORATING	
  ACADEMIC	
  COMPETENCIES	
  INTO	
  MAJOR	
  
	
  
• 
Competency:	
  Advanced	
  Writing	
  in	
  the	
  Major	
  
• 
Competency:	
  Critical	
  Thinking	
  
• 
Competency:	
  Oral	
  Discourse	
  
• 
Competency:	
  Information	
  Literacy	
  
	
  
	
  
Department:	
  Information	
  Technology	
  Management	
  
Date	
  Submitted:	
  9/9/13	
  
	
  
Major:	
  Digital	
  Forensics	
  
	
  
	
  
	
  
	
  
Department	
  Chair:	
  Sanjay	
  Goel	
  
	
  
Competency:	
  Advanced	
  Writing	
  in	
  the	
  Major	
  	
  
Educational	
  experiences	
  that	
  satisfy	
  the	
  Advanced	
  Writing	
  competency	
  in	
  the	
  major	
  will	
  provide	
  
students	
   with	
   sustained	
   practice	
   in	
   increasingly	
   sophisticated	
   writing,	
   in	
   a	
   variety	
   of	
   formats	
  
appropriate	
   to	
   the	
   discipline.	
   Faculty	
   will	
   guide	
   students	
   toward	
   writing	
   effectively	
   in	
   the	
  
discipline	
  by	
  providing	
  appropriate	
  evaluation	
  of	
  written	
  documents,	
  including	
  opportunities	
  to	
  
incorporate	
  feedback	
  and	
  progress	
  as	
  writers,	
  either	
  through	
  revision	
  or	
  subsequent	
  assignments.	
  
Students’	
   coursework	
   will	
   also	
   convey	
   knowledge	
   of	
   and	
   access	
   to	
   the	
   necessary	
   tools	
   and	
  
resources	
  for	
  writing	
  in	
  the	
  discipline.	
  
Part	
  1:	
  In	
  the	
  text	
  box	
  below,	
  briefly	
  describe	
  (in	
  about	
  one	
  paragraph),	
  and	
  in	
  language	
  suited	
  to	
  an	
  
audience	
   composed	
   of	
   colleagues	
   who	
   are	
   not	
   specialists	
   in	
   your	
   field,	
   what	
   it	
   means	
   to	
   be	
  
competent	
  in	
  advanced	
  writing	
  at	
  the	
  undergraduate	
  level	
  in	
  the	
  discipline(s)	
  appropriate	
  to	
  the	
  
major.	
  *The	
  text	
  boxes	
  in	
  this	
  form	
  will	
  expand	
  as	
  you	
  type.	
  	
  
Digital	
   forensics	
   specialists	
   prepare	
   written	
   reports	
   in	
   the	
   normal	
   course	
   of	
   business	
  
encompassing	
   several	
   categories	
   including	
   forensic	
   analysis	
   findings,	
   incident	
   response	
  
plans,	
   crime	
   scene	
   reports,	
   examination	
   plans,	
   and	
   investigation	
   reports.	
   Digital	
   forensics	
  
specialists	
   must	
   be	
   able	
   to	
   conduct	
   technically	
   proficient	
   analysis	
   of	
   data	
   and	
   convey	
   its	
  
results,	
   opinions,	
   and	
   conclusions	
   to	
   readers	
   who	
   may	
   not	
   be	
   technically	
   proficient	
   (e.g.	
  
clients,	
  managers,	
  attorneys,	
  judges	
  and	
  jurors).	
  Such	
  reports	
  are	
  considered	
  as	
  permanent	
  
records	
   of	
   a	
   forensic	
   specialist	
   actions	
   and	
   findings	
   that	
   subsequently	
   may	
   lead	
   to	
   oral	
  
testimony	
  in	
  legal	
  court	
  proceedings.	
  These	
  forensic	
  reports	
  must	
  convey	
  the	
  professionalism	
  
and	
   competence	
   of	
   the	
   writer,	
   while	
   effectively	
   communicating	
   highly	
   technical	
   topics	
   to	
  
non-­‐technical	
   decision	
   makers	
   and	
   stakeholders.	
   Students	
   will	
   communicate	
   effectively	
  
through	
  the	
  composition	
  of	
  reports	
  and	
  forms	
  utilized	
  by	
  public	
  agencies	
  and	
  private	
  sector	
  
corporations	
   engaged	
   in	
   digital	
   forensics.	
   	
   Writing	
   competency	
   at	
   this	
   level	
   is	
   established	
  
through	
  the	
  ability	
  to	
  substantiate	
  claims	
  through	
  analysis	
  and	
  proper	
  attribution	
  of	
  sources,	
  
to	
   present	
   information	
   in	
   a	
   logical	
   order	
   and	
   manner	
   so	
   that	
   it	
   is	
   clearly	
   understood,	
   and	
  
critically	
  evaluate	
  writing	
  for	
  revision	
  based	
  on	
  personal	
  and	
  external	
  review.	
  
	
  
Part	
   2:	
   Please	
   briefly	
   describe	
   how	
   your	
   major	
   curriculum	
   meets	
   each	
   one	
   of	
   the	
   learning	
  
objectives	
  for	
  Advanced	
  Writing.	
  	
  Please	
  attach	
  a	
  description	
  of	
  major	
  requirements,	
  sample	
  syllabi,	
  
and	
  any	
  other	
  relevant	
  materials	
  as	
  appendices	
  to	
  this	
  document.	
  
	
  
Students	
   completing	
   educational	
   experiences	
   that	
   satisfy	
   the	
   Advanced	
   Writing	
   competency	
   as	
  
part	
  of	
  the	
  requirements	
  for	
  graduation	
  in	
  the	
  major	
  will:	
  
	
  	
  
	
  
	
  
32	
  
	
  
1. demonstrate	
  increasingly	
  sophisticated	
  writing	
  according	
  to	
  the	
  conventions	
  of	
  their	
  academic	
  
discipline;	
  
Students	
   will	
   be	
   engaged	
   in	
   writing	
   exercises	
   throughout	
   the	
   program	
   with	
   increasing	
  
complexity.	
   Students	
   will	
   begin	
   their	
   writing	
   in	
   BFOR	
   100	
   and	
   get	
   a	
   foundation	
   in	
   source	
  
attribution	
   and	
   general	
   academic	
   writing.	
   As	
   students	
   progress,	
   all	
   courses	
   that	
   include	
  
digital	
  forensics	
  analysis	
  will	
  involve	
  report	
  writing	
  starting	
  from	
  BFOR	
  301	
  and	
  culminating	
  
in	
  BFOR	
  401W	
  and	
  BFOR	
  402	
  where	
  students	
  will	
  develop	
  reports	
  based	
  on	
  analysis	
  and	
  
references	
   and	
   present	
   them	
   in	
   a	
   simulated	
   court	
   environment.	
   Students	
   will	
   be	
   able	
   to	
  
satisfactory	
   complete	
   standard	
   forms	
   and	
   reports	
   associated	
   with	
   digital	
   forensics	
   with	
  
increasing	
  complexity	
  and	
  types	
  of	
  reports	
  as	
  students	
  continue	
  through	
  the	
  program.	
  
	
  
2. be	
  able	
  to	
  communicate	
  clearly	
  in	
  writing,	
  employing	
  fundamental	
  rules	
  of	
  usage,	
  style,	
  and	
  
mechanics	
  in	
  the	
  context	
  of	
  their	
  discipline;	
  
Students	
   will	
   complete	
   assorted	
   types	
   of	
   reports	
   utilized	
   in	
   digital	
   forensics,	
   each	
   with	
  
specific	
   rules	
   of	
   usage,	
   style	
   and	
   mechanics.	
   Students	
   will	
   clearly	
   communicate	
   written	
  
forensic	
   findings,	
   opinions,	
   and	
   conclusions	
   associated	
   with	
   incident	
   response	
   plans,	
  
examination	
  plans,	
  investigation	
  reports	
  and	
  crime	
  scene	
  reports	
  and	
  analysis	
  reports.	
  
	
  
3. be	
  able	
  to	
  evaluate	
  critically	
  a	
  variety	
  of	
  appropriate	
  written	
  texts,	
  including	
  their	
  own;	
  
Students	
   will	
   be	
   guided	
   throughout	
   the	
   program	
   on	
   the	
   reporting	
   standards	
   and	
   legal	
  
requirements	
  involving	
  digital	
  forensics	
  standards.	
  Students’	
  reports	
  will	
  be	
  evaluated	
  based	
  
on	
   forensic	
   reporting	
   standards	
   associated	
   with	
   the	
   International	
   Standards	
   Organization,	
  
the	
  American	
  Society	
  of	
  Crime	
  Laboratory	
  Directors	
  (LAB)	
  and	
  the	
  Scientific	
  Working	
  Group	
  
on	
  Digital	
  Evidence.	
  These	
  reports	
  will	
  include	
  references	
  to	
  external	
  literature	
  that	
  students	
  
will	
  have	
  to	
  evaluate	
  and	
  use	
  to	
  provide	
  reference	
  to	
  any	
  claims.	
  In	
  addition,	
  reports	
  will	
  be	
  
reviewed	
   for	
   professionalism	
   including	
   style	
   and	
   mechanics.	
   The	
   importance	
   of	
   personal	
  
evaluation	
   and	
   introspection	
   of	
   writing	
   prior	
   to	
   submission	
   and	
   peer	
   review	
   will	
   be	
  
emphasized	
  to	
  the	
  students	
  in	
  the	
  program.	
  
	
  
4. demonstrate	
  the	
  ability	
  to	
  incorporate	
  critical	
  feedback	
  on	
  their	
  writing,	
  coming	
  to	
  
understand	
  that	
  revision	
  and	
  rewriting	
  are	
  an	
  integral	
  part	
  of	
  the	
  writing	
  process.	
  
Students	
   will	
   receive	
   both	
   oral	
   and	
   written	
   feedback	
   during	
   the	
   evaluation	
   and	
   revision	
  
process	
   of	
   forensic	
   reporting.	
   Additionally,	
   students	
   will	
   be	
   exposed	
   to	
   quality	
   control	
  
protocols	
   associated	
   with	
   digital	
   forensics	
   reporting	
   that	
   includes	
   self-­‐assessment,	
   peer	
  
review	
  and	
  forensic	
  publication	
  requirements.	
  Students	
  will	
  receive	
  feedback	
  from	
  subject	
  
matter	
  experts	
  that	
  may	
  include	
  forensic	
  practitioners,	
  attorneys	
  and	
  laboratory	
  managers.	
  
	
  
Competency:	
  Critical	
  Thinking	
  	
  
Critical	
   thinking	
   is	
   the	
   systematic	
   process	
   of	
   analyzing	
   and	
   evaluating	
   data,	
   hypotheses,	
  
arguments,	
   or	
   critiques.	
   It	
   is	
   an	
   essential	
   component	
   of	
   any	
   academic	
   major.	
   The	
   research,	
  
scholarship,	
  and	
  creative	
  activities	
  of	
  university	
  faculty	
  ensure	
  that	
  our	
  academic	
  disciplines	
  are	
  
constantly	
   evolving.	
   The	
   facts	
   and	
   theories	
   in	
   academic	
   disciplines	
   are	
   essential	
   knowledge	
   our	
  
students	
  must	
  learn,	
  but	
  it	
  is	
  mastery	
  of	
  critical	
  thinking	
  that	
  will	
  allow	
  for	
  lifelong	
  educational	
  
and	
  occupational	
  development,	
  and	
  facilitate	
  students’	
  functioning	
  as	
  engaged	
  citizens.	
  Students’	
  
coursework	
  in	
  the	
  major	
  will	
  cultivate	
  in	
  them	
  habits	
  of	
  critical	
  thinking,	
  as	
  they	
  learn	
  to	
  approach	
  
questions	
  and	
  problems	
  in	
  critical,	
  logical,	
  and	
  reflective	
  ways.	
  
	
  
	
  	
  
	
  
	
  
33	
  
Part	
  1:	
  In	
  the	
  text	
  box	
  below,	
  briefly	
  describe	
  (in	
  about	
  one	
  paragraph),	
  and	
  in	
  language	
  suited	
  to	
  an	
  
audience	
   composed	
   of	
   colleagues	
   who	
   are	
   not	
   specialists	
   in	
   your	
   field,	
   what	
   it	
   means	
   to	
   be	
  
competent	
   in	
   critical	
   thinking	
   at	
   the	
   undergraduate	
   level	
   in	
   the	
   discipline(s)	
   appropriate	
   to	
   the	
  
major.	
  *The	
  text	
  boxes	
  in	
  this	
  form	
  will	
  expand	
  as	
  you	
  type.	
  	
  
The	
   field	
   of	
   digital	
   forensics	
   exemplifies	
   critical	
   thinking;	
   it	
   includes	
   the	
   identification,	
  
collection,	
  preservation	
  and	
  examination	
  of	
  digital	
  evidence,	
  and	
  its	
  data.	
  In	
  addition,	
  digital	
  
forensics	
   specialists	
   need	
   to	
   analyze	
   and	
   evaluate	
   the	
   data	
   collected	
   for	
   the	
   purpose	
   of	
  
providing	
  evidentiary	
  support.	
  It	
  is	
  essential	
  that	
  digital	
  forensics	
  specialists	
  utilize	
  a	
  logical	
  
approach	
  to	
  data	
  analysis	
  that	
  ensures	
  completeness	
  and	
  relevance	
  to	
  the	
  client’s	
  demands.	
  
Digital	
   forensics	
   specialists	
   working	
   in	
   laboratory	
   environments	
   must	
   continue	
   to	
   develop	
  
professionally	
   through	
   the	
   use	
   of	
   reflective	
   methodology	
   commonly	
   utilized	
   in	
   such	
   work	
  
environments,	
   such	
   individual	
   self-­‐assessments,	
   quality	
   control	
   participation,	
   and	
   forensic	
  
peer	
   reviews	
   of	
   the	
   work	
   product.	
   In	
   all	
   digital	
   forensics	
   analysis	
   courses	
   (e.g.	
   BFOR	
   201,	
  
BFOR	
  202,	
  BFOR	
  304),	
  culminating	
  in	
  capstone	
  courses	
  BFOR	
  401W	
  and	
  BFOR	
  402,	
  students	
  
will	
   employ	
   a	
   critical	
   thinking	
   approach	
   in	
   all	
   casework,	
   since	
   digital	
   forensics	
   specialists	
  
must	
   remain	
   unbiased	
   and	
   impartial,	
   regardless	
   of	
   employer,	
   client	
   or	
   attorney	
   demands.	
  
Through	
   the	
   use	
   of	
   scenario-­‐based	
   case	
   studies	
   and	
   control	
   data,	
   students	
   will	
   gather,	
  
evaluate	
  and	
  assess	
  digital	
  evidence	
  (data),	
  applying	
  learned	
  concepts,	
  as	
  well	
  as	
  critical	
  and	
  
logical	
   thinking	
   in	
   order	
   to	
   achieve	
   solutions	
   that	
   meet	
   established	
   legal,	
   forensic	
   and	
  
professional	
  standards.	
  
	
  
	
  
Part	
   2:	
   Please	
   briefly	
   describe	
   how	
   your	
   major	
   curriculum	
   meets	
   each	
   one	
   of	
   the	
   learning	
  
objectives	
  for	
  Critical	
  Thinking.	
  Please	
  attach	
  a	
  description	
  of	
  major	
  requirements,	
  sample	
  syllabi,	
  
and	
  any	
  other	
  relevant	
  materials	
  as	
  appendices	
  to	
  this	
  document.	
  
Students	
  completing	
  educational	
  experiences	
  that	
  satisfy	
  the	
  Critical	
  Thinking	
  competency	
  as	
  part	
  
of	
  the	
  requirements	
  for	
  graduation	
  in	
  the	
  major	
  will:	
  
1. formulate	
  complex	
  questions,	
  problems,	
  and	
  hypotheses	
  clearly	
  and	
  precisely,	
  and	
  apply	
  
familiar	
  and	
  new	
  concepts	
  in	
  developing	
  solutions	
  and	
  conclusions;	
  
Students	
   will	
   be	
   exposed	
   to	
   case-­‐based	
   scenarios	
   developed	
   to	
   challenge	
   the	
   student	
   in	
  
developing	
   forensic	
   hypotheses	
   and	
   apply	
   learned	
   concepts	
   to	
   develop	
   solutions	
   and	
  
conclusions.	
  Students	
  will	
  utilize	
  forensic	
  tools	
  and	
  techniques	
  to	
  test	
  hypothesis	
  on	
  control	
  
data	
  to	
  achieve	
  acceptable	
  conclusions	
  to	
  case-­‐based	
  problems.	
  	
  
	
  
2.	
  gather	
  and	
  assess	
  relevant	
  information/data;	
  
Students	
  will	
  gather	
  relevant	
  data	
  (digital	
  evidence)	
  from	
  computers,	
  electronic	
  devices	
  and	
  
the	
   Internet	
   to	
   perform	
   analysis	
   related	
   to	
   coursework,	
   ultimately	
   leading	
   to	
   forensic	
  
casework	
  in	
  a	
  work	
  environment.	
  Students	
  will	
  utilize	
  assorted	
  hardware	
  and	
  software	
  to	
  
forensically	
  gather,	
  assess,	
  and	
  analyze	
  digital	
  evidence	
  (data).	
  
	
  
3.	
  test	
  hypotheses	
  against	
  relevant	
  criteria	
  and	
  standards,	
  accounting	
  for	
  the	
  facts;	
  
Students	
   will	
   conduct	
   data	
   analysis	
   of	
   a	
   limited	
   scope	
   derived	
   from	
   search	
   parameters	
  
established	
  by	
  legal	
  standards.	
  Students	
  will	
  perform	
  analysis	
  based	
  an	
  overview	
  of	
  the	
  facts	
  
of	
   	
   an	
   incident	
   or	
   crime	
   and	
   test	
   hypotheses	
   of	
   where	
   evidence	
   artifacts	
   might	
   be	
   found,	
  
ultimately	
  using	
  forensic	
  criteria	
  and	
  standards	
  to	
  either	
  confirm	
  the	
  presence	
  or	
  absence	
  of	
  
relevant	
  data	
  (evidence).	
  
	
  
	
  	
  
	
  
	
  
34	
  
4.	
  develop	
  well-­‐reasoned	
  arguments	
  and	
  communicate	
  them	
  effectively	
  to	
  others;	
  
Students	
  will	
  develop	
  discussions	
  and	
  arguments	
  regarding	
  analysis	
  opinions	
  and	
  engage	
  in	
  
written	
  and	
  verbal	
  communications	
  with	
  clients,	
  corporate	
  managers,	
  attorneys,	
  judges	
  and	
  
jurors.	
  Students	
  will	
  be	
  engaged	
  in	
  individual	
  presentations	
  throughout	
  the	
  Digital	
  Forensics	
  
program,	
  ultimately	
  leading	
  to	
  moot	
  court	
  testimony	
  (BFOR	
  402).	
  
	
  
5.	
  demonstrate	
  habits	
  of	
  reflection	
  upon	
  their	
  own	
  and	
  others’	
  thinking—identifying,	
  analyzing,	
  
and	
  evaluating	
  their	
  own	
  and	
  others’	
  arguments;	
  and	
  challenging	
  conclusions	
  with	
  alternative	
  
explanations	
  or	
  points	
  of	
  view.	
  
Discussions	
   and	
   arguments	
   will	
   occur	
   in	
   formal	
   presentations	
   and	
   informal	
   discussions	
  
throughout	
  the	
  courses	
  in	
  the	
  digital	
  forensics	
  program.	
  The	
  main	
  course	
  where	
  reflection	
  on	
  
their	
  own	
  and	
  others’	
  arguments	
  is	
  a	
  large	
  part	
  of	
  the	
  curriculum	
  is	
  the	
  BFOR	
  402	
  course;	
  
students	
  will	
  have	
  to	
  present	
  evidence	
  based	
  on	
  analysis	
  results	
  and	
  observe	
  how	
  their	
  own	
  
and	
   their	
   peers’	
   testimony	
   is	
   received	
   in	
   terms	
   of	
   effectiveness	
   and	
   clarity.	
   Students	
   will	
  
observe	
  how	
  different	
  arguments	
  can	
  be	
  made	
  for	
  the	
  same	
  piece	
  of	
  evidence	
  and	
  the	
  need	
  
for	
  being	
  able	
  to	
  determine	
  what	
  results	
  and	
  analysis	
  are	
  necessary	
  and	
  relevant	
  to	
  a	
  case.	
  
	
  
Competency:	
  Oral	
  Discourse	
  	
  
Oral	
  discourse	
  provides	
  opportunities	
  for	
  students	
  to	
  develop	
  the	
  oral	
  communication	
  skills	
  they	
  
need	
   to	
   participate	
   more	
   effectively	
   in	
   public	
   and	
   academic	
   debates	
   and	
   discussions.	
   Each	
  
academic	
  major	
  will	
  offer	
  opportunities	
  for	
  students	
  to	
  participate	
  in	
  a	
  variety	
  of	
  communication	
  
contexts	
   appropriate	
   to	
   the	
   discipline,	
   and	
   to	
   reflect	
   on	
   the	
   principles	
   and	
   theories	
   relevant	
   to	
  
specific	
  oral	
  communication	
  activities.	
  	
  	
  
Part	
  1:	
  In	
  the	
  text	
  box	
  below,	
  briefly	
  describe	
  (in	
  about	
  one	
  paragraph),	
  and	
  in	
  language	
  suited	
  to	
  an	
  
audience	
   composed	
   of	
   colleagues	
   who	
   are	
   not	
   specialists	
   in	
   your	
   field,	
   what	
   it	
   means	
   to	
   be	
  
competent	
   in	
   oral	
   discourse	
   at	
   the	
   undergraduate	
   level	
   in	
   the	
   discipline(s)	
   appropriate	
   to	
   the	
  
major.	
  *The	
  text	
  boxes	
  in	
  this	
  form	
  will	
  expand	
  as	
  you	
  type.	
  	
  
As	
   subject	
   matter	
   experts,	
   digital	
   forensics	
   specialists	
   normally	
   engage	
   in	
   public	
   speaking	
  
forums,	
   including	
   presentations	
   to	
   clients,	
   corporate	
   managers,	
   and	
   community	
   venues.	
  
Forensic	
   specialists	
   must	
   be	
   competent	
   in	
   verbally	
   communicating	
   highly	
   technical	
  
information	
   to	
   groups	
   of	
   individuals	
   that	
   do	
   not	
   possess	
   such	
   technical	
   knowledge.	
  
Specialists	
   must	
   also	
   frequently	
   engage	
   in	
   constructive	
   debates	
   or	
   discussions	
   when	
  
performing	
   forensic	
   peer	
   reviews,	
   as	
   well	
   as	
   actively	
   participate	
   in	
   providing	
   direct	
   court	
  
testimony	
  and	
  cross	
  examination	
  by	
  opposing	
  attorneys.	
  It	
  is	
  essential	
  that	
  digital	
  forensic	
  
specialists	
   possess	
   strong	
   oral	
   communication	
   skills	
   in	
   order	
   to	
   provide	
   effective	
   court	
  
testimony	
   under	
   stressful	
   situations.	
   Students	
   will	
   learn	
   to	
   communicate	
   effectively	
   while	
  
engaged	
  in	
  problem	
  solving	
  and	
  critical	
  thinking	
  exercises.	
  Students	
  will	
  engage	
  in	
  individual	
  
and	
   group	
   discussions,	
   oral	
   presentations	
   of	
   forensic	
   coursework	
   (e.g.	
   BFOR	
   304),	
   and	
  
ultimately	
  testify	
  in	
  a	
  moot	
  (mock)	
  court	
  environment	
  	
  (BFOR	
  402)	
  to	
  strengthen	
  such	
  oral	
  
communication	
  skills.	
  
	
  
	
  
Part	
   2:	
   Please	
   briefly	
   describe	
   how	
   your	
   major	
   curriculum	
   meets	
   each	
   one	
   of	
   the	
   learning	
  
objectives	
  for	
  Oral	
  Discourse.	
  	
  Please	
  attach	
  a	
  description	
  of	
  major	
  requirements,	
  sample	
  syllabi,	
  
and	
  any	
  other	
  relevant	
  materials	
  as	
  appendices	
  to	
  this	
  document.	
  
	
  	
  
	
  
	
  
35	
  
Students	
  completing	
  educational	
  experiences	
  that	
  satisfy	
  the	
  Oral	
  Discourse	
  competency	
  as	
  part	
  of	
  
the	
  requirements	
  for	
  graduation	
  in	
  the	
  major	
  will:	
  
1. communicate	
  ideas	
  effectively	
  appropriate	
  to	
  a	
  specific	
  context	
  and	
  according	
  to	
  a	
  specific	
  set	
  
of	
  criteria;	
  
Students	
   will	
   provide	
   presentations	
   to	
   fellow	
   students	
   regarding	
   digital	
   forensics	
   topics	
  
based	
  on	
  criteria	
  and	
  assessment	
  rubric	
  established	
  for	
  specific	
  courses	
  in	
  the	
  program	
  (e.g.	
  
BFOR	
   304).	
   Students	
   will	
   become	
   knowledgeable	
   in	
   effectively	
   communicating	
   technical	
  
information	
  to	
  a	
  non-­‐technical	
  audience,	
  such	
  as	
  community	
  forums,	
  legal	
  proceedings	
  and	
  
management	
  meetings.	
  
	
  
2. establish	
  and	
  maintain	
  an	
  appropriate	
  performer/audience	
  relationship	
  in	
  a	
  given	
  oral	
  
exercise,	
  and	
  actively	
  engage	
  with	
  listeners/audience;	
  
Oral	
  presentations	
  by	
  students	
  will	
  include	
  feedback	
  from	
  fellow	
  classmates	
  participating	
  in	
  
the	
  program,	
  as	
  well	
  as	
  from	
  subject	
  matter	
  experts,	
  such	
  as	
  forensic	
  practitioners,	
  attorneys,	
  
and	
   lab	
   managers.	
   Oral	
   communication	
   coursework	
   will	
   ultimately	
   lead	
   to	
   a	
   major	
  
presentation	
  during	
  moot	
  (mock)	
  court	
  testimony	
  (BFOR	
  402).	
  
	
  
3. respond	
  to,	
  and	
  where	
  appropriate,	
  incorporate	
  listener’s	
  comments	
  and	
  questions;	
  
Anonymous	
   feedback	
   surveys	
   will	
   be	
   utilized	
   by	
   the	
   audience	
   to	
   provide	
   constructive	
  
comments	
   to	
   assist	
   the	
   speaker	
   improve	
   their	
   communication	
   skills.	
   Surveys	
   will	
   also	
   be	
  
utilized	
  by	
  the	
  instructors,	
  in	
  conjunction	
  with	
  presentation	
  rubric,	
  to	
  better	
  assess	
  and	
  guide	
  
the	
  improvement	
  of	
  students’	
  communication	
  skills.	
  
	
  
4. evaluate,	
  orally	
  or	
  in	
  writing,	
  an	
  oral	
  performance;	
  
All	
  coursework	
  documentation,	
  such	
  as	
  feedback	
  survey,	
  rubric	
  worksheet	
  and	
  assessment	
  
notes	
   will	
   be	
   utilized	
   to	
   provide	
   students	
   guidance	
   the	
   continued	
   development	
   of	
   verbal	
  
communication	
  skills,	
  as	
  well	
  as	
  serve	
  as	
  a	
  permanent	
  record	
  of	
  such	
  student	
  assessment	
  and	
  
evaluation.	
  
	
  
5. regularly	
  practice	
  communication	
  skills	
  through	
  questions,	
  discussions,	
  debates	
  and/or	
  
presentations	
  (both	
  formal	
  and	
  informal).	
  	
  
Throughout	
  program	
  coursework,	
  students	
  will	
  practice	
  verbal	
  communication	
  skills	
  in	
  the	
  
form	
  of	
  individual	
  and	
  group	
  presentations	
  during	
  instructed-­‐guided	
  exercises,	
  constructive	
  
debates	
   involving	
   forensics,	
   ethical	
   and	
   legal	
   challenges.	
   Additionally,	
   students	
   may	
   make	
  
informal	
   presentations	
   to	
   instructor	
   during	
   office	
   hours,	
   when	
   requested	
   by	
   student	
   or	
  
recommended	
  by	
  instructor,	
  to	
  provide	
  guidance	
  prior	
  to	
  public	
  presentations	
  by	
  student.	
  
	
  
	
  
	
  
	
  
	
  	
  
	
  
	
  
36	
  
Competency:	
  Information	
  Literacy	
  	
  
Information	
  literate	
  individuals	
  are	
  able	
  to	
  gather,	
  evaluate,	
  use,	
  manage,	
  synthesize,	
  and	
  create	
  
information	
   and	
   data	
   in	
   an	
   ethical	
   manner.	
   They	
   also	
   understand	
   the	
   dynamic	
   environment	
   in	
  
which	
   information	
   and	
   data	
   are	
   created,	
   handled,	
   and	
   enhanced.	
   Students	
   demonstrate	
  
information	
  literacy	
  through	
  finding	
  information	
  from	
  appropriate	
  sources;	
  evaluating,	
  using	
  and	
  
managing	
  information;	
  and	
  appreciating	
  the	
  role	
  of	
  information	
  literacy	
  in	
  learning.	
  Learning	
  is	
  
understood	
  here	
  as	
  the	
  constant	
  search	
  for	
  meaning	
  by	
  acquiring	
  information,	
  reflecting	
  on	
  and	
  
engaging	
  with	
  it,	
  and	
  actively	
  applying	
  it	
  in	
  multiple	
  contexts.	
  To	
  this	
  end,	
  each	
  academic	
  major	
  
will	
   offer	
   increasingly	
   sophisticated	
   research	
   assignments	
   that	
   rely	
   upon	
   diverse	
   information	
  
sources.	
  Students	
  will	
  find,	
  process,	
  evaluate,	
  and	
  cite	
  information	
  sources,	
  creating	
  and	
  sharing	
  
information	
   presented	
   in	
   multiple	
   formats	
   from	
   multiple	
   sources	
   in	
   a	
   form	
   appropriate	
   to	
   the	
  
discipline.	
  
	
  
Part	
  1:	
  In	
  the	
  text	
  box	
  below,	
  briefly	
  describe	
  (in	
  about	
  one	
  paragraph),	
  and	
  in	
  language	
  suited	
  to	
  an	
  
audience	
   composed	
   of	
   colleagues	
   who	
   are	
   not	
   specialists	
   in	
   your	
   field,	
   what	
   it	
   means	
   to	
   be	
  
competent	
  in	
  information	
  literacy	
  at	
  the	
  undergraduate	
  level	
  in	
  the	
  discipline(s)	
  appropriate	
  to	
  the	
  
major.	
  *The	
  text	
  boxes	
  in	
  this	
  form	
  will	
  expand	
  as	
  you	
  type.	
  	
  
Digital	
   forensic	
   specialists	
   require	
   continuous	
   research	
   regarding	
   new	
   and	
   emerging	
  
technologies	
  in	
  order	
  to	
  develop	
  analytical	
  methodologies	
  required	
  to	
  preserve	
  and	
  examine	
  
digital	
   evidence	
   (data).	
   Specialist	
   must	
   constantly	
   engage	
   in	
   knowledge	
   sharing	
   amongst	
  
other	
   specialists	
   across	
   public	
   and	
   private	
   sectors,	
   through	
   seminars,	
   workshops,	
   listserv,	
  
blogs	
   and	
   other	
   electronic	
   discussion	
   forums.	
   Students	
   will	
   be	
   knowledgeable	
   in	
   the	
  
information	
  resources	
  available	
  in	
  the	
  digital	
  forensics	
  field,	
  including	
  methodologies,	
  tools	
  
and	
  techniques	
  for	
  gathering,	
  evaluating	
  and	
  managing	
  information	
  (e.g.	
  BFOR	
  203).	
  Students	
  
will	
  demonstrate	
  the	
  ability	
  to	
  analyze	
  digital	
  content	
  found	
  in	
  computers,	
  electronic	
  devices	
  
and	
  the	
  Internet,	
  as	
  well	
  as	
  utilizing	
  available	
  information	
  resources	
  to	
  research	
  computer	
  
file	
   systems,	
   locate	
   data	
   artifacts	
   that	
   may	
   have	
   evidentiary	
   value,	
   as	
   well	
   as	
   prepare	
  
structured	
   reports	
   that	
   outline	
   forensic	
   findings	
   (e.g.	
   BFOR	
   301,	
   BFOR	
   303).	
   In	
   addition,	
  
students	
  will	
  gain	
  an	
  understanding	
  of	
  the	
  changing	
  technology	
  landscape,	
  in	
  which	
  digital	
  
forensics	
  specialists	
  must	
  operate;	
  they	
  will	
  also	
  learn	
  how	
  to	
  find,	
  evaluate,	
  and	
  properly	
  
attribute	
  sources	
  (BFOR	
  100).	
  
	
  
	
  
Part	
   2:	
   Please	
   briefly	
   describe	
   how	
   your	
   major	
   curriculum	
   meets	
   each	
   one	
   of	
   the	
   learning	
  
objectives	
   for	
   Information	
   Literacy.	
   	
   Please	
   attach	
   a	
   description	
   of	
   major	
   requirements,	
   sample	
  
syllabi,	
  and	
  any	
  other	
  relevant	
  materials	
  as	
  appendices	
  to	
  this	
  document.	
  
Students	
  completing	
  educational	
  experiences	
  that	
  satisfy	
  the	
  Information	
  Literacy	
  competency	
  as	
  
part	
  of	
  the	
  requirements	
  for	
  graduation	
  in	
  the	
  major	
  will:	
  
1. understand	
  the	
  information	
  environment	
  and	
  information	
  needs	
  in	
  the	
  discipline	
  in	
  today’s	
  
society,	
  including	
  the	
  organization	
  of	
  and	
  access	
  to	
  information,	
  and	
  select	
  the	
  most	
  
appropriate	
  strategies,	
  search	
  tools,	
  and	
  resources	
  for	
  each	
  unique	
  information	
  need;	
  	
  
Students	
   will	
   be	
   exposed	
   to	
   the	
   information	
   environment	
   found	
   in	
   corporate,	
   private	
   and	
  
public	
   sectors	
   involving	
   the	
   digital	
   forensics	
   discipline,	
   such	
   as	
   available	
   organizational	
  
resources	
   for	
   laboratory	
   and	
   forensic	
   operations,	
   as	
   well	
   as	
   accreditation	
   and	
  
standardization	
   sources	
   of	
   information.	
   Students	
   will	
   apply	
   search	
   strategies	
   when	
  
conducting	
  research	
  of	
  new	
  technologies,	
  as	
  well	
  as	
  utilize	
  search	
  tools	
  unique	
  in	
  the	
  digital	
  
	
  	
  
	
  
	
  
37	
  
forensics	
  discipline	
  (e.g.	
  EnCase	
  Forensic	
  from	
  Guidance	
  Software	
  and	
  Forensic	
  Tool	
  Kit	
  from	
  
Access	
   Data)	
   as	
   well	
   as	
   traditional	
   search	
   tools	
   for	
   conducting	
   research	
   (e.g.	
   library	
  
resources,	
  online	
  search	
  engines,	
  etc.)	
  
2. demonstrate	
  the	
  ability	
  to	
  evaluate	
  content,	
  including	
  dynamic,	
  online	
  content	
  if	
  appropriate;	
  
Students	
  will	
  learn	
  how	
  to	
  evaluate	
  resources	
  for	
  validity	
  including	
  dynamic	
  online	
  content.	
  
In	
  addition,	
  more	
  specific	
  to	
  the	
  discipline,	
  students	
  will	
  evaluate	
  control	
  data	
  to	
  determine	
  
relevancy	
  to	
  the	
  case-­‐based	
  scenario	
  or	
  lab	
  exercise	
  and	
  will	
  be	
  assessed	
  on	
  the	
  searched	
  and	
  
found	
   content	
   of	
   the	
   data	
   (digital	
   evidence).	
   Students	
   will	
   also	
   demonstrate	
   ability	
   to	
  
evaluate	
  dynamic	
  content,	
  such	
  as	
  live	
  memory,	
  devices	
  and	
  networks,	
  which	
  its	
  content	
  is	
  
highly	
   volatile	
   and	
   easily	
   damaged	
   or	
   lost.	
   Students	
   will	
   also	
   evaluate	
   digital	
   evidence	
  
retrieved	
   from	
   computers	
   and	
   electronic	
   devices	
   with	
   online	
   information	
   sources	
   to	
  
determine	
  authenticity	
  and	
  acceptance	
  by	
  the	
  general	
  forensic	
  community.	
  
3. conduct	
  ethical	
  practices	
  in	
  the	
  use	
  of	
  information,	
  in	
  ways	
  that	
  demonstrate	
  awareness	
  of	
  
issues	
  of	
  intellectual	
  property	
  and	
  personal	
  privacy	
  in	
  changing	
  technology	
  environments;	
  
Students	
  will	
  engage	
  in	
  exercises	
  and	
  assignments	
  that	
  demonstrate	
  the	
  ethical	
  challenges	
  
associated	
   with	
   performing	
   digital	
   forensic	
   examinations	
   in	
   an	
   unbiased	
   and	
   scientific	
  
manner,	
  as	
  well	
  as	
  the	
  specific	
  topic	
  of	
  cyber	
  ethics	
  (BFOR	
  100).	
  Additionally,	
  students	
  will	
  
become	
  knowledgeable	
  in	
  Federal	
  and	
  State	
  laws,	
  as	
  well	
  as	
  industry	
  regulations,	
  pertaining	
  
to	
  personal	
  privacy,	
  intellectual	
  property	
  and	
  homeland	
  security.	
  
4. produce,	
  share,	
  and	
  evaluate	
  information	
  in	
  a	
  variety	
  of	
  participatory	
  environments;	
  
In	
   all	
   of	
   our	
   digital	
   forensics	
   analysis	
   courses	
   (e.g.	
   BFOR	
   301,	
   BFOR	
   303),	
   students	
   will	
  
participate	
  in	
  individual	
  and	
  group	
  exercises	
  that	
  assist	
  in	
  the	
  development	
  of	
  information	
  
(data)	
   evaluation	
   and	
   analysis.	
   Exercises	
   include	
   the	
   production	
   of	
   corporate	
   executive	
  
summaries,	
  class	
  presentation	
  material,	
  and	
  moot	
  court	
  exhibit	
  material	
  relevant	
  to	
  digital	
  
forensics	
  testimony.	
  
5. integrate	
  learning	
  and	
  research	
  strategies	
  with	
  lifelong	
  learning	
  processes	
  and	
  personal,	
  
academic,	
  and	
  professional	
  goals.	
  
Students	
  will	
  be	
  exposed	
  to	
  learning	
  and	
  research	
  strategies	
  by	
  subject	
  matter	
  experts	
  (e.g.	
  
forensic	
  practitioners,	
  lab	
  managers,	
  attorneys	
  and	
  corporate	
  managers)	
  as	
  well	
  as	
  through	
  
their	
   instructors	
   and	
   peers.	
   Students	
   will	
   receive	
   guidance	
   in	
   long	
   term	
   strategies	
   for	
  
developing	
  and	
  continuing	
  professional	
  development	
  in	
  the	
  digital	
  forensics	
  discipline,	
  which	
  
may	
   include	
   participation	
   in	
   forensic	
   forums,	
   seminars	
   and	
   workshops	
   to	
   develop	
  
networking	
   resources.	
   Additionally,	
   students	
   will	
   learn	
   research	
   techniques	
   and	
   processes	
  
that	
  will	
  be	
  beneficial	
  to	
  personal,	
  academic,	
  or	
  professional	
  goals	
  in	
  academic,	
  public	
  and	
  
private	
  work	
  environments,	
  such	
  as	
  tool	
  testing	
  and	
  validation.	
  
	
  
	
  	
  
	
  
	
  
38	
  
APPENDIX	
  VI.4	
  LETTERS	
  OF	
  COMMITMENT	
  
• 
Alan	
  Lizotte,	
  Dean,	
  School	
  of	
  Criminal	
  Justice	
  
• 
Ingrid	
  Fisher,	
  Chair,	
  Accounting	
  &	
  Law,	
  School	
  of	
  Business	
  
• 
Nancy	
  A.	
  Denton,	
  Chair,	
  Department	
  of	
  Sociology,	
  College	
  of	
  Arts	
  and	
  Sciences	
  
• 
Kehe	
  Zhu,	
  Chair,	
  Department	
  of	
  Mathematics	
  and	
  Statistics,	
  College	
  of	
  Arts	
  and	
  Sciences	
  
• 
James	
  H.	
  Neely,	
  Interim	
  Chair,	
  Department	
  of	
  Psychology,	
  College	
  of	
  Arts	
  and	
  Sciences	
  
	
  
 
Draper Hall 
135 Western Avenue 
Albany, NY  12222 
518-442-5210 
Fax: 518-442-5212 
 
 
 
 
August&28,&2013&
 
&
Professor&Sanjay&Goel&
Chair&and&Associate&Professor,&Information&Technology&Management&
BB&311,&School&of&Business&
1400&Washington&Ave.&Albany,&NY&12222&
&
&
Dear&Professor&Goel:&
&
&&&&&The&School&of&Criminal&Justice&has&reviewed&the&proposal&for&the&Digital&Forensics&
undergraduate&major&curriculum&and&is&happy&to&collaborate&with&the&School&of&
Business&on&this&program.&&
&
We&understand&that&students&will&be&taking&the&following&courses&in&the&School&of&
Criminal&Justice&(or&transfer&in&an&equivalent&from&an&approved&transfer&institution)&
as&part&of&the&program:&
&
• RCRJ&281&Introduction&to&Statistics&(an&option)&
• RCRJ&201&Introduction&to&Criminal&Justice&
• RCRJ&202&Introduction&to&Law&and&Criminal&Justice&
• RCRJ&203&Criminology&
&
We&have&determined&that&this&request&will&not&impose&an&undue&burden&on&our&
offerings&and&will&be&able&to&accommodate&anticipated&students&in&the&Digital&
Forensics&major.&We&look&forward&to&working&with&you&on&this&program!&
&
&
Sincerely,&
&
&
Alan&Lizotte&
Dean&and&Professor,&School&of&Criminal&Justice&
University&at&Albany,&State&University&of&New&York&
 
 
  
School of Criminal Justice  
 
 
Professor'Sanjay'Goel'
Chair'and'Associate'Professor,'Information'Technology'Management'
BB'311,'School'of'Business'
1400'Washington'Ave.'Albany,'NY'12222'
'
September'3,'2013'
'
'
Dear'Professor'Goel:'
'
''''The'Accounting'&'Law'Department'has'reviewed'the'proposal'for'the'Digital'
Forensics'undergraduate'major'curriculum'and'is'happy'to'collaborate'with'the'
Information'Technology'Management'Department'on'this'program.''
'
We'understand'that'students'will'be'taking'the'following'courses'in'the'Accounting'
&'Law'Department'as'part'of'the'program:'
'
• BACC'211'Financial'Accounting'
• BACC'400'Forensic'Accounting'and'Fraud'Detection'
• BACC'401'Forensic'Accounting'Investigative'Techniques'
'
We'will'work'in'every'way'possible'to'accommodate'the'anticipated'students'in'the'
Digital'Forensics'major.'We'look'forward'to'working'with'you'on'this'exciting'
program!'
'
'
Sincerely,'
'
'
'
'
Ingrid'Fisher'
Chair,'Accounting'&'Law'
School'of'Business'
University'at'Albany,'State'University'of'New'York'
'
9/5/13 8:45 AM
RE: Letter of support
Page 1 of 2
https://ch1prd0410.outlook.com/owa/?ae=Item&t=IPM.Note&id=RgAAA…2fLDzD%2fAAA2IVc%2bAAAJ&a=Print&pspid=_1378385094109_342785466
RE: Letter of support
Zhu, Kehe
Sent:Wednesday, August 28, 2013 1:04 PM
To:
Goel, Sanjay
Cc:
Plotnick, Steven; Reinhold, Karin B
 
 
Dear%Sanjay,
%
The%Department%of%Mathematics%and%Statistics%is%supportive%of%your%new%Digital%Forensics%major%and%will%be%able%to
accommodate%the%enrollment%of%these%students%in%our%AMAT%108.%Let%me%know%if%you%need%a%more%formal%letter%of
support.
%
Best%regards,
Kehe%Zhu.
Professor%and%Chair/Mathematics%and%Statistics
%
%
From: Goel, Sanjay 
Sent: Wednesday, August 28, 2013 10:46 AM
To: Zhu, Kehe
Cc: Plotnick, Steven; Reinhold, Karin B
Subject: Re: Letter of support
 
Dear%Kehe:
%
We%are%working%on%proposing%a%new%Digital%Forensics%undergraduate%major.%We%have%in%our%program%an%option%for%students
to%take%the%AMAT%108%course%in%their%first%year.%We%would%like%you%to%be%able%to%accommodate%our%Digital%Forensics
students%this%course.%Please%find%our%formal%request%attached.%I%would%be%happy%to%give%you%a%call%to%discuss%this.%Please%let
me%know%if%you%need%any%clarification%or%have%any%questions.%If%you%are%amenable,%we%can%provide%a%template%letter%of
support%to%help%you%with%your%response.
%
We%hope%to%be%able%to%work%with%you%on%this%and%other%future%ventures.%
%
Best%Regards,
Sanjay%Goel
________________________________
Director)of)Research,)NYS)Center)for)Information)Forensics)and)Assurance
Chair)and)Associate)Professor,)Information)Technology)Management,)School)of)Business
University)at)Albany,)State)University)of)New)York
NEW)CONTACT)INFORMATION)AS)OF)08/13/13
Business)Building)311,)1400)Washington)Ave.)Albany,)NY)12222
PH:)(518))956Y8323)))))FX:)(518))442Y2666
http://www.albany.edu/~goel
%
From:&Karin%Reinhold%<reinhold@albany.edu>
Date:&Monday,%August%26,%2013%6:30%PM
~ 
UNIVERSITY AT ALBANY 
State University ofNew York 
August 30, 2013 
Professor San jay Goel 
Chair and Associate Professor 
Department of Sociology 
Nancy A. Denton, Department Chair 
ndenton@albany.edu 
Information Technology Management Department, School of Business 
Director of Research, NYS Center for Information Forensics and Assurance 
Dear Professor Goel: 
I am writing to provide my strong support for your new undergraduate program in Digital 
Forensics. This is an extremely important area for undergraduates to learn about We are 
pleased to support your effort by allowing you to require ASOC 115 as part of your 
program. As sociologists, we, of course, feel that knowledge of sociology is fundamental to 
everything, and we are very pleased when others recognize it as well. 
Best wishes for the success of your program. And please, contact me if there is anything 
else we can do to assist you. 
Sincerely, 
Nancy A. Denton 
Professor and Chair 
Department of Sociology 
University at Albany, SUNY 
Arts and Sciences 351 
1400 Washington Avenue 
Albany, New York 12222 
PH: 518-442-4666 
FX: 518-442-4936 
www.albany.edu 
Department of Psychology 
College of Arts and Sciences 
September 3, 20 13 
Dr. Sanjay Goel 
School of Business 
UNIVERSITY 
AT ALBANY 
State University of New York 
Information Technology Management 
BA 311 
Dear Dr. Goel: 
Social Science 399 
Albany, New York 12222 
(518) 442-4820 
Fax: (518) 442-4867 
I am writing to inform you that the Department of Psychology has reviewed your 
request for creating a program in Digital Forensics. We understand that you are 
requesting approval to list Introduction to Psychology (APSY 101) as a program 
requirement for this new major. 
We understand that this approval will require no more than 25 seats per year in 
APSY 101. Should you require more than 25 seats per year in the future, we will 
need to reevaluate our ability to accommodate additional seats at that time. 
Based on your current request, we have determined that this will not impose an 
undue burden on our offerings. We can accommodate your students and see no 
problem with the proposal in this regard . 
.. HL) 
Ja es H. Neely 
Professor and Interim Chair 
Department of Psychology 
	
  	
  
	
  
	
  
44	
  
APPENDIX	
  VI.5	
  TRANSFER	
  AGREEMENT	
  OUTREACH	
  ACTIVITIES	
  
• 
Summary	
  (prepared	
  by	
  Brian	
  Gabriel,	
  Assistant	
  Dean	
  for	
  Undergraduate	
  Education)	
  
• 
Draft	
  Transfer	
  Equivalency	
  Table	
  Columbia-­‐Greene	
  Community	
  College	
  
• 
Draft	
  Transfer	
  Equivalency	
  Table	
  Herkimer	
  County	
  Community	
  College	
  
• 
Draft	
  Transfer	
  Equivalency	
  Table	
  Hudson	
  Valley	
  Community	
  College	
  
To: 
Date: 
From: 
Subject: 
Sanjay Goel, Associate Professor; School of Business 
Office of the Vice Provost 
for Undergraduate Education 
September 5, 2013 
cPj) 
Brian E. Gabriel, Assistant Dean for Undergraduate Education Jt ~I' 
Digital Forensics Transfer Agreement Outreach Activities Summary 
The Transfer Agreement Coordinator in the Office for Undergraduate Education contacted 
eight ofUAlbany's Community College partners- those with established computing, 
forensics, criminal justice and cyber-security degree programs -to explore the possibility of 
developing 2 + 2 transfer program agreements for UA!bany's proposed Digital Forensics 
degree program. 
Six community colleges expressed a strong desire to immediately begin work on the 
development of 2 + 2 transfer program agreements -- Broome, Columbia-Greene, Fulton-
Montgomery, Herkimer, Hudson Valley and Schenectady Community Colleges. 
Transfer agreement work meetings over the past two months with Columbia-Greene, 
Herkimer and Hudson Valley Community Colleges have resulted in the development of draft 
2 + 2 transfer course equivalency tables and draft program agreements. Draft 2 + 2 Digital 
Forensics program agreements and transfer equivalency tables for Columbia-Greene, 
Herkimer and Hudson Valley Community Colleges are attached for your review and 
feedback. 
Work meetings to develop draft 2 + 2 Digital Forensics program agreements and transfer 
equivalency tables for Fulton-Montgomery and Schenectady Community Colleges are 
scheduled for the week of September 23-27, 2013. Initial contact and outreach with Monroe, 
Sullivan and Westchester Community Colleges will occur next week, September 9-13, 2013. 
Additional outreach and transfer agreement development with community colleges and other 
two- and four-year institutions will continue. It seems very clear that there is a need and 
demand for transfer pathways that will allow students to enter the exciting field of Digital 
Forensics at UAlbany. 
If you need any additional information, please let me know. 
Lecture Center 30 
1400 Washington Avenue, Albany, NY 12222 
PHo 518-442-3950 
FXo 518-442-4959 
www.albany.edu 
-draft-
UAibany's Digital Forensics Program Transfer Equivalency Table 
Columbia-Greene Community College 
s School of I 
s Major- Cours;:e:.;lc=;~ 
! C:nmmunitv 
r Course Eq 
I
AP5Y-101 
A50C-115 
[~_f!K-LUL 
BITM-215 
BFOR-301 
---
04 
IRCRJ -262 
I 
course# 
AART-244 
I
ACHM-010 
AHI"T-
Intra to I 
Intra 
5 for I 
ion to ( 
Intra to Digital I 
Cyber Crime I 
~ 1- Intra to Data Comm 
I Info T• 
;I 
;II 
1 Network 
I Digital I 
Digital Forensics Moot Court 
Intra to Criminal Justice 
Intra to Law & Criminal Justice 
(or AMAT-108;: 
Education " 
ART- lntro to I 
HUMANITIES- English I 
y & Digital 
NATURAL SCIENCE- Forensic Science 
-----
us HISTORY 
WRTING INTENSIVE & Critical Inquiry 
1 Credits 
3 
3 
3 
3 
3 
4 
3 
3 
3 
3 
3 
3 
3 
3 
3 
3 
4 
4 
3 
4 
3 
3 
/lr 
I 
* 
Challenges for the 21st Century 
Fore1gn language Course 
3 
3 
4 
3 
3 
3 -,-
* 
,_ ... ____ .. , ____ , ,.., ____ -
3 
Course# 
BAAC-010 
---
RCRJ-010 
----
MATH-10( 
ELECTIVE 
---· 
I ELECTIVE 
'lVI 
I ELECTIVE 
I ELECTIVE 
ELECTIVE 
II A< 
!Criminal! 
_L 
Total 
s or Electives 
3 
3 
3 
3 
3 
3 
3 
sub-total i 
52 
1 Credits 
I 122 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
i 
IC5-134 
C5241 
Course Name 
1 to: 
r& 
~ Gen Ed) 
· ~--~-(Info-lit Gen Ed) 
CJ-134 
Cyber Crime I 
X 
CS-156/197 Introduction to Data 1 
.S_?-235 
Network Security 
IC5-241 
CJ-102 
CJ-212 
50-207 
X 
MA 102 
~
Course# 
AR-135 
EN-101 
---
5C-241 
----
X 
X 
IEN-102 -.--
' 
!
Course# 
AC-101 
CJ-204 
IMA-111 
1 to Criminal Justice 
I law 
Criminol;:_og~yc__~~~~ 
; (Math Gen Ed) 
Course Name 
Digital PI 
English~ 
:Science 
1 I 
U.S. History 1492-1865 or 1865- Present 
English Composition II & Literature 
s completing an A.A. or A.S. 
Nill have satisfied 
!General Educa·· 
[Course Name 
Criminal 
Total I 
1 Credits 
IQ:edits 
3 
3 
3 
3 
3 
3 
3 
3 
3 
3 
3 
3 
3 = 
3 
3 
4 
3 
3 
3 
3 
3 
z5 
I 
64 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
- Sept-2013 -
liJectlve I Gen Ed 
X 
I 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
X 
I 
*A transfer student admitted to the University At Albany and has completed his/her A.A. or A.S. degree will be given full credit for meeting all of UAibany and SUNY's General Education 
requirements {a minimum of 30 credits). 
N draft N 
UAibany's Digital Forensics Program Transfer Equivalency Table 
Herkimer County Community College 
N Sept-2013 N 
UAibany's School of Business: Forensics Major~ Course Requirements & Electives 
Herkimer's Criminal Justice: Cybersecurity & Forensics- Transfer Equivalencies 
Course# 
Course Name 
Credit~ I Reguired I Elective 
Gen Ed Course# 
Course Name 
Credits, Regulred i Elective 
Gen Ed 
AP5Y-101 
I intra to Psychology 
3 
X 
I 
X 
55-151 
Psychology (Social-Science Gen Ed) 
3 
I 
X 
X 
I 
A50C-115 
'lntro to Sociology 
3 
' 
X 
I 
55-161 
Sociology 
3 
X 
1BACC-211 
Financial Accounting 
3 
X 
BU-114/5 ;Accounting 1 & 2 
6 
X 
BACC-400 
Accounting for Forensics 
3 
X 
BACC-401 
Financial Forensics 
3 
X 
BFOR-100 
Intra to Computing 
4 
X 
' 
15-115 
Computer Applications 
3 
X 
BFOR-201 
I Intra to Digital Forensics 
3 
X 
CJ 262 
Adv. Computer Forensics & Investigations 
' 
3 
X 
BFOR-202 
Cyber Crime Investigations 
3 
X 
CJ 261 
Computer Forensics & Investigations 
3 
X 
BFOR-203 
Networking I- Intra to Data Comm 
3 
X 
I 
15--140 
Networking Essentials 
3 
X 
BFOR-204 
Computer & Information Security 
3 
' 
X 
15-260 
Computer/Network Secuirty 
3 
X 
BFOR-301 
Computer Forensics I 
3 
X 
! 
BFOR-302 
e-Discovery 
3 
X 
BFOR-303 
Computer Forensics II 
3 
X 
! 
BFOR-304 
Network Forensics 
3 
X 
i 
BFOR-331 
I Database Management 
3 
X 
BFOR-401W ':Advanced Digital Forensics 
4 
X 
BFOR-402 
Digital Forensics Moot Court 
4 
i 
X 
I 
BITM-215 
Info Technologies for Business 
3 
X 
11s there an Equivalent Course@ Herkimer 
RCRJ-201 
Intra to Criminal Justice 
3 
X 
CJ-120 
!Intra to Criminal Justice 
3 
X 
RCRJ -202 
Intra to Law & Criminal Justice 
! 
4 
X 
Suggest taking UA's RCRJ-202 Online 
RCRJ-203 
Criminology 
3 
X 
55-136 
Criminology 
3 
X 
I 
RCRJ281 
Statistics (May take AMAT-108) 
3 
X 
X 
MA-127 
Statistics (Math Gen Ed) 
3 
X 
X 
sub-total 
70 
sub-totali 
36 
course 
ueneral Education Requ1remen s 
g,urse ff 
ourse 
arne 
AART-010 
,Arts 
3 
X 
X 
HU-242 
Forensic Photography 
3 
X 
' 
X 
AENG-010 
!_Humanities- English I 
3 
X 
EN-111 
English I 
3 
X 
' 
IINF-010 
Info literacy -Intra to Info-Assurance 
3 
X 
X 
CJ-230 
Intra to Information Assurance 
3 
' 
X 
X 
ACHM-120 
Natural Science- Chemistry I & lab I 
4 
I 
X 
I 
X 
5C-153 
General Chemistry with Lab 
4 
i 
X 
X 
' 
AHIS-lOOZ 
US History- American Pol & Soc History 
3 
I 
X 
X 
55-121 
Amerkan History I 
3 
I, 
X 
X 
AENG-121W Writing & Critical Inquiry 
3 
X 
X 
EN-112 
English II- Wrtitng & literature 
3 
X 
X 
• 
Challenges for the 21st Century 
3 
• 
iStudents !;;Om[21eting an A.A. or A.S . 
• 
Foreign language Course 
3 
• 
Degree will have satisfied all of the 
• 
International Pers12ectives 
3 
• 
General Education Reguirements 
i 
Course# 
,Additional Requirements or Electives 
Course# 
Course Name 
TBD 
Fraud Examination 
3 
X 
CJ-240 
Fraud Examination 
3 
X 
' 
TBD 
Managing & Understanding Cybercrime 
3 
X 
CJ-241 
,Managing & Understanding Cybercrime 
3 
X 
TBD 
Network Defense & Countermeasures 
I 
3 
X 
CJ-273 
'Network Defense & Countermeasures 
3 
X 
TBD 
Terrorism & Homeland Defense 
3 
X 
! 
55-225 
Terrorism & Homeland Defense 
3 
X 
TBD 
ELECTIVE 
3 
X 
TBD 
iELECTIVE 
3 
TBD 
ELECTIVE 
3 
' 
X 
TBD 
ELECTIVE 
3 : 
'r 
X 
\ 
suo-tota i 
52 
I 
I 
sub-totar 
31 
1 
I 
Total Program Credits 
. ___l__lzz 
Total Program Credits 
67 
I 
--· 
-
*A transfer student admHted to the un·,ver5ity At Albany and has completed his/her A.A. or A.S. degree will be given full credit for meeting all of UAibany and SUNY's 
General Education requirements (a minimum of 30 credits). 
! 
~draft~ 
UAibany's Digital Forensics Program Transfer Equivalency Table 
Hudson Valley Community College 
~ Sept-2013 ~ 
UAibany's School of Business: Forensics Major- Course Requirements & Electives 
Hudson Valley CC Criminal Justice: Cybersecurlty & Forensics -Transfer Equivalencies 
Course# 
Course Name 
Credits ! Regulred 
Elective Gen Ed Course# 
Course Name 
Credits Reguired 
Elective j Gen Ed 
APSY-101 
Intra to Psychology 
3 
X 
' 
I 
X 
PSYC-!00 
Psychology (Social-Science Gen Ed) 
3 
X 
ASOC-115 
Intra to Sociology 
3 
X 
I 
50CL-100 
Sociology 
3 
X 
BACC-211 
Financial Accounting 
3 
X 
ACTG-110 
Financial Accounting 
3 
X 
BACC-400 
!Accounting for Forensics 
' 
3 
X 
BACC-401 
Financial Forensics 
3 
X 
BFOR-100 
Introduction to Computing 
4 
X 
CI55-!00 
Introduction to Computing 
3 
X 
BFOR-201 
Intra to Digital Forensics 
3 
X 
CRJS-!55 
Concepts in Forensic Evidence 
' 
3 
X 
BFOR-202 
Cyber Crime Investigations 
3 
X 
i 
Develop a course for this requirement 
BFOR-203 
Networking 1- Intra to Data Comm 
3 
X 
I 
CISS !20 
. Networking I- Intra to Data Comm 
3 
X 
! 
I 
BFOR-204 
;Computer & Information Security 
3 
X 
CISS-!25 
Computer & Information Security 
3 
' 
! 
X 
' 
BFOR-301 
Computer Forensics I 
3 
X 
' 
BFOR-302 
e-Discovery 
3 
X 
BFOR-303 
Computer Forensics II 
3 
X 
BFOR-304 
Network Forensics 
3 
X 
i 
BFOR-331 
Database Management 
3 
X 
' 
CISS-250 
Database Management Systems 
i 
4 
X 
I 
BFOR-401W 
Advanced Digital Forensics 
4 
X 
i 
' 
BFOR-402 
Digital Forensics Moot Court 
! 
4 
X 
BITM-215 
, Info Technologies for Business 
3 
X 
X 
CISS !01 
Business Camp & Info Sci (Info-Lit Gen Ed) 
3 
X 
RCRJ-201 
Intra to Criminal Justice 
3 
X 
CRJS-!01 
Intra to Criminal Justice 
3 
X 
RCRJ -202 
Intra to Law & Criminal Justice 
4 
X 
Suggest taking UA's RCRJ-202 Online 
RCRJ-203 
Criminology 
3 
X 
CRJS-250 
Criminology 
3 
X 
RCRJ-281 
Statistics (or AMAT-108; Statistics) 
3 
X 
X 
MATH-135 Statistics (Math Gen Ed) 
3 
X 
sub-tota 
70 
sub-tota 
37 
tours~ 
uenerat Eaucatton Kequtrements 
ours~ 
ourse a me 
AART-010 
Arts 
3 
X 
I 
X 
ARTS-100 
Survey of Art History I 
3 
X 
AENG-010 
Humanities- English I 
I 
3 
X 
X 
ENGL-101 
English I -Composition 
3 
X 
AHIS-IOOZ 
iUS History- American Pol & Soc. History 
! 
3 
X 
X 
POLS-IDS 
American National Government 
3 
X 
ACH-010 
I Natural Science- Forensic Science II 
3 
X 
X 
CRJS-246 
Forensic Science II 
3 
X 
AENG-121W 
Writing & Critical Inquiry 
3 
! 
X 
X 
ENG-!01 
English II- Writing & Inquiry 
3 
X 
' 
Challenges for the 21st Century 
3 
' 
Students com12!eting an A.A. or A.S. 
' 
Foreign Language Course 
3 
' 
Degree will have satisfied all of the 
• 
International Persgectives 
3 
• 
General Education Reguirements 
Course# 
Additional Requirements or Electives 
i 
Course# 
Course Name 
ICSI-201 
Computer Programming & Logic I 
3 
X 
CISS-110 
Programming & Logic I 
3 
X 
I 
ICSI-010 
·Programming & logic II- Data Structures 
3 
X 
CISS-111 
Programming & Logic 11-Data Structures 
3 
X 
RCRJ-010 
Introduction to Evidence Gathering 
3 
X 
CRJS-190 
Introduction to Evidence Gathering 
3 
X 
RCRJ-010 
Forensic Science I (Evidence) 
3 
X 
CRJS-245 
Forensic Science I 
3 
X 
I 
TBO 
ELECTIVE 
3 
X 
' 
' 
TBD 
ELECTIVE 
3 
X 
TBD 
ELECTIVE 
3 
X 
i 
TBD 
ELECTIVE 
3 
X 
TBD 
ELECTIVE 
3 
i 
X 
I 
I 
sub-total] 
51 
I 
! 
sub-total 
27 
I 
Total Program Credits 
I 121 
Total Program Credits 
64 
I 
• A transfer student admitted to the University At Albany and has completed his/her AA or AS. degree will be given full credit for meeting all of UAibany and SUNY's 
General Education requirements (a minimum of 30 credits). 
X 
X 
X 
X 
X 
X 
X 
X 
	
  	
  
	
  
	
  
49	
  
APPENDIX	
  VI.6	
  SYLLABI	
  FOR	
  NEW	
  BFOR	
  AND	
  BACC	
  COURSES	
  
• 
BACC	
  400	
  
• 
BACC	
  401	
  
• 
BFOR	
  100	
  
• 
BFOR	
  201	
  
• 
BFOR	
  202	
  
• 
BFOR	
  203	
  
• 
BFOR	
  204	
  
• 
BFOR	
  300	
  
• 
BFOR	
  301	
  
• 
BFOR	
  302	
  
• 
BFOR	
  303	
  
• 
BFOR	
  304	
  
• 
BFOR	
  401W	
  
• 
BFOR	
  402	
  
 
 
BACC 400 
Forensic Accounting & Fraud Detection 
 
 
#0000 – BACC 400 Forensic Accounting and Fraud Detection (3 credits) 
Semester 0000 – Month 00, 0000 to Month 00, 0000  
Course Prerequisite(s): BACC 211 
Instructor(s):  
Developer(s): Sanjay Goel 
COURSE DESCRIPTION 
This course provides an overview of occupational fraud including misappropriation of assets, financial 
statement fraud and corruption as well as other forensic accounting engagements such as tax fraud and 
matrimonial disputes. The course will explore the characteristics of specific fraud schemes along with the 
characteristics of those who perpetrate them (according to the Annual Report to the Nations compiled by 
the Association of Certified Fraud Examiners). Students will acquire an understanding of the generally 
accepted accounting principles violated by the schemes. Students will become versed in the principles of 
internal control over the financial reporting system including how these principles work to deter financial 
fraud and ensure compliance with external requirements. Relevant guidance from the professional, 
regulatory and legal environment will be discussed. Prerequisite(s): BACC 211. Offered fall semester 
only. 
 
 
LEARNING OBJECTIVES 
Overarching Goal: The course will teach students to detect and investigate accounting fraud 
 
Sub-Objectives: Student will learn to 
1. Analyze financial statements 
2. Evaluate internal controls for accounting systems in an organization and identify gaps 
in controls 
3. Detect accounting fraud and distinguish between different types of fraud 
4. Investigate fraud cases to identify the perpetrators, evaluate the damage, and 
suggest controls to mitigate the risks of fraud 
5. Analyze cases of fraud in organizations and write detailed reports backed by 
evidence 
 
 
COURSE FORMAT: FACE-TO-FACE (F2F) ON-CAMPUS DELIVERY 
The course will be offered in-class and include both lecture and hands-on laboratory 
components. In addition, learning will be supplemented with assigned readings or videos, 
discussions, and other assignments and exercises related to the course topics. 
 
F2F Meeting Dates, Times, and Location: The class will be in a three hour session on 
campus with the location and time provided by the registrar for any specific semester. 
 
INSTRUCTOR CONTACT 
Type 
Information 
Availability 
Email 
goel@albany.edu 
 
 
Phone 
518 956 8323 
 
In Person 
BB 311 
 
Virtual 
 
 
 
 
BACC 400 
Forensic Accounting & Fraud Detection 
 
Chat 
 
 
 
 
 
COURSE RESOURCES 
Type 
Information 
Course Website 
TBD 
Instructor Website 
http://www.albany.edu/~goel 
Textbook(s) 
TBD 
Reference Books(s) 
TBD 
 
TECHNICAL RESOURCES 
If you experience technical problems that interrupt your ability to complete class work, it’s 
important that you know where to seek help immediately. Here is a simple guide for where you 
should direct questions and calls for help. 
Problems with… 
You should contact… 
Logging into your ISP (Internet 
Service Provider); connecting to 
websites; launching web browser 
(e.g. Internet Explorer, Firefox) 
Your ISP. The following links are provided to a couple of 
local ISP providers contact pages. If yours is not on this 
list, look up your ISP in a search engine and find a 
"Contact Us" page: TimeWarner (Road Runner & 
Verizon (FIOS) 
Connecting & logging into to the 
UAlbany Blackboard website; 
accessing your course(s); 
interacting or participating in 
course activities, submission of 
assignment or file attachments in 
course. 
The ITS Help Desk by using the ITS Help Request Form 
(http://www.albany.edu/its/help) or call (518) 442-4000. 
Press "1" for students. Then, press "2" for help with 
Blackboard. 
Forgotten PIN when trying to get 
forgotten password. 
The ITS HelpDesk at (518) 442-3700 or go to Lecture 
Center (LC) 27 at the UAlbany main campus with your 
SUNYCard and another form of identification. Press “1” 
for assistance when calling. 
 
Please note that your instructor is not on this list. If you send inquiries about these technical problems, 
you will be referred to the resources listed above. 
 
COURSE ACTIVITIES 
Lectures: Instructor-led lectures that may be supplemented with expert guest lectures on 
course-related topics will be offered in class. The lecture material should summarize and 
expand on the knowledge obtained from the assigned readings and assignments. 
 
 
 
BACC 400 
Forensic Accounting & Fraud Detection 
 
Video Clips: Video clips of lectures may be offered for portions of the class in case we 
use a flipped classroom approach for one or more lectures. This will feature PowerPoint 
content as well as the instructor video with subtitling and transcripts available. Purely audio 
versions of the content are also available for playing on personal media players, e.g. IPods. 
To play the video, you will need to download specific video player that will be provided to you.  
 
Readings: Chapters, articles, or other readings assigned in the class are meant to 
supplement or reinforce the other course materials and will not generally have duplicate 
content. 
 
Cases: Case studies using actual examples to provide real-world relevance to the topics in 
the class. The case(s) in this course will have several cases of accounting fraud such as at 
Citibank, WorldCom, etc. 
 
Discussions: There will be a general discussion forum available for students to talk 
amongst themselves based on topics outside of class. Discussions topics will also be 
assigned and graded. The following criteria will be used for assessing discussions  
 
Criteria 
Outstanding 
90-100 
Proficient 
80-89 
Marginal 
70-79 
Unsatisfactory 
0-69 
Content 
Critical 
Thinking 
Discussions/Com
ments/questions 
are thought 
provoking and 
display insight. 
They add to the 
depth of the 
discussion. 
Extensive use of 
resources to 
support 
comments or 
ideas.  
Discussions/Com
ments/questions 
are appropriate/ 
relative and add to 
the discussion, but 
may not always 
display insight or 
provoke thought. 
Some use of 
resources to 
support comments 
or ideas. 
Discussions/Comme
nts/questions are 
relative but do not 
add to the 
discussion or may 
show lack of insight. 
Occasional use of 
resources to support 
comments or ideas. 
Discussions/Com
ments/questions 
are not relative to 
the case and do 
not add to the 
discussion. 
No use of 
resources to 
support comments 
or ideas. 
 
Assignments/Exercises: Students will receive several assignments during the 
course of the semester that will include homework, papers, and independent research 
 
F2F Exams: These exams will be offered to assess individual content review and 
understanding. The content of these exams will be based on the lectures preceding the exam 
and will have multiple choice and essay questions. There will be 2 or 3 unit tests through the 
semester but final exam. 
 
Project:  An end-of-semester project will be assigned to groups of students the details of 
which will be provided during the class.  
 
Hands-On Laboratories: Laboratory exercises will be offered where students get 
hands-on experience using tools and techniques in the field. Laboratory exercises take 
around 1 – 1 ½ hour to complete and will utilize classroom computer laboratories (in-class) or 
software available on the cloud that you can access with a personal computing device 
(online).  
 
 
 
BACC 400 
Forensic Accounting & Fraud Detection 
 
Participation: Course attendance is important part of building long-lasting relationships 
and a learning community between your peers and your instructors. Not only does it allow 
you to share your opinions on course topics, but also you benefit from your classmates’ and 
instructor perspectives.  Participation in the course could be measured with attendance, 
and/or in-class assignments. 
 
Presentation: You (or group) will be expected to make a 20-minute presentation to 
the class Each person present should ask questions during the presentation and respond to 
assertions from the speaker. The grading will be done for both presentations and questions 
asked. The grading rubric is as follows: 
• 
Presentation (70%) - Content 50% / Clarity, Coherence & Organization 20% 
• 
Q&A (30%) - Question Relevance 10% / Articulation of Question 5% / Response to 
Questions  15% 
An outstanding presentation needs to be factually accurate and on-topic. The information 
should cover the topic selected and should consider the background of the audience. The 
presentation should have a clear beginning, middle, and end. Introduction should contain an 
articulate, compelling statement of the topic and inform the audience of the key ideas to be 
discussed. Any claims should be well-supported and the ending should be strong and 
conclusive. The grading for questions will be done across all presentations. Individual 
students from the same team will be graded separately. 
 
GRADING AND ASSESSMENT 
We try to grade assignments fairly and return them within a reasonable time period with 
relevant comments and to be available to discuss questions. Students are expected to set 
up an appointment to talk with the grader within a week of receiving a grade. Please let us 
know if there is a mistake in calculation – mistakes happen! 
Late assignments, projects, or papers will receive 15% off per day late from the final possible 
grade for the exercise unless there is a legitimate excuse.  
Students at UAlbany should contact the Disabled Student Services Center and the relevant 
professor at least a week before each F2F exam if requiring additional assistance. Missing 
any assessment without a verifiable legitimate excuse will result in a grade of zero. F2F 
Exams are expected to be closed-book unless otherwise specified and all personal electronic 
devices (laptops, cell phones, PDA's, etc.) should be put away.  
 
 
 
 
 
 
Note: The instructor is expected to get approval of the entire class prior to making any changes regarding the 
grading rubric. 
 
ACTIVITY 
PERCENTAGE OF GRADE 
Participation 
5% 
Cases 
15% 
Assignments & Hands-On Laboratories 
20% 
Discussions 
20% 
Exam I 
20% 
Exam II 
20% 
 
 
BACC 400 
Forensic Accounting & Fraud Detection 
 
 
 
COURSE SCHEDULE 
Week 
Course Activities 
1 
Introduction to Forensic Investigative Techniques 
2 
Financial Statement Analysis 
3 
Internal Controls 
4 
Auditing 
5 
Forensic Accounting & Legislation 
6 
Exam I 
7 
Misappropriation of Assets (Including case) 
8 
Indirect methods of Restructuring Income: Money Laundering & 
Transnational Financial Flows (Including case) 
9 
Revenue Fraud (including case) 
10 
Inventory Fraud (including case) 
 11 
Fraud on Reserves (including case) 
12 
Business Valuation and Damages (including case) 
13 
Exam II  
14 
Occupation/Employee Fraud (misreporting time/use of company 
resources etc.) Guest Lecture 
15 
TBD 
 
This schedule is subject to change and students are expected to be aware of any modifications to including, but not 
limited to: due dates, readings, exam dates, and project guidelines, announced via email, Blackboard 
announcements or during class hangouts. 
 
 
 
BACC 400 
Forensic Accounting & Fraud Detection 
 
ACADEMIC INTEGRITY & HONESTY  
Students MUST comply with all University at Albany’s standards of academic integrity. As 
stated on the undergraduate and graduate bulletin, "Claims of ignorance, of unintentional 
error, or of academic or personal pressures are not sufficient reasons for violations of 
academic integrity." Non-compliance with academic integrity standards, will result in the 
student being reported to the Office of Graduate Admissions or the Dean of Undergraduate 
Studies Office (whichever applies) AND receive a lowering of a paper or project grade of at 
least one full grade, receive a failing grade for a project containing plagiarized material or 
examination in which cheating occurred, receive a lowering of course grade by one full grade 
or more, a failing grade for the course, or any combination of these depending on the 
infraction.  
Violations include: Giving or receiving unauthorized help on an examination; Collaborating 
on projects, papers, or other academic exercises which is regarded as inappropriate by the 
instructor(s), submitting substantial portions of the same work for credit more than once, 
without the prior explicit consent of the instructor(s) to whom the material is being submitted; 
misrepresenting material or fabricating information in an academic exercise or assignment; 
Destroying, damaging, or stealing of another's work or working materials; and presenting as 
one's own work, the work of another person (e.g., words, ideas, information, code, data, 
evidence, organizing principles, or presentation style of someone else). This includes 
paraphrasing or summarizing without acknowledgment, submission of another student's 
work as one's own, purchase of prepared research, papers or assignments, and the 
unacknowledged use of research sources gathered by someone else. Failure to indicate 
accurately the extent and precise nature of one's reliance on other sources is also a form of 
plagiarism. The student is responsible for understanding the legitimate use of sources, the 
appropriate ways of acknowledging academic, scholarly, or creative indebtedness, and the 
consequences for violating University regulations. If you have questions about academic 
integrity - ASK! 
“GREAT” EXPECTATIONS  
• 
Students can expect the instructor to be open to questions and concerns, but remain 
impartial and fair to all students. 
• 
Students are expected to respectfully participate in the course and communicate with 
the instructor if there is confusion or lack of understanding of the material. In turn, the 
instructor will attempt to clarify any material. 
• 
If the instructor is unable to attend class or office hours due to a personal emergency, 
students can expect for arrangements to be made for an alternate instructor or to be 
informed in as a timely a manner as possible. 
• 
Students are expected to provide reliable contact information and inform the instructor of 
any updates.  
• 
Students are expected to contact the instructor via email, phone, or in person for reliable 
response.  
• 
Students are expected to complete all assignments and readings as well as set up 
meeting times with the instructor as necessary.  
• 
It is important for students to inform the instructor if all available office hours interfere 
with other classes during the first week of the course. 
 
 
 
1 
 
Course ID: BACC 401 
Course Name: Forensic Accounting Investigative Techniques 
Credit Hours: 3 
Semester: Spring 2014 
Course Prerequisite(s): BACC 400 
Classroom: TBA 
Time: TBA 
 
INSTRUCTOR CONTACT INFORMATION 
Instructor 
Yuan Hong 
Email 
hong@albany.edu 
Office Location 
BB (New Business School)-316 
Office Hours 
Monday 3:00-5:00PM or by Appointment 
 
COURSE DESCRIPTION 
Students will learn the process and principal techniques for conducting fraud examinations and other 
forensic investigations as well as why careful attention to them is critical to a successful investigation. 
Students will learn the role of analytical review procedures in the investigation of financial fraud. 
Document analysis and the art of effective interviewing during investigations will be explored.  
Students will learn the proper procedures for evidence handling. Finally students will learn to write a 
report that succinctly and effectively communicates the completed investigation. Relevant guidance 
from the professional, regulatory and legal environment will be discussed. Prerequisite(s): BACC 400. 
Offered spring semester only. 
LEARNING OBJECTIVES 
After successfully completing this course, the student should be able to: 
• Articulate the process of forensic investigation and fraud examination. 
• Utilize effective analytical techniques conduct forensic investigation and fraud 
examination. 
• Demonstrate effective interviewing techniques in a forensic investigation and fraud 
examination 
• Prepare a written investigation report for a specific engagement. 
COURSE STRUCTURE 
This course is offered as a combination of lectures, case study, and hands-on experience of 
forensic accounting and audit tools/software. In some classes, case study and discussion are 
conducted by the instructor. Also, forensic and fraud examination tools/software are 
introduced after giving the lecture. The instructor will teach hands-on forensic and fraud 
 
 
2 
 
examination techniques and students are expected to finish the in-class exercises. Students 
should be interactively involved in the class activities.  
COURSE RESOURCES 
Course Website 
Blackboard (https://blackboard.albany.edu/) 
Textbooks 
Not Required 
Software 
ACL, R, WEKA, SPLICE, Palantir 
Reference Materials To be posted on the Blackboard prior to each class 
 
GRADING POLICY AND ASSESSMENT 
 
 
 
 
 
Class Participation: The instructor expects students to actively participate in the class 
discussion. Critical thinking and learning to express opinions in a group setting is critical to 
everyone’s success as a professional. Although this level of participation may initially be 
outside the students’ comfort zone, remember that the instructor and students are on the 
same team in the learning process, and that they will be dealing with many issues that lack a 
right answer. Daily class activities provide important feedback to the instructor about how 
much students know about the subject matter and their levels of effort and preparation.  
Case study is offered in some classes, which is essential for students to foster critical thinking 
and learn analytical skills in an interactive environment. Students are highly encouraged to 
deliver their ideas in case study. 
Assignments: There will be several individual assignments throughout the semester. The 
assignments will require students to do some analytic tasks using the tools and methods 
covered in class, and/or complete the report of fraud examination. All homework 
assignments must be prepared using a word processor. They should be uploaded to 
Blackboard by the specific due date(s). 
Group Project: A group project will be performed with delivery during the last few weeks of 
this course. The project is a comprehensive work that covers all the procedures of the fraud 
investigation and also fosters students’ teamwork ability in practical fraud examination. The 
group can be gathered voluntarily and each group includes 3-5 students. The topic will be 
Activity 
Portion of Grade 
Class Participation 
15% 
Assignments 
25% 
Group Project 
20% 
Exams 
40% 
 
 
 
 
3 
 
assigned earlier. Each group should present their work and submits the summary (only one 
copy is required for each group) in the week before the finals week. 
Exams: Students are required to take both Midterm and Final exams. The Midterm covers 
the contents of the first 6 classes and the final exam covers everything from Week 1-13. For 
exams, students will be responsible for the material covered in the lecture slides, projects and 
class discussions. In case you cannot attend the exam(s) on the scheduled date(s), a proof 
with appropriate excuse should be shown to the instructor. Otherwise, a make-up exam 
cannot be authorized. 
Grading: The instructor will try to grade assignments, projects and exams fairly and return 
them within a reasonable time period with relevant comments and to be available to discuss 
questions. Students are encouraged to setup an appointment to talk with the grader within a 
week of receiving a grade.  
Late Submission: Late assignments and project will receive 25% off per day late from the 
final possible grade for the exercise unless authorized by the instructor.  
Disability Statement: Students at UAlbany should contact the Disabled Student Services 
Center and the relevant professor at least a week before each F2F exam if requiring additional 
assistance. Missing any assessment without a verifiable legitimate excuse will result in a grade 
of zero. F2F Exams are expected to be closed-book unless otherwise specified and all 
personal electronic devices (laptops, cell phones, PDA's, etc.) should be put away. 
COURSE OUTLINE 
Week 
Topic 
Comments 
1 
Introduction to Forensic Accounting and Fraud Examination  
2 
Preliminary Data Analysis for Audit: Software/Tools, 
Descriptive Statistics, Data Visualization and Basic Analysis 
R and ACL 
Assignment 1 
3 
Data Analytics Techniques I: Classification, Clustering 
WEKA 
4 
Data Analytics Techniques II: Numeric Data Analysis, Text 
Mining 
Text Mining Tool 
(SPLICE) 
5 
Fraud Examination Evidence I: Physical, Documentary and 
Observational Evidence 
U.S. Food Service 
Case Study 
6 
Fraud Examination Evidence II: Interview and Interrogation 
Methods 
Perplexed Payroll 
Clerk Case Study 
7 
MIDTERM 
 
 
 
4 
 
8 
Fraud Examination Evidence III: Forensic Science and 
Computer Forensics 
Banking Industry 
Case Study  
9 
The Fraud Report, Litigation, and the Recovery Process 
Assignment 2 
10 
Documenting and Presenting the Case 
 
11 
Fraud Preventive Controls and Risk Management 
 
12 
Predictive Audit I: Regression  
R 
13 
Predictive Audit II: Expert System 
Assignment 3 
14 
FINAL EXAM 
 
 
ACADEMIC INTEGRITY & HONESTY 
Students MUST comply with all University at Albany’s standards of academic integrity. 
As stated on the undergraduate and graduate bulletin, "Claims of ignorance, of 
unintentional error, or of academic or personal pressures are not sufficient reasons for 
violations of academic integrity." Non-compliance with academic integrity standards, will 
result in the student being reported to the Office of Graduate Admissions or the Dean of 
Undergraduate Studies Office (whichever applies) AND receive a lowering of a paper or 
project grade of at least one full grade, receive a failing grade for a project containing 
plagiarized material or examination in which cheating occurred, receive a lowering of course 
grade by one full grade or more, a failing grade for the course, or any combination of these 
depending on the infraction.  
Violations include: Giving or receiving unauthorized help on an examination; Collaborating 
on projects, papers, or other academic exercises which is regarded as inappropriate by the 
instructor, submitting substantial portions of the same work for credit more than once, 
without the prior explicit consent of the instructor to whom the material is being submitted; 
misrepresenting material or fabricating information in an academic exercise or assignment; 
Destroying, damaging, or stealing of another's work or working materials; and presenting as 
one's own work, the work of another person (e.g., words, ideas, information, code, data, 
evidence, organizing principles, or presentation style of someone else). This includes 
paraphrasing or summarizing without acknowledgment, submission of another student's 
work as one's own, purchase of prepared research, papers or assignments, and the 
unacknowledged use of research sources gathered by someone else. Failure to indicate 
accurately the extent and precise nature of one's reliance on other sources is also a form of 
plagiarism. The student is responsible for understanding the legitimate use of sources, the 
appropriate ways of acknowledging academic, scholarly, or creative indebtedness, and the 
consequences for violating University regulations. 
 
 
5 
 
“GREAT” EXPECTATIONS 
• 
Students can expect the instructor to be open to questions and concerns, but remain 
impartial and fair to all students. 
• 
Students are expected to respectfully participate in the course and communicate with the 
instructor if there is confusion or lack of understanding of the material. In turn, the 
instructor will attempt to clarify any material. 
• 
If the instructor is unable to attend class or office hours due to a personal emergency, 
students can expect for arrangements to be made for an alternate instructor or to be 
informed in as a timely a manner as possible. 
• 
Students are expected to provide reliable contact information and inform the instructor of 
any updates.  
• 
Students are expected to contact the instructor via email, phone, or in person for reliable 
response.  
• 
Students are expected to complete all assignments and readings as well as set up meeting 
times with the instructor as necessary. It is important for students to inform the 
instructor if all available office hours interfere with other classes during the first week of 
the course. 
 
 
 
BFOR 100 
Introduction to Information Systems 
 
 
#XXXX – BFOR 100 Introduction to Information Systems (3 credits) 
Fall XXXX – Aug X – Dec X, 2014  
Course Prerequisite(s): None 
Instructor(s): 
Developer(s):  
COURSE DESCRIPTION 
This course provides a foundation of information systems concepts that can be applied to 
future learning in advanced topics. The course will include background in the history and 
social implications of computing including cyber ethics; emergent and contemporary 
information 
technology 
and 
its 
nomenclature; 
information 
and 
data 
abstraction, 
representation, manipulation and storage; operating systems; networking and the Internet, 
programming languages, logic, and algorithms; database systems; digital graphics and 
multimedia; and information security.   
 
 
LEARNING OBJECTIVES 
Overarching Goal: Gain a foundation in information systems for future learning in advanced topics. 
 
Sub-Objectives: Student will learn how to: 
1. 
Critically discuss and evaluate ethical and legal issues and codes of practice related to the use of 
information systems 
2. 
Recognize computer and network hardware and peripherals 
3. 
Compare the advantages and disadvantages of different types of networks 
4. 
Distinguish between different file and data structures and data types 
5. 
Identify basic information security risks and engage in common secure practices 
6. 
Use a database for data storage and retrieval 
7. 
Apply programmatic logic for solving business problems 
8. 
Evaluate and identify adequate information sources and how to properly attribute intellectual credit 
 
COURSE FORMAT: F2F ON-CAMPUS DELIVERY 
The course will be offered in-class and include both lecture and hands-on laboratory components. 
In addition, learning will be supplemented with assigned readings or videos, discussions, and 
other assignments and exercises related to the course topics.  
 
F2F Meeting Dates, Times, and Location: In-class sessions will be held on DAYS between 
Month 00, 000 to Month 00, 0000 except for the following dates: Month 00, 0000, Month 00, 
0000 & Month 00, 0000 that are school holidays. These sessions will be held at 00:00 EST in 
ROOM located at CAMPUS LOCATION. Please refer to the following link for directions: 
http://www.directions.com  
 
INSTRUCTOR CONTACT 
Type 
Information 
Availability 
Email 
 
 
  
 
Phone 
 
 
 
In Person 
 
 
 
 
BFOR 100 
Introduction to Information Systems 
 
Virtual 
Chat 
 
 
 
 
COURSE RESOURCES 
Type 
Information 
Course Website 
https://blackboard.albany.edu 
Instructor Website 
http://www.instructorwebsite.edu 
Textbook(s) 
AuthLastName,FI. MI. (0000). BookTitle, 0th ed. City, STATE: 
Publisher. ISBN: 000-0-000-00000-0 
Reference Books(s) 
AuthLastName,FI. MI. (0000). BookTitle, 0th ed. City, STATE: 
Publisher. ISBN: 000-0-000-00000-0 
 
TECHNICAL RESOURCES 
If you experience technical problems that interrupt your ability to complete class work, it’s 
important that you know where to seek help immediately. Here is a simple guide for where you 
should direct questions and calls for help. 
Problems with… 
You should contact… 
Logging into your ISP (Internet 
Service Provider); connecting to 
websites; launching web browser 
(e.g. Internet Explorer, Firefox) 
Your ISP. The following links are provided to a couple of 
local ISP providers contact pages. If yours is not on this 
list, look up your ISP in a search engine and find a 
"Contact Us" page: TimeWarner (Road Runner & 
Verizon (FIOS) 
Connecting & logging into to the 
UAlbany Blackboard website; 
accessing your course(s); 
interacting or participating in 
course activities, submission of 
assignment or file attachments in 
course. 
The ITS Help Desk by using the ITS Help Request Form 
(http://www.albany.edu/its/help) or call (518) 442-4000. 
Press "1" for students. Then, press "2" for help with 
Blackboard. 
Forgotten PIN when trying to get 
forgotten password. 
The ITS HelpDesk at (518) 442-3700 or go to Lecture 
Center (LC) 27 at the UAlbany main campus with your 
SUNYCard and another form of identification. Press “1” 
for assistance when calling. 
 
Please note that your instructor is not on this list. If you send inquiries about these technical problems, 
you will be referred to the resources listed above. 
 
COURSE ACTIVITIES 
 
Lectures: Instructor-led lectures that may be supplemented with expert guest lectures on 
course-related topics will be offered in class. The lecture material should summarize and 
expand on the knowledge obtained from the assigned readings and assignments. 
 
 
 
BFOR 100 
Introduction to Information Systems 
 
Readings: Chapters, articles, or other readings assigned in the class are meant to 
supplement or reinforce the other course materials and will not generally have duplicate 
content. 
 
Cases: Case studies using actual examples to provide real-world relevance to the topics in 
the class.  
 
Discussions: There will be discussions in the class that may include debates about 
ethical and legal behavior or privacy and security concerns. The following rubric will be used 
for evaluation of these discussions. 
 
Criteria 
Outstanding 
90-100 
Proficient 
80-89 
Marginal 
70-79 
Unsatisfactory 
0-69 
Content 
Critical 
Thinking 
Comments/questi
ons are thought 
provoking and 
display insight. 
They add to the 
depth of the 
discussion. 
Resources/citatio
ns are used to 
support 
comments or 
ideas. 
Comments/questio
ns are appropriate/ 
relative and add to 
the discussion, but 
may not always 
display insight or 
provoke thought. 
Resources/citation
s may be used to 
support comments 
or ideas. 
Comments/question
s are relative but do 
not add to the 
discussion or may 
show lack of insight. 
Resources/citations 
may be used to 
support comments 
or ideas. 
Comments/questi
ons are not 
relative to the 
case and do not 
add to the 
discussion. 
No references or 
citations are used. 
 
Assignments/Exercises: Assignments and exercises will be provided to evaluate 
understanding and for applying content learned in either lecture material or readings. There 
will be several assignments in the class in-class and assigned for homework. These include 
assignments leading up to the paper and annotated bibliography as well as technical 
assignments related to setting up information systems and programming. 
 
F2F Exams: These exams will be offered to assess individual content review and 
understanding. Exam I will cover topics discussed in the first 6 weeks of the course. Exam II 
will cover topics covered after Exam I.  
 
Hands-On Laboratories: Laboratory exercises will be offered where students get 
hands-on experience using tools and techniques in the field. These will include setting up an 
operating system as well as programming exercises among others. 
 
Participation: Course attendance is important part of building long-lasting relationships 
and a learning community between your peers and your instructors. Not only does it allow 
you to share your opinions on course topics, but also you benefit from your classmates’ and 
instructor perspectives.  Participation in the course can be measured with attendance, and/or 
in-class assignments. 
 
Paper and Annotated Bibliography: Students will spend the time of the class 
towards writing an academic paper on an emerging topic in computing and information 
technology. This will be structured in several assignments throughout the semester where 
students will define their topic; summarize and evaluate scholarly sources from both print and 
 
 
BFOR 100 
Introduction to Information Systems 
 
online media; create an outline; and then write and submit a 6-page paper (double-spaced, in 
12pt font, 1 in. margins) and annotated bibliography. 
 
 
GRADING AND ASSESSMENT 
We try to grade assignments fairly and return them within a reasonable time period with 
relevant comments and to be available to discuss questions. Students are expected to set 
up an appointment to talk with the grader within a week of receiving a grade. Please let us 
know if there is a mistake in calculation – mistakes happen! 
Late assignments, projects, or papers will receive 15% off per day late from the final possible 
grade for the exercise unless there is a legitimate excuse. 
Students at UAlbany should contact the Disabled Student Services Center and the relevant 
professor at least a week before each F2F exam if requiring additional assistance. Missing 
any assessment without a verifiable legitimate excuse will result in a grade of zero. F2F 
Exams are expected to be closed-book unless otherwise specified and all personal electronic 
devices (laptops, cell phones, PDA's, etc.) should be put away.  
 
 
 
 
 
 
 
 The instructor is expected to get approval of the entire class prior to making any changes regarding the grading 
rubric. 
 
 
COURSE SCHEDULE 
Activity 
Portion of 
Grade 
Participation 
10% 
Discussions 
5% 
Assignments & Hands-On 
Laboratories 
40% 
Exam I 
15% 
Exam II 
15% 
Paper and Annotated 
Bibliography 
15% 
Overall Accumulative Point Evaluation: 
Point Range Letter Grade 
97-100 
A 
91-96  
A- 
86-90 
B+ 
81-85 
B 
76-80 
B- 
71-75 
C+ 
66-70 
C 
63-65 
C- 
60-62 
D  
Below 60 
E 
 
 
 
 
BFOR 100 
Introduction to Information Systems 
 
Week 
Course Activities 
1 
Introduction / Social and Business Implications of Computing 
2 
Cyber Ethics and Academic Integrity 
3 
Computer Architecture 
4 
Networks  
5 
The Internet and Digital Multimedia 
6 
Information Security Basics 
7 
Exam I  
8 
Operating Systems & Data Structures 
9 
Data Types and Database Applications 
10 
Data Representation, Number Systems & File Structures 
11 
Programming Logic & Problem-Solving 
 12 
Applied Programming, Part 1  
13 
Applied Programming, Part 2 
14 
Exam II 
 
This schedule is subject to change and students are expected to be aware of any modifications to including, but not 
limited to: due dates, readings, exam dates, and project guidelines, announced via email, Blackboard 
announcements or during class hangouts. 
 
ACADEMIC INTEGRITY & HONESTY  
Students MUST comply with all University at Albany’s standards of academic integrity. As 
stated on the undergraduate and graduate bulletin, "Claims of ignorance, of unintentional 
error, or of academic or personal pressures are not sufficient reasons for violations of 
academic integrity." Non-compliance with academic integrity standards, will result in the 
student being reported to the Office of Graduate Admissions or the Dean of Undergraduate 
Studies Office (whichever applies) AND receive a lowering of a paper or project grade of at 
least one full grade, receive a failing grade for a project containing plagiarized material or 
examination in which cheating occurred, receive a lowering of course grade by one full grade 
or more, a failing grade for the course, or any combination of these depending on the 
infraction.  
Violations include: Giving or receiving unauthorized help on an examination; Collaborating 
on projects, papers, or other academic exercises which is regarded as inappropriate by the 
instructor(s), submitting substantial portions of the same work for credit more than once, 
without the prior explicit consent of the instructor(s) to whom the material is being submitted; 
misrepresenting material or fabricating information in an academic exercise or assignment; 
Destroying, damaging, or stealing of another's work or working materials; and presenting as 
one's own work, the work of another person (e.g., words, ideas, information, code, data, 
evidence, organizing principles, or presentation style of someone else). This includes 
paraphrasing or summarizing without acknowledgment, submission of another student's 
work as one's own, purchase of prepared research, papers or assignments, and the 
unacknowledged use of research sources gathered by someone else. Failure to indicate 
accurately the extent and precise nature of one's reliance on other sources is also a form of 
plagiarism. The student is responsible for understanding the legitimate use of sources, the 
appropriate ways of acknowledging academic, scholarly, or creative indebtedness, and the 
consequences for violating University regulations. If you have questions about academic 
integrity - ASK! 
“GREAT” EXPECTATIONS  
 
 
BFOR 100 
Introduction to Information Systems 
 
• 
Students can expect the instructor to be open to questions and concerns, but remain 
impartial and fair to all students. 
• 
Students are expected to respectfully participate in the course and communicate with 
the instructor if there is confusion or lack of understanding of the material. In turn, the 
instructor will attempt to clarify any material. 
• 
If the instructor is unable to attend class or office hours due to a personal emergency, 
students can expect for arrangements to be made for an alternate instructor or to be 
informed in as a timely a manner as possible. 
• 
Students are expected to provide reliable contact information and inform the instructor of 
any updates.  
• 
Students are expected to contact the instructor via email, phone, or in person for reliable 
response.  
• 
Students are expected to complete all assignments and readings as well as set up 
meeting times with the instructor as necessary.  
• 
It is important for students to inform the instructor if all available office hours interfere 
with other classes during the first week of the course. 
 
 
BFOR 201 
Introduction to Digital Forensics 
 
1 
 
Course ID: BFOR 201 (Formerly BITM 201) 
Course Name: Introduction to Digital Forensics 
Credit Hours: 3 
Semester: Fall 2013  
Instructor: Fabio R. Auffant II 
Course Prerequisites: No 
Textbook: No 
 
COURSE DESCRIPTION 
In this course, students will learn the fundamental process of analyzing data collected 
from electronic devices (including computers, media, and other digital evidence). 
Students will become familiar with proper techniques and tools utilized for securing, 
handling and preserving digital and multimedia evidence at physical crime scenes. 
Students will utilize examination and chain of custody forms, as well as prepare crime 
scene & digital acquisition reports related to administrative, civil and criminal 
investigations. 
 
LEARNING OBJECTIVES 
After completing this class the student should be able to: 
• Describe how to secure and process an incident or crime scene involving digital 
evidence. 
• Define computer forensics analysis concepts, tools and techniques 
• Identify hardware & software tools utilized during forensic examinations of digital 
evidence. 
• Complete professional forms and reports associated with Digital Forensic 
investigations 
 
COURSE FORMAT 
Online or Classroom: The course may be offered online to offer a more flexible learning 
experience, through classroom delivery to ensure hands-on experience of forensic tools 
and techniques, or a combination of online and classroom environments. Students are 
provided with an interactive learning environment through instructor audio lesson plans, 
online discussion groups, and other learning assessments. Even though the course is 
spread over several weeks, it is important that students stay on schedule so that they can 
participate with other students in discussions. The class should require approximately 120 
hours of work including instruction audio of lecture material, student assignments, 
quizzes, discussion postings, and the reading of the class textbook, as well as external 
publications. 
 
 
 
 
BFOR 201 
Introduction to Digital Forensics 
 
2 
 
 
INSTRUCTOR CONTACT 
 
Type 
Information 
Availability 
Email 
fauffant@albany.edu  
Dates and times TBA 
Virtual 
Chat 
Via Skype, TBA in class 
Dates and times TBA 
 
COURSE RESOURCES 
Course Website 
 
Reference Material and 
External Readings 
To be posted by instructor during course activities 
Technical Support 
 
 
COURSE OUTLINE 
Week Topic 
Activities 
1 
Computer (Digital) Forensics as a Profession 
Class Discussion 
2 
Understanding Computer Investigations & Terminology 
Assignment 
3 
Processing Crime/Incident Scenes & Reporting  
Assignment 
4 
Computer Forensic Tools & Write-Blockers 
Assignment 
5 
Forensic Acquisition Process 
Assignment 
6 
Windows OS & Pre-Analysis Processing 
Assignment 
7 
MID-TERM EXAM 
 
8 
ProDiscover ® Acquisition & Pre-Analysis Processing 
Lab Exercise 
9 
EnCase ® Acquisition & Pre-Analysis Processing 
Lab Exercise 
10 
FTK ® Acquisition & Pre-Analysis Processing 
Lab Exercise 
11 
Mobile Device Forensic Processing 
Lab Exercise 
12 
Network & Virtual Machine Processing 
Lab Exercise 
13 
COURSE PROJECT 
Student 
Presentation 
14 
FINAL EXAM 
 
 
COURSE ACTIVITIES 
Lab Exercises: Lab Exercises will also be assigned and graded by the instructor. 
Students will be required to complete Lab Exercises and submit to the instructor by 
specific date(s) and grading assessment will be based on the analysis of sample data and 
satisfactory completion of forensic reports. 
 
 
 
BFOR 201 
Introduction to Digital Forensics 
 
3 
 
 
Assignments: Assignments will be assigned and graded by the instructor and will be 
based on the weekly discussion topic(s). Students will be required to complete and submit 
to the instructor by specific date(s) and grading assessment will be based on acceptable 
grammar, terminology, formatting and substantive content. 
 
Project: Course project will be assigned and graded by the instructor, based on 
individual and/or group assignments. Students will be required to complete and 
submit to the instructor by a specific date for grading and assessment. 
 
GRADING AND ASSESSMENT 
We try to grade assignments fairly and return them within a reasonable time period with 
relevant comments and to be available to discuss questions. Students are expected to set 
up an appointment to talk with the grader within a week of receiving a grade. Please let 
us know if there is a mistake in calculation – mistakes happen! 
Late assignments, projects, or papers will receive 25% off per day late from the final 
possible grade for the exercise unless authorized by the instructor. 
 
Students at UAlbany should contact the Disabled Student Services Center and the 
relevant professor at least a week before each F2F exam if requiring additional 
assistance. Missing any assessment without a verifiable legitimate excuse will result in a 
grade of zero. F2F Exams are expected to be closed-book unless otherwise specified and 
all personal electronic devices (laptops, cell phones, PDA's, etc.) should be put away. 
 
 
BFOR 201 
Introduction to Digital Forensics 
 
4 
 
 
Activity 
Portion of 
Grade 
Description 
Assignments 
25% 
 
Lab Exercises 
25% 
 
Project 
20% 
 
Exams 
30% 
 
 
 
 
Overall Accumulative Point Evaluation: 
Point Range Letter Grade 
97-100 
(A) 
91-96  
(A-) 
86-90 
(B+) 
81-85 
(B) 
76-80 
(B-) 
71-75 
(C+) 
66-70 
(C) 
63-65 
(C-) 
60-62 
(D)  
Below 60 
(E)  
 
  
 
 
BFOR 201 
Introduction to Digital Forensics 
 
5 
 
ACADEMIC INTEGRITY & HONESTY 
 
 
Students MUST comply with all University at Albany’s standards of academic 
integrity. As stated on the undergraduate and graduate bulletin, "Claims of ignorance, of 
unintentional error, or of academic or personal pressures are not sufficient reasons for 
violations of academic integrity." Non-compliance with academic integrity standards, will 
result in the student being reported to the Office of Graduate Admissions or the Dean of 
Undergraduate Studies Office (whichever applies) AND receive a lowering of a paper or 
project grade of at least one full grade, receive a failing grade for a project containing 
plagiarized material or examination in which cheating occurred, receive a lowering of course 
grade by one full grade or more, a failing grade for the course, or any combination of these 
depending on the infraction.  
 
Violations include: Giving or receiving unauthorized help on an examination; 
Collaborating on projects, papers, or other academic exercises which is regarded as inappropriate 
by the instructor(s), submitting substantial portions of the same work for credit more than once, 
without the prior explicit consent of the instructor(s) to whom the material is being submitted; 
misrepresenting material or fabricating information in an academic exercise or assignment; 
Destroying, damaging, or stealing of another's work or working materials; and presenting as 
one's own work, the work of another person (e.g., words, ideas, information, code, data, 
evidence, organizing principles, or presentation style of someone else). This includes 
paraphrasing or summarizing without acknowledgment, submission of another student's work as 
one's own, purchase of prepared research, papers or assignments, and the unacknowledged use of 
research sources gathered by someone else. Failure to indicate accurately the extent and precise 
nature of one's reliance on other sources is also a form of plagiarism. The student is responsible 
for understanding the legitimate use of sources, the appropriate ways of acknowledging 
academic, scholarly, or creative indebtedness, and the consequences for violating University 
regulations. If you have questions about academic integrity - ASK! 
“GREAT” EXPECTATIONS 
• 
Students can expect the instructor to be open to questions and concerns, but remain impartial 
and fair to all students. 
• 
Students are expected to respectfully participate in the course and communicate with the 
instructor if there is confusion or lack of understanding of the material. In turn, the instructor 
will attempt to clarify any material. 
• 
If the instructor is unable to attend class or office hours due to a personal emergency, 
students can expect for arrangements to be made for an alternate instructor or to be informed 
in as a timely a manner as possible. 
• 
Students are expected to provide reliable contact information and inform the instructor of any 
updates.  
• 
Students are expected to contact the instructor via email, phone, or in person for reliable 
response.  
• 
Students are expected to complete all assignments and readings as well as set up meeting 
times with the instructor as necessary. It is important for students to inform the instructor if 
all available office hours interfere with other classes during the first week of the course. 
 
 
BFOR 202 
Cyber Crime Investigations 
 
1 
 
Course ID: BFOR 202 (Formerly BITM 202) 
Course Name: Cyber Crime Investigations 
Credit Hours: 3 
Semester: Fall 2013 
Instructor: Y. Hong 
Course Prerequisites: Yes  
Textbook: No 
 
COURSE DESCRIPTION 
This course will teach students forensic investigative techniques specifically for 
managing cyber crimes including collection and preservation of data from different 
sources, such as the Internet and "cloud" computing environments. Students will learn the 
legal processes available for collecting and preserving such evidence in conducting cyber 
investigations. Offered fall semester only. 
 
 
LEARNING OBJECTIVES 
 
After completing this class the student should be able to: 
• 
Define Federal and State laws and legal processes relevant to cyber crime 
investigations. 
• 
Describe how to investigate a crime or incident facilitated by technology or the 
Internet. 
• 
Utilize proper methods for collecting and preserving potential evidence from the 
Internet. 
• 
Utilize proper methods collecting and preserving digital evidence at physical cyber 
crime scenes. 
 
COURSE FORMAT 
 
Face-to-Face Classes & Online Activities: The course is offered as a combination of 
classroom delivery, hands-on experience of forensic tools and techniques, and online 
activities (i.e., discussion). Students are provided with an interactive learning environment 
through instructor audio lesson plans, online discussion groups (on the Blackboard), and 
other learning assessments. Even though the course is spread over several weeks, it is 
important that students stay on schedule so that they can participate with other students in 
discussions. The class should require approximately 120 hours of work including 
instruction audio of lecture material, student assignments, quizzes, discussion postings, 
and the reading of the posted materials. 
 
 
 
 
 
BFOR 202 
Cyber Crime Investigations 
 
2 
 
INSTRUCTOR CONTACT 
 
Instructor 
Yuan Hong 
Email 
hong@albany.edu 
Office Location 
BB 316 (New Business School) 
Office Hours 
Monday 3:00-5:00PM or by Appointment 
 
 
COURSE RESOURCES 
 
Course Website 
Blackboard (or TBA) 
Software 
To be introduced in the Classes 
Reference Material 
To be posted on the Blackboard during Course Activities 
External Readings 
To be posted on the Blackboard 
 
COURSE OUTLINE 
 
Week Topic 
Activities 
1 
Introduction to Cyber Crime Investigations 
Introduction & 
Discussion 
2 
Labor Day (Classes Suspended) 
 
3 
Profiles, Motives and Philosophies of Cyber Crime Offenders 
Discussion 
4 
Basic Techniques used by Offenders to Commit Cyber Crimes Discussion 
5 
Responding to Cyber Incidents and Crimes 
Discussion 
6 
Report Writing and Presentation of Cyber Crime Evidence 
Assignment I  
(DUE TBA) 
7 
Interviews and Interrogations Related to Cyber Crimes 
Discussion 
8 
MID TERM EXAM (Monday, Oct. 14th, BA-222) 
 
9 
Collection & Preservation of Online Evidence 
Assignment II 
(DUE TBA) 
10 
Collection and Preservation of Digital Evidence at Crime 
Scenes 
Assignment III 
(DUE TBA) 
Project Issued 
11 
Evidence Collection at a Mock Incident or Crime Scene 
Assignment IV 
(DUE TBA) 
12 
Role of CC investigation & Prevention in Business and 
Management Environments 
Discussion 
13 
Role of CC investigation and prevention in the Criminal 
Justice System Environment 
Discussion 
14 
GROUP PROJECT (Monday, Nov. 25th, BA-222) 
Presentation 
(Report DUE 
TBA) 
15 
FINAL EXAM (Time & Location TBA) 
 
 
 
BFOR 202 
Cyber Crime Investigations 
 
3 
 
COURSE ACTIVITIES 
Discussions: Discussions topics will also be assigned and graded by the instructor. 
Students will be required to post a discussion as well as at least two (2) responses each 
week. There will be a general discussion forum available for students (on the Blackboard) 
to talk amongst themselves based on topics outside of class that will not be graded. 
Assignments: Assignments will be assigned and graded by the instructor and will be 
based on the weekly discussion topic(s). Students will be required to complete and 
submit to the instructor by specific date(s) and grading assessment will be based on 
acceptable grammar, terminology, formatting and substantive content. 
Group Project: A group project will be performed with delivery during the last few 
weeks of this course. Details of this group project assignment will be available on 
blackboard later. 
GRADING AND ASSESSMENT 
 
Grading: The instructor will try to grade discussions, assignments, projects and exams 
fairly and return them within a reasonable time period with relevant comments and to be 
available to discuss questions. Students are encouraged to setup an appointment to talk 
with the grader within a week of receiving a grade.  
Late Submission: Late assignments, projects, or papers will receive 25% off per day late 
from the final possible grade for the exercise unless authorized by the instructor.  
Disability Statement: Students at UAlbany should contact the Disabled Student Services 
Center and the relevant professor at least a week before each F2F exam if requiring 
additional assistance. Missing any assessment without a verifiable legitimate excuse will 
result in a grade of zero. F2F Exams are expected to be closed-book unless otherwise 
specified and all personal electronic devices (laptops, cell phones, PDA's, etc.) should be 
put away. 
 
 
 
 
 
 
 
 
 
 
Activity 
Portion of Grade 
Assignments 
25% 
Discussions 
25% 
Project 
20% 
Exams 
30% 
 
 
 
 
BFOR 202 
Cyber Crime Investigations 
 
4 
 
Criteria 
Outstanding 
90-100 
Proficient 
80-89 
Marginal 
65-79 
Unsatisfactory 
Less than 65 
Content 
Critical 
Thinking 
Comments/questi
ons are thought 
provoking and 
display insight. 
They add to the 
depth of the 
discussion. 
Resources/citatio
ns are used to 
support 
comments or 
ideas. 
Comments/questi
ons are 
appropriate/ 
relative and add 
to the discussion, 
but may not 
always display 
insight or 
provoke thought. 
Resources/citatio
ns may be used to 
support 
comments or 
ideas. 
Comments/qu
estions are 
relative but do 
not add to the 
discussion or 
may show 
lack of insight. 
Resources/cita
tions may be 
used to 
support 
comments or 
ideas. 
Comments/questi
ons are not 
relative to the 
case and do not 
add to the 
discussion. 
No references or 
citations are 
used. 
Quantity 
Frequency 
Minimally 14 
postings on 7 
different days. 
Minimally 10 
postings on 5 
different days. 
Minimally 6 
postings on 3 
different days 
Less than 6 
postings of fewer 
than 3 days of 
entries. 
Timeliness 
Comments are 
always made in 
time for others to 
read and 
respond. 
Comments are 
almost always 
made in time for 
others to read and 
respond. 
Comments are 
frequently 
made late in 
the discussion 
thread and 
give little time 
to respond.  
Comments are 
made late in the 
discussion thread 
and give no time 
to respond. 
Professional
ism 
Mechanics 
Always responds 
in a professional 
demeanor, 
considers others 
opinions; 
addresses group 
members; no 
grammar/ 
spelling errors.  
Professional; 
addresses group 
members; minor 
spelling/ grammar 
errors. 
May not 
always be 
professional; 
does not 
address group 
members; 
comments & 
responses 
have frequent 
spelling / 
grammar 
issues. 
Unprofessional 
comments; very 
frequent spelling 
errors, or 
inappropriate 
terminology 
used. 
Evaluation 
Evaluation form 
has both positive 
and constructive 
criticism which 
supports the 
grade submitted. 
Evaluation form 
has both positive 
and constructive 
criticism but does 
not necessarily 
support the grade 
submitted. 
Evaluation 
form has a 
grade but does 
not have 
positive or 
constructive 
criticism. 
No evaluation 
form submitted. 
 
 
BFOR 202 
Cyber Crime Investigations 
 
5 
 
ACADEMIC INTEGRITY & HONESTY 
 
Students MUST comply with all University at Albany’s standards of academic integrity. As 
stated on the undergraduate and graduate bulletin, "Claims of ignorance, of unintentional 
error, or of academic or personal pressures are not sufficient reasons for violations of 
academic integrity." Non-compliance with academic integrity standards, will result in the 
student being reported to the Office of Graduate Admissions or the Dean of Undergraduate 
Studies Office (whichever applies) AND receive a lowering of a paper or project grade of at 
least one full grade, receive a failing grade for a project containing plagiarized material or 
examination in which cheating occurred, receive a lowering of course grade by one full grade 
or more, a failing grade for the course, or any combination of these depending on the 
infraction.  
 
Violations include: Giving or receiving unauthorized help on an examination; Collaborating on 
projects, papers, or other academic exercises which is regarded as inappropriate by the 
instructor(s), submitting substantial portions of the same work for credit more than once, without 
the prior explicit consent of the instructor(s) to whom the material is being submitted; 
misrepresenting material or fabricating information in an academic exercise or assignment; 
Destroying, damaging, or stealing of another's work or working materials; and presenting as 
one's own work, the work of another person (e.g., words, ideas, information, code, data, 
evidence, organizing principles, or presentation style of someone else). This includes 
paraphrasing or summarizing without acknowledgment, submission of another student's work as 
one's own, purchase of prepared research, papers or assignments, and the unacknowledged use of 
research sources gathered by someone else. Failure to indicate accurately the extent and precise 
nature of one's reliance on other sources is also a form of plagiarism. The student is responsible 
for understanding the legitimate use of sources, the appropriate ways of acknowledging 
academic, scholarly, or creative indebtedness, and the consequences for violating University 
regulations. If you have questions about academic integrity - ASK! 
“GREAT” EXPECTATIONS 
• 
Students can expect the instructor to be open to questions and concerns, but remain impartial 
and fair to all students. 
• 
Students are expected to respectfully participate in the course and communicate with the 
instructor if there is confusion or lack of understanding of the material. In turn, the instructor 
will attempt to clarify any material. 
• 
If the instructor is unable to attend class or office hours due to a personal emergency, 
students can expect for arrangements to be made for an alternate instructor or to be informed 
in as a timely a manner as possible. 
• 
Students are expected to provide reliable contact information and inform the instructor of any 
updates.  
• 
Students are expected to contact the instructor via email, phone, or in person for reliable 
response.  
• 
Students are expected to complete all assignments and readings as well as set up meeting 
times with the instructor as necessary. It is important for students to inform the instructor if 
all available office hours interfere with other classes during the first week of the course. 
 
 
1 
 
Course ID: BFOR 203 
Course Name: Networking – Introduction to Data Communication 
Credit Hours: 3 
Semester: Fall 2013 
Course Prerequisites: No 
 
INSTRUCTOR CONTACT INFORMATION 
Instructor 
Yuan Hong 
Email 
hong@albany.edu 
Website 
www.albany.edu/faculty/hong/ 
Office Location 
BB (New Business School)-316 
Office Hours 
Monday 3:00-5:00PM or by Appointment 
 
COURSE DESCRIPTION 
The past couple of decades have witnessed the digital revolution profoundly altering 
our society. Most of the business affairs have been linked to communication and 
networking technologies. With tremendous advances in networking, it is now feasible 
to connect all the devices such as computers, tablets, smart phones, and mainframes 
together. However, the newly innovative communication and networking 
technologies pose additional challenges to business and IT management. Nowadays, 
IT professionals must have an elementary understanding of those technologies that 
facilitate them better impose management in the organization or perform advanced 
analysis such as for network forensics. Balanced technical and managerial contents are 
incorporated to enable students to learn from various perspectives. This course will 
introduce the student to the organization and design of data networks. Topics include 
networking media, Ethernet technology, the TCP/IP protocol suite, subnets, routers 
and routing protocols, Wide Area Networks (WANs), and fundamentals of network 
management. This course includes hands-on experience of networking techniques. 
Offered fall semester only. 
LEARNING OBJECTIVES 
After completing this class the student should be able to: 
• Understand the fundamental concepts of communication and networking 
• Understand the applications and protocols built in each layer of the network 
architecture 
• Solve some practical networking problems encountered in business environment 
for IT professionals. 
• Know the state-of-the-art architectures and/or mechanisms in communication and 
networking, e.g., cloud computing 
 
 
2 
 
TEXTBOOKS 
Required Textbook: Business Data Communications and Networking, by Alan 
Dennis, Jerry Fitzgerald, and Alexandra Durcikova, Publisher: Wiley, 11 edition, 
ISBN-10: 111808683X 
Supplementary Reading: Computer Networking: A Top-Down Approach Featuring 
the Internet by James F. Kurose and Keith W. Ross, Addison Wesley, 6th Edition, 
ISBN-10: 0132856204  
COURSE ACTIVITIES 
Attendance/Participation: Regular attendance is compulsory. You are not allowed 
to access Websites not related to the course or work on something beyond the scope 
of this course during the class time. The instructor expects students to actively 
participate in the class discussion. 
Assignments & Hands-on Laboratories: Assignments will be assigned and graded 
by the instructor and will be based on the weekly discussion topic(s). Students will be 
required to complete and submit to the instructor by specific dates (generally one 
week later after the assigning it). Grading assessment will be based on acceptable 
grammar, terminology, formatting and substantive content. Moreover, laboratory 
exercise will be offered for students to learn hands-on experiences in networking 
management. 
Group Project: A group project will be performed with delivery during the last few 
weeks of this course. The group can be gathered voluntarily and each group includes 
3-5 students. The project includes literature survey/practice of new Internet 
technologies and their impact on business. Some ideas are (not limited to) web for 
business, social web, Wikipedia, web crawler, semantic web, new trends in search 
engines, web operating system, RFID business cases, mobile Internet, P2P 
applications, etc. Each group is expected to submit the survey and give a presentation 
in the week before final exam. 
Exams: Students are required to take both Midterm and Final exams. The Midterm 
covers the contents of the first 6 classes and the final exam covers everything from 
Week 1-14. For exams, students will be responsible for the material covered in the 
lecture slides, projects and class discussions. In case you cannot attend the exam(s) on 
the scheduled date(s), a formal proof with appropriate excuse should be shown to the 
instructor. Otherwise, a make-up exam cannot be authorized. 
 
 
 
3 
 
COURSE OUTLINE 
Week 
Topic 
1 
Introduction and Fundamental Concepts 
2 
Network Models and Standards 
3 
Application Layer 
4 
Physical Layer 
5 
Data Link Layer 
6 
Network and Transport Layers 
7 
MID TERM EXAM 
8 
Wired Local Area Networks (LAN) 
9 
Wireless and Mobile Network 
10 
Internet 
11 
Network Management and Design 
12 
Network Security 
13 
Cloud Computing 
14 
Project Presentations 
15 
FINAL EXAM 
 
GRADING POLICY AND ASSESSMENT 
Activity 
Portion of 
Grade 
Participation 
10% 
Assignments/Lab Exercises 
25% 
Project 
15% 
Midterm 
25% 
Final Exam 
25% 
 
 
4 
 
 
Grading: The instructor will try to grade assignments, project and exams fairly and 
return them within a reasonable time period with relevant comments and to be 
available to discuss questions. Students are encouraged to setup an appointment to 
talk with the grader within a week of receiving a grade.  
Late Submission: Late submission of assignments or project will receive 25% off per 
day late from the final possible grade for the exercise unless authorized by the 
instructor.  
Disability Statement: Students at UAlbany should contact the Disabled Student 
Services Center and the relevant professor at least a week before each F2F exam if 
requiring additional assistance. Missing any assessment without a verifiable legitimate 
excuse will result in a grade of zero. F2F Exams are expected to be closed-book unless 
otherwise specified and all personal electronic devices (laptops, cell phones, PDA's, 
etc.) should be put away. 
 
Criteria 
Outstanding 
90-100 
Proficient 
80-89 
Marginal 
65-79 
Unsatisfactor
y 
Less than 65 
Content 
Critical 
Thinking 
Comments/questi
ons are thought 
provoking and 
display insight. 
They add to the 
depth of the 
discussion. 
Resources/citatio
ns are used to 
support 
comments or 
ideas. 
Comments/questi
ons are 
appropriate/ 
relative and add 
to the discussion, 
but may not 
always display 
insight or 
provoke thought. 
Resources/citatio
ns may be used to 
support 
comments or 
ideas. 
Comments/qu
estions are 
relative but do 
not add to the 
discussion or 
may show lack 
of insight. 
Resources/cita
tions may be 
used to 
support 
comments or 
ideas. 
Comments/q
uestions are 
not relative to 
the case and 
do not add to 
the discussion. 
No references 
or citations 
are used. 
Quantity 
Frequency 
Minimally 14 
postings on 7 
different days. 
Minimally 10 
postings on 5 
different days. 
Minimally 6 
postings on 3 
different days 
Less than 6 
postings of 
fewer than 3 
days of 
entries. 
 
 
 
 
5 
 
Timeliness 
Comments are 
always made in 
time for others to 
read and respond. 
Comments are 
almost always 
made in time for 
others to read and 
respond. 
Comments are 
frequently 
made late in 
the discussion 
thread and give 
little time to 
respond.  
Comments are 
made late in 
the discussion 
thread and 
give no time 
to respond. 
Profession
alism 
Mechanics 
Always responds 
in a professional 
demeanor, 
considers others 
opinions; 
addresses group 
members; no 
grammar/ 
spelling errors.  
Professional; 
addresses group 
members; minor 
spelling/ 
grammar errors. 
May not always 
be 
professional; 
does not 
address group 
members; 
comments & 
responses have 
frequent 
spelling / 
grammar 
issues. 
Unprofessiona
l comments; 
very frequent 
spelling errors, 
or 
inappropriate 
terminology 
used. 
Evaluation 
Evaluation form 
has both positive 
and constructive 
criticism which 
supports the 
grade submitted. 
Evaluation form 
has both positive 
and constructive 
criticism but does 
not necessarily 
support the grade 
submitted. 
Evaluation 
form has a 
grade but does 
not have 
positive or 
constructive 
criticism. 
No evaluation 
form 
submitted. 
 
ACADEMIC INTEGRITY & HONESTY 
Students MUST comply with all University at Albany’s standards of academic 
integrity. As stated on the undergraduate and graduate bulletin, "Claims of 
ignorance, of unintentional error, or of academic or personal pressures are not 
sufficient reasons for violations of academic integrity." Non-compliance with 
academic integrity standards, will result in the student being reported to the Office of 
Graduate Admissions or the Dean of Undergraduate Studies Office (whichever 
applies) AND receive a lowering of a paper or project grade of at least one full grade, 
receive a failing grade for a project containing plagiarized material or examination in 
which cheating occurred, receive a lowering of course grade by one full grade or more, 
a failing grade for the course, or any combination of these depending on the 
infraction.  
 
 
6 
 
Violations include: Giving or receiving unauthorized help on an examination; 
Collaborating on projects, papers, or other academic exercises which is regarded as 
inappropriate by the instructor, submitting substantial portions of the same work for 
credit more than once, without the prior explicit consent of the instructor to whom 
the material is being submitted; misrepresenting material or fabricating information in 
an academic exercise or assignment; Destroying, damaging, or stealing of another's 
work or working materials; and presenting as one's own work, the work of another 
person (e.g., words, ideas, information, code, data, evidence, organizing principles, or 
presentation style of someone else). This includes paraphrasing or summarizing 
without acknowledgment, submission of another student's work as one's own, 
purchase of prepared research, papers or assignments, and the unacknowledged use of 
research sources gathered by someone else. Failure to indicate accurately the extent 
and precise nature of one's reliance on other sources is also a form of plagiarism. The 
student is responsible for understanding the legitimate use of sources, the appropriate 
ways of acknowledging academic, scholarly, or creative indebtedness, and the 
consequences for violating University regulations. 
“GREAT” EXPECTATIONS 
• Students can expect the instructor to be open to questions and concerns, but 
remain impartial and fair to all students. 
• Students are expected to respectfully participate in the course and communicate 
with the instructor if there is confusion or lack of understanding of the material. In 
turn, the instructor will attempt to clarify any material. 
• If the instructor is unable to attend class or office hours due to a personal 
emergency, students can expect for arrangements to be made for an alternate 
instructor or to be informed in as a timely a manner as possible. 
• Students are expected to provide reliable contact information and inform the 
instructor of any updates.  
• Students are expected to contact the instructor via email, phone, or in person for 
reliable response.  
• Students are expected to complete all assignments and readings as well as set up 
meeting times with the instructor as necessary. It is important for students to 
inform the instructor if all available office hours interfere with other classes during 
the first week of the course. 
 
 
 
BFOR 204 
Fundamentals of Information and Cyber 
Security 
 
 
BFOR 204 Fundamentals Information and Cyber Security 
Course Prerequisite(s): BFOR 100 or Permission of the Instructor 
Instructor(s): TBD 
Developer(s): Sanjay Goel and Damira Pon 
 
COURSE DESCRIPTION 
This course covers computer and network security. This course will examine general 
security 
concepts 
that 
include: 
communication 
security, 
infrastructure 
security, 
operation/organizational security, basic cryptography and steganography. Students will learn 
and apply de facto security best practices administering clients, servers and firewalls in a 
dedicated computer network laboratory. Students will have the opportunity to assess 
vulnerabilities and administrate Information Security. Offered spring semester only. 
 
 
LEARNING OBJECTIVES 
Overarching Goal: Understand information security infrastructure and the security risks to an 
organization 
 
Sub-Objectives: Student will learn to 
• 
Deploy and configure tools for ensuring network and data security 
• 
Identify the attacks and the possible mechanisms of launching them 
• 
Relate network threats to vulnerabilities in the TCP/IP network stack 
• 
Apply cryptographic concepts to security e.g. confidentiality, integrity, availability 
• 
Understand psychological emotions exploited by hackers for social engineering attacks.   
• 
Read and Interpret log files 
 
 
COURSE FORMAT: FACE-TO-FACE (F2F) ON-CAMPUS DELIVERY 
The course will be offered in-class and include both lecture and hands-on laboratory 
components. In addition, learning will be supplemented with assigned readings or videos, 
discussions, and other assignments and exercises related to the course topics. 
 
F2F Meeting Dates, Times, and Location: The class will be in a three hour session on 
campus with the location and time provided by the registrar for any specific semester. 
 
INSTRUCTOR CONTACT 
Type 
Information 
Availability 
Email 
goel@albany.edu 
 
 
Phone 
518 956 8323 
 
In Person 
BB 311 
 
Virtual 
Chat 
 
 
 
 
 
 
 
BFOR 204 
Fundamentals of Information and Cyber 
Security 
 
COURSE RESOURCES 
Type 
Information 
Course Website 
TBD 
Instructor Website 
http://www.albany.edu/~goel 
 
Textbook(s) 
TBD 
Reference Books(s) 
TBD 
 
TECHNICAL RESOURCES 
If you experience technical problems that interrupt your ability to complete class work, it’s 
important that you know where to seek help immediately. Here is a simple guide for where you 
should direct questions and calls for help. 
Problems with… 
You should contact… 
Logging into your ISP (Internet 
Service Provider); connecting to 
websites; launching web browser 
(e.g. Internet Explorer, Firefox) 
Your ISP. The following links are provided to a couple of 
local ISP providers contact pages. If yours is not on this 
list, look up your ISP in a search engine and find a 
"Contact Us" page: TimeWarner (Road Runner & 
Verizon (FIOS) 
Connecting & logging into to the 
UAlbany Blackboard website; 
accessing your course(s); 
interacting or participating in 
course activities, submission of 
assignment or file attachments in 
course. 
The ITS Help Desk by using the ITS Help Request Form 
(http://www.albany.edu/its/help) or call (518) 442-4000. 
Press "1" for students. Then, press "2" for help with 
Blackboard. 
Forgotten PIN when trying to get 
forgotten password. 
The ITS HelpDesk at (518) 442-3700 or go to Lecture 
Center (LC) 27 at the UAlbany main campus with your 
SUNYCard and another form of identification. Press “1” 
for assistance when calling. 
 
Please note that your instructor is not on this list. If you send inquiries about these technical problems, 
you will be referred to the resources listed above. 
 
COURSE ACTIVITIES 
Lectures: Instructor-led lectures that may be supplemented with expert guest lectures on 
course-related topics will be offered in class. The lecture material should summarize and 
expand on the knowledge obtained from the assigned readings and assignments. 
 
Video Clips: Video clips of lectures may be offered for portions of the class in case we 
use a flipped classroom approach for one or more lectures. This will feature PowerPoint 
content as well as the instructor video with subtitling and transcripts available. Purely audio 
versions of the content are also available for playing on personal media players, e.g. IPods. 
To play the video, you will need to download specific video player that will be provided to you.  
 
 
BFOR 204 
Fundamentals of Information and Cyber 
Security 
 
Readings: Chapters, articles, or other readings assigned in the class are meant to 
supplement or reinforce the other course materials and will not generally have duplicate 
content. 
 
Cases: Case studies using actual examples to provide real-world relevance to the topics in 
the class. The case(s) in this course will have several cases of accounting fraud such as at 
Citibank, WorldCom, etc. 
 
Discussions: There will be a general discussion forum available for students to talk 
amongst themselves based on topics outside of class. Discussions topics will also be 
assigned and graded. The following criteria will be used for assessing discussions  
 
Criteria 
Outstanding 
90-100 
Proficient 
80-90 
Marginal 
70-80 
Unsatisfactory 
0 
Content 
Critical 
Thinking 
Discussions/Com
ments/questions 
are thought 
provoking and 
display insight. 
They add to the 
depth of the 
discussion. 
Extensive use of 
resources to 
support 
comments or 
ideas.  
Discussions/Com
ments/questions 
are appropriate/ 
relative and add to 
the discussion, but 
may not always 
display insight or 
provoke thought. 
Some use of 
resources to 
support comments 
or ideas. 
Discussions/Comme
nts/questions are 
relative but do not 
add to the 
discussion or may 
show lack of insight. 
Occasional use of 
resources to support 
comments or ideas. 
Discussions/Com
ments/questions 
are not relative to 
the case and do 
not add to the 
discussion. 
No use of 
resources to 
support comments 
or ideas. 
 
Assignments/Exercises: Students will receive several assignments during the 
course of the semester that will include homework, papers, and independent research 
 
F2F Exams: These exams will be offered to assess individual content review and 
understanding. The content of these exams will be based on the lectures preceding the exam 
and will have multiple choice and essay questions. There will be 2 or 3 unit tests through the 
semester but final exam. 
 
Project:  An end-of-semester project will be assigned to groups of students the details of 
which will be provided during the class.  
 
Hands-On Laboratories: Laboratory exercises will be offered where students get 
hands-on experience using tools and techniques in the field. Laboratory exercises take 
around 1 – 1 ½ hour to complete and will utilize classroom computer laboratories (in-class) or 
software available on the cloud that you can access with a personal computing device 
(online).  
 
Participation: Course attendance is important part of building long-lasting relationships 
and a learning community between your peers and your instructors. Not only does it allow 
you to share your opinions on course topics, but also you benefit from your classmates’ and 
instructor perspectives.  Participation in the course could be measured with attendance, 
and/or in-class assignments. 
 
 
BFOR 204 
Fundamentals of Information and Cyber 
Security 
 
Presentation: You (or group) will be expected to make a 20-minute presentation to 
the class Each person present should ask questions during the presentation and respond to 
assertions from the speaker. The grading will be done for both presentations and questions 
asked. The grading rubric is as follows: 
• 
Presentation (70%) - Content 50% / Clarity, Coherence & Organization 20% 
• 
Q&A (30%) - Question Relevance 10% / Articulation of Question 5% / Response to 
Questions  15% 
An outstanding presentation needs to be factually accurate and on-topic. The information 
should cover the topic selected and should consider the background of the audience. The 
presentation should have a clear beginning, middle, and end. Introduction should contain an 
articulate, compelling statement of the topic and inform the audience of the key ideas to be 
discussed. Any claims should be well-supported and the ending should be strong and 
conclusive. The grading for questions will be done across all presentations. Individual 
students from the same team will be graded separately. 
 
GRADING AND ASSESSMENT 
We try to grade assignments fairly and return them within a reasonable time period with 
relevant comments and to be available to discuss questions. Students are expected to set 
up an appointment to talk with the grader within a week of receiving a grade. Please let us 
know if there is a mistake in calculation – mistakes happen! 
Late assignments, projects, or papers will receive 15% off per day late from the final possible 
grade for the exercise unless there is a legitimate excuse.  
Students at UAlbany should contact the Disabled Student Services Center and the relevant 
professor at least a week before each F2F exam if requiring additional assistance. Missing 
any assessment without a verifiable legitimate excuse will result in a grade of zero. F2F 
Exams are expected to be closed-book unless otherwise specified and all personal electronic 
devices (laptops, cell phones, PDA's, etc.) should be put away.  
 
 
 
 
 
 
Note: The instructor is expected to get approval of the entire class prior to making any changes regarding the 
grading rubric. 
 
 
 
ACTIVITY 
PERCENTAGE OF GRADE 
Participation 
5% 
Cases 
15% 
Assignments & Hands-On Laboratories 
25% 
Discussions 
20% 
Exam I 
20% 
Exam II 
20% 
 
 
BFOR 204 
Fundamentals of Information and Cyber 
Security 
 
COURSE SCHEDULE 
Week 
Course Activities 
1 
Introduction & Networking Primer 
Introduction to the Course 
Networking Fundamentals 
             What is Information Security (CIA)?    
             Why is Information Security Important? 
             Adversaries: Motivations and Techniques  
2 
Information Security Basics including Human Factors and Malware 
             What is Information Security (CIA)?    
             Why is Information Security Important? 
             Adversaries: Motivations and Techniques  
Social Engineering  & Psychology 
Malware (Viruses, Worms, Spyware, Adware, Trojans) 
Email and Web Spoofing  
 
Lab: Application Security Lab 
3 
Network Security Threats 
IP Spoofing / Man-in-the-Middle 
Session Hijacking & Buffer Overflow Attacks 
Denial-Of-Service & Botnets  
ARP Cache / DNS Poisoning 
Wireless Security Protocols and Threats (MAC filtering) 
 
Lab: Network Security Lab 
4 
Part A: Cryptography 
Cryptography Basics 
Symmetric vs. Asymmetric Cryptographic Algorithms 
Symmetric Encryption 
Data Encryption Standard (DES), Triple DES, Advanced 
Encryption Standard 
Message Digests & Message Authentication Codes 
Public Key Infrastructure (PKI) 
             Digital Signatures & Digital Certificates 
5 
Web Application Security 
N-tier Web Architecture 
Session Management & Web Authentication 
Threats, e.g. Code Injection, Cross-Site Scripting, etc. 
Buffer Overflow Attacks 
OWASP Testing & Review Procedures 
 
Lab: SQL Injection Lab 
6 
Exam I 
7 
Authentication & Password Security 
Password Storage & Authentication 
Password Security Threats & Controls  
Biometrics 
 
 
 
BFOR 204 
Fundamentals of Information and Cyber 
Security 
 
Lab: Password Cracking 
8 
Authentication and Access Control 
             User Privileges / Access Classification  
             Single Sign-On  
             Security Models 
             Role Based Access Control 
Remote Access (VPNs, etc.) 
 
Case Analysis: TBD 
9 
Network Security Appliances & Assessment 
Secure Network Design 
Firewalls and Intrusion Detection Systems (IDSs) 
Honeynets & Darknets 
Introduction to Network Log Analysis (SPLUNK) 
 
Lab: Network Log Analysis 
10 
- 
 
 11 
Security Standards & Legislation 
- 
“Orange Book” 
- 
Russian State Technical Commission Guidance Documents 
- 
European General Provisions 
- 
USA Regulations (SOX, FERPA, FISMA, HIPAA, PCI) 
- 
ISO/IEC 17799:2005 
- 
International Treaties 
 
Case Analysis: Cyber Crime Treaty 
12 
Information Security Risk Analysis 
- 
Basics of risk analysis 
- 
Risk Analysis methodology 
 
Group Project: Risk Analysis of a Corporation 
13 
Exam II  
14 
Cyber Ethics  
15 
Group Presentations 
 
This schedule is subject to change and students are expected to be aware of any modifications to including, but not 
limited to: due dates, readings, exam dates, and project guidelines, announced via email, Blackboard 
announcements or during class hangouts. 
 
 
 
BFOR 204 
Fundamentals of Information and Cyber 
Security 
 
ACADEMIC INTEGRITY & HONESTY  
Students MUST comply with all University at Albany’s standards of academic integrity. As 
stated on the undergraduate and graduate bulletin, "Claims of ignorance, of unintentional 
error, or of academic or personal pressures are not sufficient reasons for violations of 
academic integrity." Non-compliance with academic integrity standards, will result in the 
student being reported to the Office of Graduate Admissions or the Dean of Undergraduate 
Studies Office (whichever applies) AND receive a lowering of a paper or project grade of at 
least one full grade, receive a failing grade for a project containing plagiarized material or 
examination in which cheating occurred, receive a lowering of course grade by one full grade 
or more, a failing grade for the course, or any combination of these depending on the 
infraction.  
Violations include: Giving or receiving unauthorized help on an examination; Collaborating 
on projects, papers, or other academic exercises which is regarded as inappropriate by the 
instructor(s), submitting substantial portions of the same work for credit more than once, 
without the prior explicit consent of the instructor(s) to whom the material is being submitted; 
misrepresenting material or fabricating information in an academic exercise or assignment; 
Destroying, damaging, or stealing of another's work or working materials; and presenting as 
one's own work, the work of another person (e.g., words, ideas, information, code, data, 
evidence, organizing principles, or presentation style of someone else). This includes 
paraphrasing or summarizing without acknowledgment, submission of another student's 
work as one's own, purchase of prepared research, papers or assignments, and the 
unacknowledged use of research sources gathered by someone else. Failure to indicate 
accurately the extent and precise nature of one's reliance on other sources is also a form of 
plagiarism. The student is responsible for understanding the legitimate use of sources, the 
appropriate ways of acknowledging academic, scholarly, or creative indebtedness, and the 
consequences for violating University regulations. If you have questions about academic 
integrity - ASK! 
“GREAT” EXPECTATIONS  
• 
Students can expect the instructor to be open to questions and concerns, but remain 
impartial and fair to all students. 
• 
Students are expected to respectfully participate in the course and communicate with 
the instructor if there is confusion or lack of understanding of the material. In turn, the 
instructor will attempt to clarify any material. 
• 
If the instructor is unable to attend class or office hours due to a personal emergency, 
students can expect for arrangements to be made for an alternate instructor or to be 
informed in as a timely a manner as possible. 
• 
Students are expected to provide reliable contact information and inform the instructor of 
any updates.  
• 
Students are expected to contact the instructor via email, phone, or in person for reliable 
response.  
• 
Students are expected to complete all assignments and readings as well as set up 
meeting times with the instructor as necessary.  
• 
It is important for students to inform the instructor if all available office hours interfere 
with other classes during the first week of the course. 
 
 
 
BFOR 300 
Databases for Digital Forensics 
 
 
 
Title: Databases for Digital Forensics 
Course Prerequisite(s): BFOR 100 or Permission of the Instructor 
Instructor(s): TBD 
Developer(s): Sanjay Goel 
 
COURSE DESCRIPTION 
A large part of digital forensics deals with extraction and collection of data across electronic 
devices each of which has different architecture. In this class students learn the traditional 
relational database design and then understand the architecture of data storage in mobile 
electronic devices. The class also discusses in depth the storage of data on the cloud and 
the ramifications of that on digital forensics. Students also learn the basic techniques for 
analyzing data including use of Structured Query Language, data mining techniques and 
social network analysis. Students will also use scripting languages to efficiently clean up 
data from text files and extract information from files. Prerequisite(s): BFOR 100 or 
permission of instructor. Offered fall semester only. 
 
LEARNING OBJECTIVES 
Overarching Goal: Understand data storage and extraction across multiple devices 
 
Sub-Objectives: Student will learn to 
• 
Create relational databases  
• 
Query information from relational databases 
• 
Apply clustering and classification techniques to data 
• 
Use scripting language to clean up data in text files  
• 
Differentiate between storage on different devices  
 
 
COURSE FORMAT: FACE-TO-FACE (F2F) ON-CAMPUS DELIVERY 
The course will be offered in-class and include both lecture and hands-on laboratory 
components. In addition, learning will be supplemented with assigned readings or videos, 
discussions, and other assignments and exercises related to the course topics. 
 
F2F Meeting Dates, Times, and Location: The class will be in a three hour session on 
campus with the location and time provided by the registrar for any specific semester. 
 
INSTRUCTOR CONTACT 
Type 
Information 
Availability 
Email 
goel@albany.edu 
 
 
Phone 
518 956 8323 
 
In Person 
BB 311 
 
Virtual 
Chat 
 
 
 
 
 
COURSE RESOURCES 
 
 
BFOR 300 
Databases for Digital Forensics 
 
 
Type 
Information 
Course Website 
TBD 
Instructor Website 
http://www.albany.edu/~goel 
 
Textbook(s) 
TBD 
Reference Books(s) 
TBD 
 
TECHNICAL RESOURCES 
If you experience technical problems that interrupt your ability to complete class work, it’s 
important that you know where to seek help immediately. Here is a simple guide for where you 
should direct questions and calls for help. 
Problems with… 
You should contact… 
Logging into your ISP (Internet 
Service Provider); connecting to 
websites; launching web browser 
(e.g. Internet Explorer, Firefox) 
Your ISP. The following links are provided to a couple of 
local ISP providers contact pages. If yours is not on this 
list, look up your ISP in a search engine and find a 
"Contact Us" page: TimeWarner (Road Runner & 
Verizon (FIOS) 
Connecting & logging into to the 
UAlbany Blackboard website; 
accessing your course(s); 
interacting or participating in 
course activities, submission of 
assignment or file attachments in 
course. 
The ITS Help Desk by using the ITS Help Request Form 
(http://www.albany.edu/its/help) or call (518) 442-4000. 
Press "1" for students. Then, press "2" for help with 
Blackboard. 
Forgotten PIN when trying to get 
forgotten password. 
The ITS HelpDesk at (518) 442-3700 or go to Lecture 
Center (LC) 27 at the UAlbany main campus with your 
SUNYCard and another form of identification. Press “1” 
for assistance when calling. 
 
Please note that your instructor is not on this list. If you send inquiries about these technical problems, 
you will be referred to the resources listed above. 
 
COURSE ACTIVITIES 
Lectures: Instructor-led lectures that may be supplemented with expert guest lectures on 
course-related topics will be offered in class. The lecture material should summarize and 
expand on the knowledge obtained from the assigned readings and assignments. 
 
Video Clips: Video clips of lectures may be offered for portions of the class in case we 
use a flipped classroom approach for one or more lectures. This will feature PowerPoint 
content as well as the instructor video with subtitling and transcripts available. Purely audio 
versions of the content are also available for playing on personal media players, e.g. IPods. 
To play the video, you will need to download specific video player that will be provided to you.  
Readings: Chapters, articles, or other readings assigned in the class are meant to 
supplement or reinforce the other course materials and will not generally have duplicate 
content. 
 
 
BFOR 300 
Databases for Digital Forensics 
 
 
 
Cases: Case studies using actual examples to provide real-world relevance to the topics in 
the class. The case(s) in this course will have several cases of accounting fraud such as at 
Citibank, WorldCom, etc. 
 
Discussions: There will be a general discussion forum available for students to talk 
amongst themselves based on topics outside of class. Discussions topics will also be 
assigned and graded. The following criteria will be used for assessing discussions  
 
Criteria 
Outstanding 
90-100 
Proficient 
80-90 
Marginal 
70-80 
Unsatisfactory 
0 
Content 
Critical 
Thinking 
Discussions/Com
ments/questions 
are thought 
provoking and 
display insight. 
They add to the 
depth of the 
discussion. 
Extensive use of 
resources to 
support 
comments or 
ideas.  
Discussions/Com
ments/questions 
are appropriate/ 
relative and add to 
the discussion, but 
may not always 
display insight or 
provoke thought. 
Some use of 
resources to 
support comments 
or ideas. 
Discussions/Comme
nts/questions are 
relative but do not 
add to the 
discussion or may 
show lack of insight. 
Occasional use of 
resources to support 
comments or ideas. 
Discussions/Com
ments/questions 
are not relative to 
the case and do 
not add to the 
discussion. 
No use of 
resources to 
support comments 
or ideas. 
 
Assignments/Exercises: Students will receive several assignments during the 
course of the semester that will include homework, papers, and independent research 
 
F2F Exams: These exams will be offered to assess individual content review and 
understanding. The content of these exams will be based on the lectures preceding the exam 
and will have multiple choice and essay questions. There will be 2 or 3 unit tests through the 
semester but final exam. 
 
Project:  An end-of-semester project will be assigned to groups of students the details of 
which will be provided during the class.  
 
Hands-On Laboratories: Laboratory exercises will be offered where students get 
hands-on experience using tools and techniques in the field. Laboratory exercises take 
around 1 – 1 ½ hour to complete and will utilize classroom computer laboratories (in-class) or 
software available on the cloud that you can access with a personal computing device 
(online).  
 
Participation: Course attendance is important part of building long-lasting relationships 
and a learning community between your peers and your instructors. Not only does it allow 
you to share your opinions on course topics, but also you benefit from your classmates’ and 
instructor perspectives.  Participation in the course could be measured with attendance, 
and/or in-class assignments. 
Presentation: You (or group) will be expected to make a 20-minute presentation to 
the class Each person present should ask questions during the presentation and respond to 
assertions from the speaker. The grading will be done for both presentations and questions 
asked. The grading rubric is as follows: 
 
 
BFOR 300 
Databases for Digital Forensics 
 
 
• 
Presentation (70%) - Content 50% / Clarity, Coherence & Organization 20% 
• 
Q&A (30%) - Question Relevance 10% / Articulation of Question 5% / Response to 
Questions  15% 
An outstanding presentation needs to be factually accurate and on-topic. The information 
should cover the topic selected and should consider the background of the audience. The 
presentation should have a clear beginning, middle, and end. Introduction should contain an 
articulate, compelling statement of the topic and inform the audience of the key ideas to be 
discussed. Any claims should be well-supported and the ending should be strong and 
conclusive. The grading for questions will be done across all presentations. Individual 
students from the same team will be graded separately. 
 
GRADING AND ASSESSMENT 
We try to grade assignments fairly and return them within a reasonable time period with 
relevant comments and to be available to discuss questions. Students are expected to set 
up an appointment to talk with the grader within a week of receiving a grade. Please let us 
know if there is a mistake in calculation – mistakes happen! 
Late assignments, projects, or papers will receive 15% off per day late from the final possible 
grade for the exercise unless there is a legitimate excuse.  
Students at UAlbany should contact the Disabled Student Services Center and the relevant 
professor at least a week before each F2F exam if requiring additional assistance. Missing 
any assessment without a verifiable legitimate excuse will result in a grade of zero. F2F 
Exams are expected to be closed-book unless otherwise specified and all personal electronic 
devices (laptops, cell phones, PDA's, etc.) should be put away.  
 
 
 
 
 
Note: The instructor is expected to get approval of the entire class prior to making any changes regarding the 
grading rubric. 
 
 
 
ACTIVITY 
PERCENTAGE OF GRADE 
Projects 
35% 
Assignments  
15% 
Exam I 
25% 
Exam II 
25% 
 
 
BFOR 300 
Databases for Digital Forensics 
 
 
 
COURSE SCHEDULE 
Week 
Course Activities 
1 
Introduction to the Course  
2 
Relational Database Design 
3 
SQL I 
4 
SQL 2 
5 
Advanced SQL 
6 
Exam I 
7 
Data sorting and searching using Unix Scripts  
8 
Clustering Techniques  
9 
Classification Techniques 
10 
Statistical Data Analysis 
 11 
Social Network Analysis 
12 
Social Network Analysis 
13 
Exam II  
14 
Student Presentations/Projects 
15 
Student Presentations/Projects 
 
This schedule is subject to change and students are expected to be aware of any modifications to including, but not 
limited to: due dates, readings, exam dates, and project guidelines, announced via email, Blackboard 
announcements or during class hangouts. 
 
 
 
BFOR 300 
Databases for Digital Forensics 
 
 
ACADEMIC INTEGRITY & HONESTY  
Students MUST comply with all University at Albany’s standards of academic integrity. As 
stated on the undergraduate and graduate bulletin, "Claims of ignorance, of unintentional 
error, or of academic or personal pressures are not sufficient reasons for violations of 
academic integrity." Non-compliance with academic integrity standards, will result in the 
student being reported to the Office of Graduate Admissions or the Dean of Undergraduate 
Studies Office (whichever applies) AND receive a lowering of a paper or project grade of at 
least one full grade, receive a failing grade for a project containing plagiarized material or 
examination in which cheating occurred, receive a lowering of course grade by one full grade 
or more, a failing grade for the course, or any combination of these depending on the 
infraction.  
Violations include: Giving or receiving unauthorized help on an examination; Collaborating 
on projects, papers, or other academic exercises which is regarded as inappropriate by the 
instructor(s), submitting substantial portions of the same work for credit more than once, 
without the prior explicit consent of the instructor(s) to whom the material is being submitted; 
misrepresenting material or fabricating information in an academic exercise or assignment; 
Destroying, damaging, or stealing of another's work or working materials; and presenting as 
one's own work, the work of another person (e.g., words, ideas, information, code, data, 
evidence, organizing principles, or presentation style of someone else). This includes 
paraphrasing or summarizing without acknowledgment, submission of another student's 
work as one's own, purchase of prepared research, papers or assignments, and the 
unacknowledged use of research sources gathered by someone else. Failure to indicate 
accurately the extent and precise nature of one's reliance on other sources is also a form of 
plagiarism. The student is responsible for understanding the legitimate use of sources, the 
appropriate ways of acknowledging academic, scholarly, or creative indebtedness, and the 
consequences for violating University regulations. If you have questions about academic 
integrity - ASK! 
“GREAT” EXPECTATIONS  
• 
Students can expect the instructor to be open to questions and concerns, but remain 
impartial and fair to all students. 
• 
Students are expected to respectfully participate in the course and communicate with 
the instructor if there is confusion or lack of understanding of the material. In turn, the 
instructor will attempt to clarify any material. 
• 
If the instructor is unable to attend class or office hours due to a personal emergency, 
students can expect for arrangements to be made for an alternate instructor or to be 
informed in as a timely a manner as possible. 
• 
Students are expected to provide reliable contact information and inform the instructor of 
any updates.  
• 
Students are expected to contact the instructor via email, phone, or in person for reliable 
response.  
• 
Students are expected to complete all assignments and readings as well as set up 
meeting times with the instructor as necessary.  
• 
It is important for students to inform the instructor if all available office hours interfere 
with other classes during the first week of the course. 
 
 
 
BFOR 301 
Computer Forensics I 
 
1 
 
Course ID: BFOR 301 
Course Name: Computer Forensics I 
Credit Hours: 3 
Semester: TBA  
Instructor: Fabio R. Auffant II 
Course Prerequisite(s): BFOR 201 or permission of instructor 
Textbook: TBA 
 
COURSE DESCRIPTION 
 
This course prepares students to conduct digital forensic examination of computers, 
removable media and other electronic devices. Students will use digital forensics tools 
and techniques to analyze digital evidence pursuant to an investigation, while utilizing 
industry standards and best practices. This course will prepare student in the development 
and implementation of forensic incident response plans, policies and procedures. Students 
will engage in oral and written reporting outlining digital forensic analysis findings and 
conclusions, in a professionally acceptable manner, pursuant to administrative, civil and 
criminal legal proceedings. Prerequisite(s): BFOR 201 or permission of instructor. 
Offered fall semester only. 
 
 
LEARNING OBJECTIVES 
 
After completing this class the student should be able to: 
• Prepare digital forensics incident response plan, policies and procedures for 
businesses, government and independent practitioners, consistent with standards. 
• Utilize computer forensic tools to analyze computer digital evidence. 
• Perform forensic analysis of removable media digital evidence. 
• Prepare written & oral presentations derived from computer forensic analysis. 
 
COURSE FORMAT 
 
Online or Classroom: The course may be offered online to offer a more flexible learning 
experience, through classroom delivery to ensure hands-on experience of forensic tools 
and techniques, or a combination of online and classroom environments. Students are 
provided with an interactive learning environment through instructor audio lesson plans, 
online discussion groups, and other learning assessments. Even though the course is 
spread over several weeks, it is important that students stay on schedule so that they can 
participate with other students in discussions. The class should require approximately 
120 hours of work including instruction audio of lecture material, student assignments, 
quizzes, discussion postings, and the reading of the class textbook, as well as external 
publications. 
 
 
BFOR 301 
Computer Forensics I 
 
2 
 
INSTRUCTOR CONTACT 
 
Type 
Information 
Availability 
Email 
fauffant@albany.edu  
Dates and times TBA 
Virtual 
Via Skype, TBA in class 
Dates and times TBA 
 
COURSE RESOURCES 
Course Website 
 
Reference Material and 
External Readings 
To be posted by instructor during course activities 
Technical Support 
 
 
COURSE OUTLINE 
Week 
Topic 
Activities 
1 
Computer Basics for Digital Investigators 
Class Discussion 
2 
Digital Forensics Best Practices, Standards & Reporting 
Assignment 
3 
Incident Response & Forensic Hardware/Software Tools Assignment 
4 
Forensic Analysis of Windows ® Systems 
Assignment 
5 
Forensic Analysis of Other Operating Systems 
Assignment 
6 
MID-TERM EXAM 
 
7 
ProDiscover ® Forensic Case Analysis 
Lab Exercise 
8 
EnCase ® Forensic Case Analysis 
Lab Exercise 
9 
FTK ® Forensic Case Analysis – Password Recovery 
Lab Exercise 
10 
FTK ® Forensic Case Analysis – Registry 
Lab Exercise 
11 
FTK ® Forensic Case Analysis – Encryption 
Lab Exercise 
12 
Forensic Mock Case Reporting 
Assignment 
13 
COURSE PROJECT 
Student 
Presentations 
14 
FINAL EXAM 
 
 
COURSE ACTIVITIES 
 
Lab Exercises: Lab Exercises will also be assigned and graded by the instructor. 
Students will be required to complete Lab Exercises and submit to the instructor by 
specific date(s) and grading assessment will be based on the analysis of sample data and 
satisfactory completion of forensic reports. 
 
Assignments: Assignments will be assigned and graded by the instructor and will be 
based on the weekly discussion topic(s). Students will be required to complete and 
submit to the instructor by specific date(s) and grading assessment will be based on 
acceptable grammar, terminology, formatting and substantive content. 
 
 
BFOR 301 
Computer Forensics I 
 
3 
 
Project: Course project will be assigned and graded by the instructor, based on 
individual and/or group assignments. Students will be required to complete and submit to 
the instructor by a specific date for grading and assessment. 
 
GRADING AND ASSESSMENT 
We try to grade assignments fairly and return them within a reasonable time period 
with relevant comments and to be available to discuss questions. Students are 
expected to set up an appointment to talk with the grader within a week of receiving 
a grade. Please let us know if there is a mistake in calculation – mistakes happen! 
Late assignments, projects, or papers will receive 25% off per day late from the final 
possible grade for the exercise unless authorized by the instructor.  
Students at UAlbany should contact the Disabled Student Services Center and the 
relevant professor at least a week before each F2F exam if requiring additional 
assistance. Missing any assessment without a verifiable legitimate excuse will result in a 
grade of zero. F2F Exams are expected to be closed-book unless otherwise specified and 
all personal electronic devices (laptops, cell phones, PDA's, etc.) should be put away. 
 
 
 
 
Activity 
Portion of 
Grade 
Description 
Assignments 
25% 
 
Lab Exercises 
25% 
 
Project 
20% 
 
Exams 
30% 
 
 
 
 
Overall Accumulative Point Evaluation: 
 
Point Range Letter Grade 
97-100 
(A) 
91-96  
(A-) 
86-90 
(B+) 
81-85 
(B) 
76-80 
(B-) 
71-75 
(C+) 
66-70 
(C) 
63-65 
(C-) 
60-62 
(D)  
Below 60 
(E)  
 
 
 
BFOR 301 
Computer Forensics I 
 
4 
 
ACADEMIC INTEGRITY & HONESTY 
 
Students MUST comply with all University at Albany’s standards of academic integrity. As 
stated on the undergraduate and graduate bulletin, "Claims of ignorance, of unintentional 
error, or of academic or personal pressures are not sufficient reasons for violations of 
academic integrity." Non-compliance with academic integrity standards, will result in the 
student being reported to the Office of Graduate Admissions or the Dean of Undergraduate 
Studies Office (whichever applies) AND receive a lowering of a paper or project grade of at least 
one full grade, receive a failing grade for a project containing plagiarized material or exam- 
ination in which cheating occurred, receive a lowering of course grade by one full grade or  
more, a failing grade for the course, or any combination of these depending on the infraction.  
 
Violations include: Giving or receiving unauthorized help on an examination; Collaborating on 
projects, papers, or other academic exercises which is regarded as inappropriate by the 
instructor(s), submitting substantial portions of the same work for credit more than once, without 
the prior explicit consent of the instructor(s) to whom the material is being submitted; 
misrepresenting material or fabricating information in an academic exercise or assignment; 
Destroying, damaging, or stealing of another's work or working materials; and presenting as 
one's own work, the work of another person (e.g., words, ideas, information, code, data, 
evidence, organizing principles, or presentation style of someone else). This includes 
paraphrasing or summarizing without acknowledgment, submission of another student's work as 
one's own, purchase of prepared research, papers or assignments, and the unacknowledged use of 
research sources gathered by someone else. Failure to indicate accurately the extent and precise 
nature of one's reliance on other sources is also a form of plagiarism. The student is responsible 
for understanding the legitimate use of sources, the appropriate ways of acknowledging 
academic, scholarly, or creative indebtedness, and the consequences for violating University 
regulations. If you have questions about academic integrity - ASK! 
“GREAT” EXPECTATIONS 
• 
Students can expect the instructor to be open to questions and concerns, but remain impartial 
and fair to all students. 
• 
Students are expected to respectfully participate in the course and communicate with the 
instructor if there is confusion or lack of understanding of the material. In turn, the instructor 
will attempt to clarify any material. 
• 
If the instructor is unable to attend class or office hours due to a personal emergency, 
students can expect for arrangements to be made for an alternate instructor or to be informed 
in as a timely a manner as possible. 
• 
Students are expected to provide reliable contact information and inform the instructor of 
any updates.  
• 
Students are expected to contact the instructor via email, phone, or in person for reliable 
response.  
• 
Students are expected to complete all assignments and readings as well as set up meeting 
times with the instructor as necessary. It is important for students to inform the instructor if 
all available office hours interfere with other classes during the first week of the course. 
 
 
BFOR 302 
eDiscovery Forensics 
 
1 
 
Course ID: BFOR 302 
Course Name: eDiscovery Forensics 
Credit Hours: 3 
Semester: TBA 
Instructor: Fabio R. Auffant II 
Course Prerequisites: No 
Textbook: TBA 
 
COURSE DESCRIPTION 
 
This course prepares student for the electronic collection, preservation and management 
of corporate information. It provides a foundation on basic corporate incident response 
challenges and proper collection methods for electronic data subject to legal and 
regulatory requirements. Student will utilize forensics tools for searching, culling and 
presenting corporate data, pursuant to administrative and civil eDiscovery cases. Offered 
fall semester only.  
 
LEARNING OBJECTIVES 
 
After completing this class the student should be able to: 
• Identify federal and state eDiscovery statutes and case law. 
• Define methodology for collecting, preserving and managing corporate electronic 
information that facilitates the eDiscovey process. 
• Develop forensic policies and procedures for corporate managers and IT personnel. 
• Utilize tools utilized to preserve and manage eDiscovery related data. 
• Student will prepare comprehensive written report pursuant to electronic discovery 
investigation and court proceedings. 
 
COURSE FORMAT 
 
Online or Classroom: The course may be offered online to offer a more flexible learning 
experience, through classroom delivery to ensure hands-on experience of forensic tools 
and techniques, or a combination of online and classroom environments. Students are 
provided with an interactive learning environment through instructor audio lesson plans, 
online discussion groups, and other learning assessments. Even though the course is 
spread over several weeks, it is important that students stay on schedule so that they can 
participate with other students in discussions. The class should require approximately 
120 hours of work including instruction audio of lecture material, student assignments, 
quizzes, discussion postings, and the reading of the class textbook, as well as external 
publications. 
 
 
 
BFOR 302 
eDiscovery Forensics 
 
2 
 
INSTRUCTOR CONTACT 
 
Type 
Information 
Availability 
Email 
 
Dates and times TBA 
Virtual 
 
Dates and times TBA 
 
COURSE RESOURCES 
 
Course Website 
 
Reference Material and 
External Readings 
To be posted by instructor during course activities 
Technical Support 
 
 
COURSE OUTLINE 
Week 
Topic 
Activities 
1 
Electronic Discovery Concepts & Terminology 
Assignment 
2 
eDiscovery Forensic Concepts & Terminology 
Assignment 
3 
Chain of Custody Documentation 
Assignment 
4 
Federal Rules of Civil Procedure 
Guest Lecturer/Class 
Discussion 
5 
Networking Storage & Management Essentials 
Assignment 
6 
Mobile Device Storage & Management Essentials 
Assignment 
7 
MID-TERM EXAM 
 
8 
eDiscovery Review & Forensic Tools 
Lab Exercise 
9 
Processing of electronically stored information 
Lab Exercise 
10 
FTK Searching & Culling Methods 
Lab Exercise 
11 
EnCase Searching & Culling Methods 
Lab Exercise 
12 
Rational eDiscovery Searching & Culling Methods 
Lab Exercise 
13 
COURSE PROJECT 
Student Presentations 
14 
FINAL EXAM 
 
 
COURSE ACTIVITIES 
 
Hands-On Labs: Lab Exercises will also be assigned and graded by the instructor. 
Students will be required to complete Lab Exercises and submit to the instructor by 
specific date(s) and grading assessment will be based on the analysis of sample data and 
satisfactory completion of forensic reports. 
 
Assignments: Assignments will be assigned and graded by the instructor and will be 
based on the weekly discussion topic(s). Students will be required to complete and 
 
 
BFOR 302 
eDiscovery Forensics 
 
3 
 
submit to the instructor by specific date(s) and grading assessment will be based on 
acceptable grammar, terminology, formatting and substantive content. 
 
Project: Course project will be assigned and graded by the instructor, based 
on individual and/or group assignments. Students will be required to complete 
and submit to the instructor by a specific date for grading and assessment. 
 
GRADING AND ASSESSMENT 
 
We try to grade assignments fairly and return them within a reasonable time period 
with relevant comments and to be available to discuss questions. Students are 
expected to set up an appointment to talk with the grader within a week of receiving a 
grade. Please let us know if there is a mistake in calculation – mistakes happen! 
Late assignments, projects, or papers will receive 25% off per day late from the final 
possible grade for the exercise unless authorized by the instructor.  
 
Students at UAlbany should contact the Disabled Student Services Center and the 
relevant professor at least a week before each F2F exam if requiring additional 
assistance. Missing any assessment without a verifiable legitimate excuse will result in a 
grade of zero. F2F Exams are expected to be closed-book unless otherwise specified and 
all personal electronic devices (laptops, cell phones, PDA's, etc.) should be put away. 
 
Overall Accumulative Point Evaluation: 
 
Point Range Letter Grade 
96-100 
(A) 
90-95  
(A-) 
86-89 
(B+) 
81-85 
(B) 
76-80 
(B-) 
71-75 
(C+) 
66-70 
(C) 
63-65 
(C-) 
60-62 
(D)  
Below 60 
(E)  
 
Activity 
Portion of 
Grade 
Description 
Assignments 
25% 
 
Lab Exercises 
25% 
 
Project 
20% 
 
Exams 
30% 
 
 
 
 
 
 
BFOR 302 
eDiscovery Forensics 
 
4 
 
ACADEMIC INTEGRITY & HONESTY 
 
Students MUST comply with all University at Albany’s standards of academic integrity. As 
stated on the undergraduate and graduate bulletin, "Claims of ignorance, of unintentional 
error, or of academic or personal pressures are not sufficient reasons for violations of 
academic integrity." Non-compliance with academic integrity standards, will result in the 
student being reported to the Office of Graduate Admissions or the Dean of Undergraduate 
Studies Office (whichever applies) AND receive a lowering of a paper or project grade of at 
least one full grade, receive a failing grade for a project containing plagiarized material or 
examination in which cheating occurred, receive a lowering of course grade by one full grade 
or more, a failing grade for the course, or any combination of these depending on the 
infraction.  
 
Violations include: Giving or receiving unauthorized help on an examination; Collaborating on 
projects, papers, or other academic exercises which is regarded as inappropriate by the 
instructor(s), submitting substantial portions of the same work for credit more than once, without 
the prior explicit consent of the instructor(s) to whom the material is being submitted; 
misrepresenting material or fabricating information in an academic exercise or assignment; 
Destroying, damaging, or stealing of another's work or working materials; and presenting as 
one's own work, the work of another person (e.g., words, ideas, information, code, data, 
evidence, organizing principles, or presentation style of someone else). This includes 
paraphrasing or summarizing without acknowledgment, submission of another student's work as 
one's own, purchase of prepared research, papers or assignments, and the unacknowledged use of 
research sources gathered by someone else. Failure to indicate accurately the extent and precise 
nature of one's reliance on other sources is also a form of plagiarism. The student is responsible 
for understanding the legitimate use of sources, the appropriate ways of acknowledging 
academic, scholarly, or creative indebtedness, and the consequences for violating University 
regulations. If you have questions about academic integrity - ASK! 
“GREAT” EXPECTATIONS 
• 
Students can expect the instructor to be open to questions and concerns, but remain impartial 
and fair to all students. 
• 
Students are expected to respectfully participate in the course and communicate with the 
instructor if there is confusion or lack of understanding of the material. In turn, the instructor 
will attempt to clarify any material. 
• 
If the instructor is unable to attend class or office hours due to a personal emergency, 
students can expect for arrangements to be made for an alternate instructor or to be informed 
in as a timely a manner as possible. 
• 
Students are expected to provide reliable contact information and inform the instructor of any 
updates.  
• 
Students are expected to contact the instructor via email, phone, or in person for reliable 
response.  
• 
Students are expected to complete all assignments and readings as well as set up meeting 
times with the instructor as necessary. It is important for students to inform the instructor if 
all available office hours interfere with other classes during the first week of the course. 
 
 
BFOR 303 
Computer Forensics II 
 
1 
 
Course ID: BFOR 303 
Course Name: Computer Forensics II 
Credit Hours: 3 
Semester: TBA 
Instructor: Fabio R. Auffant II 
Course Prerequisite(s): BFOR 301 or permission of instructor 
Textbook: TBA 
 
COURSE DESCRIPTION 
This course prepares students to conduct a digital forensic examination and analysis 
involving complex cases, electronic devices and data, as well as other forensic processes 
utilized to ensure government and corporate continuity. This course will prepare student 
to develop and implement policies and procedures for computer forensic laboratories 
involving operations and quality control management. It prepares students to compose 
and present oral and written reports that include laboratory audits, forensic analysis 
findings and court presentation material.  
Prerequisite(s): BFOR 301 or permission of instructor. Offered spring semester only. 
 
 
LEARNING OBJECTIVES 
 
After completing this class the student should be able to: 
• Utilize forensic tools and techniques to examine and analyze complex computer 
evidence. 
• Perform other forensic processes to properly cleanse, restore and archive digital 
evidence. 
• Prepare policies and procedures for managing digital forensic laboratory operations. 
• Prepare written & oral presentations derived from complex digital evidence forensic 
analysis and laboratory operations. 
 
COURSE FORMAT 
 
Online or Classroom: The course may be offered solely online to offer a more flexible 
learning experience or through classroom delivery to ensure hands-on experience of 
mobile device hardware. This may be your first experience with an online / Internet 
course and it is important to recognize the differences with a face-to-face classroom 
experience. Students are provided with an interactive learning environment through 
instructor audio lesson plans, online discussion groups, and other learning assessments. 
Even though the course is spread over several weeks, it is important that students stay on 
schedule so that they can participate with other students in discussions. The class should 
require approximately 120 hours of work including instruction audio of lecture material, 
student assignments, quizzes, discussion postings, and the reading of the class textbook, 
as well as external publications. 
 
 
BFOR 303 
Computer Forensics II 
 
2 
 
INSTRUCTOR CONTACT 
 
Type 
Information 
Availability 
Email 
 
Dates and times TBA 
Virtual 
 
Dates and times TBA 
 
COURSE RESOURCES 
 
Course Website 
 
Reference Material and 
External Readings 
To be posted by instructor during course activities 
Technical Support 
 
 
COURSE OUTLINE 
 
Week 
Topic 
Activities 
1 
Digital Forensics Laboratory Standards 
Class Discussion 
2 
Development of Laboratory SOP’s 
Assignment 
3 
Quality Control & Assurance Forensic Standards 
Assignment 
4 
Development of a Laboratory QC/QA Manual 
Assignment 
5 
Laboratory Internal Training Standards 
Assignment 
6 
Development of an Internal Training Program 
Assignment 
7 
MID TERM EXAM 
 
8 
Complex Device Analysis, Data Carving & GREP 
Expression Searching 
Lab Exercise 
9 
Secure Cleansing & Forensic Restoration of Media 
Lab Exercise 
10 
Logical Restoration and Archival of Digital Evidence 
Lab Exercise 
11 
Forensic Analysis Reporting & Presentation 
Lab Exercise 
12 
Preparation of Court Presentation Material 
Lab Exercise 
13 
COURSE PROJECT 
Student 
Presentations 
14 
FINAL EXAM 
 
 
COURSE ACTIVITIES 
 
Lab Exercises: Lab Exercises will also be assigned and graded by the instructor. 
Students will be required to complete Lab Exercises and submit to the instructor by 
specific date(s) and grading assessment will be based on the analysis of sample data and 
satisfactory completion of forensic reports. 
 
 
 
 
BFOR 303 
Computer Forensics II 
 
3 
 
Assignments: Assignments will be assigned and graded by the instructor and will be 
based on the weekly discussion topic(s). Students will be required to complete and 
submit to the instructor by specific date(s) and grading assessment will be based on 
acceptable grammar, terminology, formatting and substantive content. 
 
Project: Course project will be assigned and graded by the instructor, based on 
individual and/or group assignments. Students will be required to complete and 
submit to the instructor by a specific date for grading and assessment. 
 
GRADING AND ASSESSMENT 
We try to grade assignments fairly and return them within a reasonable time period with 
relevant comments and to be available to discuss questions. Students are expected to set 
up an appointment to talk with the grader within a week of receiving a grade. Please let 
us know if there is a mistake in calculation – mistakes happen! 
Late assignments, projects, or papers will receive 25% off per day late from the final 
possible grade for the exercise unless authorized by the instructor.  
Students at UAlbany should contact the Disabled Student Services Center and the 
relevant professor at least a week before each F2F exam if requiring additional 
assistance. Missing any assessment without a verifiable legitimate excuse will result in a 
grade of zero. F2F Exams are expected to be closed-book unless otherwise specified and 
all personal electronic devices (laptops, cell phones, PDA's, etc.) should be put away. 
 
Activity 
Portion of 
Grade 
Description 
Assignments 
25% 
 
Lab Exercises 
25% 
 
Project 
20% 
 
Exams 
30% 
 
 
 
 
Overall Accumulative Point Evaluation: 
Point Range Letter Grade 
97-100 
(A) 
91-96  
(A-) 
86-90 
(B+) 
81-85 
(B) 
76-80 
(B-) 
71-75 
(C+) 
66-70 
(C) 
63-65 
(C-) 
60-62 
(D)  
Below 60 
(E)  
 
 
 
BFOR 303 
Computer Forensics II 
 
4 
 
ACADEMIC INTEGRITY & HONESTY 
 
 
Students MUST comply with all University at Albany’s standards of academic 
integrity. As stated on the undergraduate and graduate bulletin, "Claims of ignorance, of 
unintentional error, or of academic or personal pressures are not sufficient reasons for 
violations of academic integrity." Non-compliance with academic integrity standards, will 
result in the student being reported to the Office of Graduate Admissions or the Dean of 
Undergraduate Studies Office (whichever applies) AND receive a lowering of a paper or 
project grade of at least one full grade, receive a failing grade for a project containing 
plagiarized material or examination in which cheating occurred, receive a lowering of course 
grade by one full grade or more, a failing grade for the course, or any combination of these 
depending on the infraction.  
 
 
Violations include: Giving or receiving unauthorized help on an examination; 
Collaborating on projects, papers, or other academic exercises which is regarded as inappropriate 
by the instructor(s), submitting substantial portions of the same work for credit more than once, 
without the prior explicit consent of the instructor(s) to whom the material is being submitted; 
misrepresenting material or fabricating information in an academic exercise or assignment; 
Destroying, damaging, or stealing of another's work or working materials; and presenting as 
one's own work, the work of another person (e.g., words, ideas, information, code, data, 
evidence, organizing principles, or presentation style of someone else). This includes 
paraphrasing or summarizing without acknowledgment, submission of another student's work as 
one's own, purchase of prepared research, papers or assignments, and the unacknowledged use of 
research sources gathered by someone else. Failure to indicate accurately the extent and precise 
nature of one's reliance on other sources is also a form of plagiarism. The student is responsible 
for understanding the legitimate use of sources, the appropriate ways of acknowledging 
academic, scholarly, or creative indebtedness, and the consequences for violating University 
regulations. If you have questions about academic integrity - ASK! 
“GREAT” EXPECTATIONS 
• 
Students can expect the instructor to be open to questions and concerns, but remain impartial 
and fair to all students. 
• 
Students are expected to respectfully participate in the course and communicate with the 
instructor if there is confusion or lack of understanding of the material. In turn, the instructor 
will attempt to clarify any material. 
• 
If the instructor is unable to attend class or office hours due to a personal emergency, 
students can expect for arrangements to be made for an alternate instructor or to be informed 
in as a timely a manner as possible. 
• 
Students are expected to provide reliable contact information and inform the instructor of any 
updates.  
• 
Students are expected to contact the instructor via email, phone, or in person for reliable 
response.  
• 
Students are expected to complete all assignments and readings as well as set up meeting 
times with the instructor as necessary. It is important for students to inform the instructor if 
all available office hours interfere with other classes during the first week of the course. 
 
 
BFOR 304 
Network and Mobile Forensics 
 
1 
 
Course ID: BFOR 304 
Course Name: Network and Mobile Forensics 
Credit Hours: 3 
Semester: TBA 
Instructor: TBA 
Course Prerequisite(s): BFOR 203 & BFOR 301 
Textbook: TBA 
 
COURSE DESCRIPTION 
This course exposes students to procedures for conducting live network forensics of 
computer system components and data. It prepares students to collect, preserve, and 
examines networks, computers, mobile devices and relevant data that may be critical to 
an investigation. Students will develop network incident response plans, policies and 
procedures relevant to corporate networks and data, as well as mobile corporate assets, 
such as mobile devices. It prepares students to compose and present oral and written 
reports that outline network and mobile device forensic analysis findings that are 
technically and legally acceptable in administrative hearings and court proceedings. 
Prerequisite(s): BFOR 203 & BFOR 301. Offered spring semester only. 
 
 
LEARNING OBJECTIVES 
After completing this class the student should be able to: 
• Identify federal and state legal statutes, case law and government regulations relevant 
to network data preservation and incident forensic response. 
• Utilize proper tools and methods for collecting & preserving network and mobile 
device hardware, and potential digital evidence. 
• Prepare network cyber incident & forensics response plan, policy and procedures, 
consistent with industry standards. 
• Prepare written & oral presentations derived from network and mobile device 
analysis. 
 
COURSE FORMAT 
Online or Classroom: The course may be offered solely online to offer a more flexible 
learning experience or through classroom delivery to ensure hands-on experience of 
mobile device hardware. This may be your first experience with an online / Internet 
course and it is important to recognize the differences with a face-to-face classroom 
experience. Students are provided with an interactive learning environment through 
instructor audio lesson plans, online discussion groups, and other learning assessments. 
Even though the course is spread over several weeks, it is important that students stay on 
schedule so that they can participate with other students in discussions. The class should 
require approximately 120 hours of work including instruction audio of lecture material, 
student assignments, quizzes, discussion postings, and the reading of the class textbook, 
as well as external publications. 
 
 
 
BFOR 304 
Network and Mobile Forensics 
 
2 
 
INSTRUCTOR CONTACT 
 
Type 
Information 
Availability 
Email 
 
Dates and times TBA 
Virtual 
 
Dates and times TBA 
 
COURSE RESOURCES 
 
Course Website 
 
Reference Material and 
External Readings 
To be posted by instructor during course activities 
Technical Support 
 
 
COURSE OUTLINE 
 
Week 
Topic 
Activities 
1 
Networking Storage & Management Essentials 
Class Discussion 
2 
Network Forensics Guidelines & Standards 
Assignment 
3 
Incident Response Planning & Standards 
Assignment 
4 
Network Analysis Reporting 
Assignment 
5 
Network Collection & Preservation Tools 
Assignment 
6 
Collection & Preservation of Network Data 
Lab Exercise 
7 
MID-TERM EXAM 
 
8 
EnCase ® Network Forensic Analysis 
Lab Exercise 
9 
FTK ® Network Forensic Analysis 
Lab Exercise 
10 
Mobile Device Concepts & Terminology 
Assignment 
11 
Mobile Device Forensics Hardware & Software 
Lab Exercise 
12 
Mobile Device Forensic Analysis 
Lab Exercise 
13 
COURSE PROJECT 
 
14 
FINAL EXAM 
 
 
COURSE ACTIVITIES 
Lab Exercises: Lab Exercises will also be assigned and graded by the instructor. 
Students will be required to complete Lab Exercises and submit to the instructor by 
specific date(s) and grading assessment will be based on the analysis of sample data and 
satisfactory completion of forensic reports. 
 
Assignments: Assignments will be assigned and graded by the instructor and will be 
based on the weekly discussion topic(s). Students will be required to complete and 
submit to the instructor by specific date(s) and grading assessment will be based on 
acceptable grammar, terminology, formatting and substantive content. 
 
 
 
BFOR 304 
Network and Mobile Forensics 
 
3 
 
Project: Course project will be assigned and graded by the instructor, based on 
individual and/or group assignments. Students will be required to complete and submit to 
the instructor by a specific date for grading and assessment. 
 
GRADING AND ASSESSMENT 
We try to grade assignments fairly and return them within a reasonable time period with 
relevant comments and to be available to discuss questions. Students are expected to set 
up an appointment to talk with the grader within a week of receiving a grade. Please let 
us know if there is a mistake in calculation – mistakes happen! 
Late assignments, projects, or papers will receive 25% off per day late from the final 
possible grade for the exercise unless authorized by the instructor.  
Students at UAlbany should contact the Disabled Student Services Center and the 
relevant professor at least a week before each F2F exam if requiring additional 
assistance. Missing any assessment without a verifiable legitimate excuse will result in a 
grade of zero. F2F Exams are expected to be closed-book unless otherwise specified and 
all personal electronic devices (laptops, cell phones, PDA's, etc.) should be put away. 
 
 
 
 
Activity 
Portion of 
Grade 
Description 
Assignments 
25% 
 
Lab Exercises 
25% 
 
Project 
20% 
 
Exams 
30% 
 
 
 
 
Overall Accumulative Point Evaluation: 
 
Point Range 
Letter Grade 
97-100 
(A) 
91-96 
(A-) 
86-90 
(B+) 
81-85 
(B) 
76-80 
(B-) 
71-75 
(C+) 
66-70 
(C) 
63-65 
(C-) 
60-62 
(D) 
Below 60 
(E) 
 
 
 
BFOR 304 
Network and Mobile Forensics 
 
4 
 
ACADEMIC INTEGRITY & HONESTY 
 
Students MUST comply with all University at Albany’s standards of academic integrity. As 
stated on the undergraduate and graduate bulletin, "Claims of ignorance, of unintentional 
error, or of academic or personal pressures are not sufficient reasons for violations of 
academic integrity." Non-compliance with academic integrity standards, will result in the 
student being reported to the Office of Graduate Admissions or the Dean of Undergraduate 
Studies Office (whichever applies) AND receive a lowering of a paper or project grade of at 
least one full grade, receive a failing grade for a project containing plagiarized material or 
examination in which cheating occurred, receive a lowering of course grade by one full grade 
or more, a failing grade for the course, or any combination of these depending on the 
infraction.  
 
Violations include: Giving or receiving unauthorized help on an examination; Collaborating on 
projects, papers, or other academic exercises which is regarded as inappropriate by the 
instructor(s), submitting substantial portions of the same work for credit more than once, without 
the prior explicit consent of the instructor(s) to whom the material is being submitted; 
misrepresenting material or fabricating information in an academic exercise or assignment; 
Destroying, damaging, or stealing of another's work or working materials; and presenting as 
one's own work, the work of another person (e.g., words, ideas, information, code, data, 
evidence, organizing principles, or presentation style of someone else). This includes 
paraphrasing or summarizing without acknowledgment, submission of another student's work as 
one's own, purchase of prepared research, papers or assignments, and the unacknowledged use of 
research sources gathered by someone else. Failure to indicate accurately the extent and precise 
nature of one's reliance on other sources is also a form of plagiarism. The student is responsible 
for understanding the legitimate use of sources, the appropriate ways of acknowledging 
academic, scholarly, or creative indebtedness, and the consequences for violating University 
regulations. If you have questions about academic integrity - ASK! 
“GREAT” EXPECTATIONS 
• 
Students can expect the instructor to be open to questions and concerns, but remain impartial 
and fair to all students. 
• 
Students are expected to respectfully participate in the course and communicate with the 
instructor if there is confusion or lack of understanding of the material. In turn, the instructor 
will attempt to clarify any material. 
• 
If the instructor is unable to attend class or office hours due to a personal emergency, 
students can expect for arrangements to be made for an alternate instructor or to be informed 
in as a timely a manner as possible. 
• 
Students are expected to provide reliable contact information and inform the instructor of any 
updates.  
• 
Students are expected to contact the instructor via email, phone, or in person for reliable 
response.  
• 
Students are expected to complete all assignments and readings as well as set up meeting 
times with the instructor as necessary. It is important for students to inform the instructor if 
all available office hours interfere with other classes during the first week of the course. 
 
 
BFOR 401W 
Advanced Digital Forensics 
 
1 
 
Course ID: BFOR 401W 
Course Name: Advanced Digital Forensics 
Credit Hours: 4 
Semester: TBA 
Instructor: Fabio R. Auffant II 
Course Prerequisite(s): BFOR 302, BFOR 303 & BFOR 304 
Textbook: TBA 
 
COURSE DESCRIPTION 
Instructor will guide students through proficiency testing by utilizing digital forensic skills 
obtained in previous coursework to develop an incident response plan to guide a forensic 
investigation. Based on case-study scenario, student will also conduct forensic analysis of several 
items of digital evidence, preparing comprehensive written forensic laboratory reports and present 
findings to a panel of legal, forensics and management subject matter experts for constructive 
feedback. Students will also prepare exhibits and other materials for court presentation purposes 
based on the case-study scenario, forensic analysis findings and written laboratory reports. 
Instructor will conduct quality control assessments to ensure students are performing forensic 
analysis that is in compliance with industry standards guiding forensic and laboratory work 
environments Prerequisite(s): BFOR 302, BFOR 303, and BFOR 304. Offered fall semester only. 
 
LEARNING OBJECTIVES 
After completing this class the student should be able to: 
• 
Develop incident response and forensic examination plan in support of case-based scenario. 
• 
Utilize the skills obtained in previous coursework to perform forensic analysis of multiple 
items of digital evidence in support of case-based scenario. 
• 
Utilize the skills obtained in previous coursework to prepare a comprehensive written report 
and present forensic findings to a panel of subject matter experts. 
• 
Understand quality control audits and assessments relevant to forensic and laboratory 
management. 
• 
Based on the case scenario, prepare court-related presentation materials, documents and 
exhibits in support of case-bases scenario. 
 
COURSE FORMAT 
Classroom Only: The course will be offered solely in classroom environment to ensure academic 
integrity and provide guidance and support by course instructor. Even though the course is spread 
over several weeks, it is important that students stay on schedule so that they can participate with 
other students in discussions. Students would be evaluated on their ability to perform forensic 
analysis with minimal supervision and to ensure students arrive at forensically valid analysis 
conclusions. The class should require approximately 120 hours of work including instruction 
audio of lecture material, student assignments, discussion postings, and the reading of the class 
textbook, as well as external publications. 
 
 
 
 
 
BFOR 401W 
Advanced Digital Forensics 
 
2 
 
INSTRUCTOR CONTACT 
Type 
Information 
Availability 
Email 
 
Dates and times TBA 
Virtual 
 
Dates and times TBA 
 
COURSE RESOURCES 
Course Website 
 
Reference Material and 
External Readings 
To be posted by instructor during course activities 
Technical Support 
 
 
COURSE OUTLINE 
Week 
Topic 
Activities 
1 
Case-Based Scenario & Project Review 
Class Discussion 
2 
Incident & forensic examination planning 
Assignment 
3 
Federal Rules of Evidence 
Lab Exercise 
4 
Federal Rules of Criminal Procedure 
Assignment 
5 
Advanced Digital Forensics Techniques – Disks 
Lab Exercise 
6 
Advanced Digital Forensics Techniques – Media 
Assignment 
7 
COURSE PROJECT  PROGRESS REPORT 
Student Presentations 
8 
Quality Control ISO Auditing 
Lab Exercise 
9 
Quality Control ASCLD/LAB Auditing 
Assignment 
10 
Preparing a Forensics-Oriented Curriculum Vitae Lab Exercise 
11 
Preparing Court Exhibits and Documents 
Assignment 
12 
Presenting forensically accurate analysis findings Lab Exercise 
13 
COURSE PROJECT 
Student Presentations 
14 
FINAL EXAM 
 
 
COURSE ACTIVITIES 
Lab Exercises: Lab Exercises will also be assigned and graded by the instructor. 
Students will be required to complete Lab Exercises and submit to the instructor by 
specific date(s) and grading assessment will be based on the analysis of sample data and 
satisfactory completion of forensic reports. 
 
Assignments: Assignments will be assigned and graded by the instructor and will be 
based on the weekly discussion topic(s). Students will be required to complete and 
submit to the instructor by specific date(s) and grading assessment will be based on 
acceptable grammar, terminology, formatting and substantive content. 
 
 
 
BFOR 401W 
Advanced Digital Forensics 
 
3 
 
Project: Course project will be assigned and graded by the instructor, based on 
individual and/or group assignments. Students will be required to complete and submit to 
the instructor by a specific date for grading and assessment. 
 
GRADING AND ASSESSMENT 
We try to grade assignments fairly and return them within a reasonable time period 
with relevant comments and to be available to discuss questions. Students are 
expected to set up an appointment to talk with the grader within a week of receiving a 
grade. Please let us know if there is a mistake in calculation – mistakes happen! 
Late assignments, projects, or papers will receive 25% off per day late from the final 
possible grade for the exercise unless there is a legitimate excuse.  
Students at UAlbany should contact the Disabled Student Services Center and the 
relevant professor at least a week before each F2F exam if requiring additional 
assistance. Missing any assessment without a verifiable legitimate excuse will result in a 
grade of zero. F2F Exams are expected to be closed-book unless otherwise specified and 
all personal electronic devices (laptops, cell phones, PDA's, etc.) should be put away. 
 
 
 
 
Activity 
Portion of 
Grade 
Description 
Assignments 
20% 
 
Lab Exercises 
20% 
 
Project 
40% 
 
Exam 
20% 
 
 
 
 
Overall Accumulative Point Evaluation: 
 
Point Range Letter Grade 
97-100 
(A) 
91-96  
(A-) 
86-90 
(B+) 
81-85 
(B) 
76-80 
(B-) 
71-75 
(C+) 
66-70 
(C) 
63-65 
(C-) 
60-62 
(D)  
Below 60 
(E)  
 
 
 
BFOR 401W 
Advanced Digital Forensics 
 
4 
 
ACADEMIC INTEGRITY & HONESTY 
 
Students MUST comply with all University at Albany’s standards of academic integrity. As 
stated on the undergraduate and graduate bulletin, "Claims of ignorance, of unintentional 
error, or of academic or personal pressures are not sufficient reasons for violations of 
academic integrity." Non-compliance with academic integrity standards, will result in the 
student being reported to the Office of Graduate Admissions or the Dean of Undergraduate 
Studies Office (whichever applies) AND receive a lowering of a paper or project grade of at 
least one full grade, receive a failing grade for a project containing plagiarized material or 
examination in which cheating occurred, receive a lowering of course grade by one full grade 
or more, a failing grade for the course, or any combination of these depending on the 
infraction.  
 
Violations include: Giving or receiving unauthorized help on an examination; Collaborating on 
projects, papers, or other academic exercises which is regarded as inappropriate by the 
instructor(s), submitting substantial portions of the same work for credit more than once, without 
the prior explicit consent of the instructor(s) to whom the material is being submitted; 
misrepresenting material or fabricating information in an academic exercise or assignment; 
Destroying, damaging, or stealing of another's work or working materials; and presenting as 
one's own work, the work of another person (e.g., words, ideas, information, code, data, 
evidence, organizing principles, or presentation style of someone else). This includes 
paraphrasing or summarizing without acknowledgment, submission of another student's work as 
one's own, purchase of prepared research, papers or assignments, and the unacknowledged use of 
research sources gathered by someone else. Failure to indicate accurately the extent and precise 
nature of one's reliance on other sources is also a form of plagiarism. The student is responsible 
for understanding the legitimate use of sources, the appropriate ways of acknowledging 
academic, scholarly, or creative indebtedness, and the consequences for violating University 
regulations. If you have questions about academic integrity - ASK! 
“GREAT” EXPECTATIONS 
• 
Students can expect the instructor to be open to questions and concerns, but remain impartial 
and fair to all students. 
• 
Students are expected to respectfully participate in the course and communicate with the 
instructor if there is confusion or lack of understanding of the material. In turn, the instructor 
will attempt to clarify any material. 
• 
If the instructor is unable to attend class or office hours due to a personal emergency, 
students can expect for arrangements to be made for an alternate instructor or to be informed 
in as a timely a manner as possible. 
• 
Students are expected to provide reliable contact information and inform the instructor of any 
updates.  
• 
Students are expected to contact the instructor via email, phone, or in person for reliable 
response.  
• 
Students are expected to complete all assignments and readings as well as set up meeting 
times with the instructor as necessary. It is important for students to inform the instructor if 
all available office hours interfere with other classes during the first week of the course. 
 
 
BFOR 402 
Digital Forensics Moot Court 
 
1 
 
Course ID: BFOR 402 
Course Name: Digital Forensics Moot Court 
Credit Hours: 4 
Semester: TBA 
Instructor: TBA 
Course Prerequisite(s): BFOR 302, BFOR 303, BFOR 304 & BFOR 401W  
(BFOR 401W may be taken concurrently) 
Textbook: TBA 
COURSE DESCRIPTION 
 
This is a capstone course where students will learn how to provide expert testimony as a 
part of presenting their findings from completion of an advanced level digital forensic 
analysis. Students will learn how to prepare for and give expert witness testimony related 
to digital evidence, including how to deal with opposing counsel cross-examinations and 
how to effectively relay such information to a jury. Students will engage in a “mock” 
court grand jury, suppression hearing, and trial proceedings. Panel of subject matter 
experts from the legal, forensic and management fields will assist in the guidance and 
constructive feedback of students participating in “mock” court proceedings. Instructor 
will assess student’s competence in providing a technical testimony to a group of non-
technical listeners, such as judges, juries, as well as administrative and human resource 
officers. Prerequisite(s): BFOR 302, BFOR 303, BFOR 304 and BFOR 401W (BFOR 
401W may be taken concurrently). Offered spring semester only. 
 
 
LEARNING OBJECTIVES 
 
After completing this class the student should be able to: 
• Become familiar with civil and criminal legal proceedings and courtrooms. 
• Prepare for legal proceedings and testimony associated with digital forensics. 
• Effectively engage in pre-testimony proceedings with legal counsel. 
• Effectively provide testimony during direct and cross examination. 
• Prepare court exhibits derived from digital forensics analysis and lab reports. 
 
COURSE FORMAT 
 
Classroom Only: The course will be offered solely in classroom environment to ensure 
academic integrity and provide guidance and support by course instructor. Even though 
the course is spread over several weeks, it is important that students stay on schedule so 
that they can participate with other students in discussions. Students would be evaluated 
on their ability to perform forensic analysis with minimal supervision and to ensure 
students arrive at forensically valid analysis conclusions. The class should require 
approximately 120 hours of work including instruction audio of lecture material, student 
 
 
BFOR 402 
Digital Forensics Moot Court 
 
2 
 
assignments, discussion postings, and the reading of the class textbook, as well as 
external publications. 
 
INSTRUCTOR CONTACT 
 
Type 
Information 
Availability 
Email 
 
Dates and times TBA 
Virtual 
 
Dates and times TBA 
 
 
COURSE RESOURCES 
 
Course Website 
 
Reference Material and 
External Readings 
To be posted by instructor during course activities 
Technical Support 
 
 
COURSE OUTLINE 
 
Week 
Topic 
Activities 
1 
Professional Ethics in Legal Proceedings 
Class Discussion 
2 
Federal Rules of Civil Procedures 
Assignment 
3 
Federal Rules of Criminal Procedures 
Assignment 
4 
Establishing a Chain of Custody Foundation 
Assignment 
5 
Establishing Expert Witness Credentials 
Assignment 
6 
Establishing a Scientific and Forensic Foundation 
Assignment 
7 
MID TERM EXAM 
 
8 
Testifying in Grand Jury Proceedings 
Lab Exercise 
9 
Testifying in Suppression Hearings 
Lab Exercise 
10 
Testifying in Direct Examination 
Lab Exercise 
11 
Testifying in Cross Examination 
Lab Exercise 
12 
Preparing Digital Evidence Court Exhibits 
Lab Exercise 
13 
MOOT COURT 
Student Participation 
14 
MOOT COURT 
Student Participation 
 
COURSE ACTIVITIES 
Lab Exercises: Lab Exercises will also be assigned and graded by the instructor. 
Students will be required to complete Lab Exercises and submit to the instructor by 
specific date(s) and grading assessment will be based on the analysis of sample data and 
satisfactory completion of forensic reports. 
 
 
 
BFOR 402 
Digital Forensics Moot Court 
 
3 
 
Assignments: Assignments will be assigned and graded by the instructor and will be 
based on the weekly discussion topic(s). Students will be required to complete and 
submit to the instructor by specific date(s) and grading assessment will be based on 
acceptable grammar, terminology, formatting and substantive content. 
Project: Course project will be assigned and graded by the instructor, based on 
individual and/or group assignments. Students will be required to complete and submit to 
the instructor by a specific date for grading and assessment. 
 
GRADING AND ASSESSMENT 
We try to grade assignments fairly and return them within a reasonable time period 
with relevant comments and to be available to discuss questions. Students are 
expected to set up an appointment to talk with the grader within a week of receiving a 
grade. Please let us know if there is a mistake in calculation – mistakes happen! 
Late assignments, projects, or papers will receive 25% off per day late from the final 
possible grade for the exercise unless there is a legitimate excuse.  
Students at UAlbany should contact the Disabled Student Services Center and the 
relevant professor at least a week before each F2F exam if requiring additional 
assistance. Missing any assessment without a verifiable legitimate excuse will result in a 
grade of zero. F2F Exams are expected to be closed-book unless otherwise specified and 
all personal electronic devices (laptops, cell phones, PDA's, etc.) should be put away. 
Activity 
Portion of 
Grade 
Description 
Assignments 
20% 
 
Lab Exercises 
20% 
 
Project – Moot Court 
40% 
 
Exam 
20% 
 
 
 
 
Overall Accumulative Point Evaluation: 
 
Point Range Letter Grade 
97-100 
(A) 
91-96  
(A-) 
86-90 
(B+) 
81-85 
(B) 
76-80 
(B-) 
71-75 
(C+) 
66-70 
(C) 
63-65 
(C-) 
60-62 
(D)  
Below 60 
(E)  
 
 
 
BFOR 402 
Digital Forensics Moot Court 
 
4 
 
 
 
 
 
ACADEMIC INTEGRITY & HONESTY 
 
Students MUST comply with all University at Albany’s standards of academic integrity. As 
stated on the undergraduate and graduate bulletin, "Claims of ignorance, of unintentional 
error, or of academic or personal pressures are not sufficient reasons for violations of 
academic integrity." Non-compliance with academic integrity standards, will result in the 
student being reported to the Office of Graduate Admissions or the Dean of Undergraduate 
Studies Office (whichever applies) AND receive a lowering of a paper or project grade of at 
least one full grade, receive a failing grade for a project containing plagiarized material or 
examination in which cheating occurred, receive a lowering of course grade by one full grade 
or more, a failing grade for the course, or any combination of these depending on the 
infraction.  
 
Violations include: Giving or receiving unauthorized help on an examination; Collaborating on 
projects, papers, or other academic exercises which is regarded as inappropriate by the 
instructor(s), submitting substantial portions of the same work for credit more than once, without 
the prior explicit consent of the instructor(s) to whom the material is being submitted; 
misrepresenting material or fabricating information in an academic exercise or assignment; 
Destroying, damaging, or stealing of another's work or working materials; and presenting as 
one's own work, the work of another person (e.g., words, ideas, information, code, data, 
evidence, organizing principles, or presentation style of someone else). This includes 
paraphrasing or summarizing without acknowledgment, submission of another student's work as 
one's own, purchase of prepared research, papers or assignments, and the unacknowledged use of 
research sources gathered by someone else. Failure to indicate accurately the extent and precise 
nature of one's reliance on other sources is also a form of plagiarism. The student is responsible 
for understanding the legitimate use of sources, the appropriate ways of acknowledging 
academic, scholarly, or creative indebtedness, and the consequences for violating University 
regulations. If you have questions about academic integrity - ASK! 
“GREAT” EXPECTATIONS 
• 
Students can expect the instructor to be open to questions and concerns, but remain impartial 
and fair to all students. 
• 
Students are expected to respectfully participate in the course and communicate with the 
instructor if there is confusion or lack of understanding of the material. In turn, the instructor 
will attempt to clarify any material. 
• 
If the instructor is unable to attend class or office hours due to a personal emergency, 
students can expect for arrangements to be made for an alternate instructor or to be informed 
in as a timely a manner as possible. 
• 
Students are expected to provide reliable contact information and inform the instructor of any 
updates.  
• 
Students are expected to contact the instructor via email, phone, or in person for reliable 
response.  
 
 
BFOR 402 
Digital Forensics Moot Court 
 
5 
 
• 
Students are expected to complete all assignments and readings as well as set up meeting 
times with the instructor as necessary. It is important for students to inform the instructor if 
all available office hours interfere with other classes during the first week of the course. 
Course Action Form 
Macintosh HD:Users:damira:Dropbox:SUNY2020:UACProposal:CourseActionForms:BACC 400 Course Action Form.doc 
State University of New York at Albany 
School of Business 
 
 
 
 
Proposal No. ________________________________ 
 
[x] New Course  
 
Revision of: 
 
[] Number 
 
[] Credits 
 
[] Deletion of Courses 
 
 
 
 
[] Title     
               [] Description 
 
[] Cross-Listing  
 
 
 
 
[] Prerequisites   
 [] Put in Suspension 
 
GRADING >A - E 
 
Effective Semester:  Spring 2014 
 
Faculty Area:  Accounting  
 
Course Number:   
New:  BACC 400 
 
Course Title:  Forensic Accounting and Fraud Detection 
 
Credits:  3 
 
Prerequisites:  BACC 211 
 
Course description to appear in catalog: 
This course provides an overview of occupational fraud including misappropriation of assets, financial statement 
fraud and corruption as well as other forensic accounting engagements such as tax fraud and matrimonial disputes. 
The course will explore the characteristics of specific fraud schemes along with the characteristics of those who 
perpetrate them (according to the Annual Report to the Nations compiled by the Association of Certified Fraud 
Examiners). Students will acquire an understanding of the generally accepted accounting principles violated by the 
schemes. Students will become versed in the principles of internal control over the financial reporting system 
including how these principles work to deter financial fraud and ensure compliance with external requirements. 
Relevant guidance from the professional, regulatory and legal environment will be discussed. Prerequisite(s): BACC 
211. Offered fall semester only. 
_____________________________________________________________________________________________ 
Justification of Proposal:  
 
The department wants to offer this course as a core course for the School of Business Digital Forensics major and as 
an elective for School of Business students. 
_____________________________________________________________________________________________ 
Course presented for S U grading:  
[] Yes 
 
[x] No 
 
   NONE 
 
   Not applicable 
_____________________________________________________________________________________________ 
Cross-Listing Department:  (If appropriate): NA 
 
 
 
Course No. 
________________________________________________________  
____________________________ 
Other School or Department affected by change: NA 
 
Action 
Approved 
Disapproved 
Return to 
Reconsider 
Signature 
Date 
Proposed to  
Curriculum Committee 
 X 
 
 
 
 
Curriculum Committee 
X 
 
 
 
 
Faculty 
X 
 
 
 
 
Dean 
X 
 
 
 
 
Other Schools or Departments notified if affected: 
Sent to Dean of Graduate Studies OR Designee, Jon Bartow, on: ____________ by _________________________ 
Course Action Form 
Macintosh HD:Users:damira:Dropbox:SUNY2020:UACProposal:CourseActionForms:BACC 400 Course Action Form.doc 
 
Course Action Form 
Macintosh HD:Users:damira:Dropbox:SUNY2020:UACProposal:CourseActionForms:BACC 401 Course Action Form.doc 
State University of New York at Albany 
School of Business 
 
 
 
 
Proposal No. ________________________________ 
 
[x] New Course  
 
Revision of: 
 
[] Number 
 
[] Credits 
 
[] Deletion of Courses 
 
 
 
 
[] Title     
               [] Description 
 
[] Cross-Listing  
 
 
 
 
[] Prerequisites   
 [] Put in Suspension 
 
GRADING >A - E 
 
Effective Semester:  Spring 2014 
 
Faculty Area:  Accounting  
 
Course Number:   
New:  BACC 401 
 
Course Title:  Forensic Accounting and Investigations II 
 
Credits:  3 
 
Prerequisites:  BACC 400 
 
Course description to appear in catalog: 
Students will learn the process and principal techniques for conducting fraud examinations and other forensic 
investigations as well as why careful attention to them is critical to a successful investigation. Students will learn the 
role of analytical review procedures in the investigation of financial fraud. Document analysis and the art of 
effective interviewing during investigations will be explored.  Students will learn the proper procedures for evidence 
handling. Finally students will learn to write a report that succinctly and effectively communicates the completed 
investigation. Relevant guidance from the professional, regulatory and legal environment will be discussed. 
Prerequisite(s): BACC 400. Offered spring semester only. 
 
_____________________________________________________________________________________________ 
Justification of Proposal:  
 
The department wants to offer this course as a core course for the School of Business Digital Forensics major and as 
an elective for School of Business students. 
_____________________________________________________________________________________________ 
Course presented for S U grading:  
[] Yes 
 
[x] No 
 
   NONE 
 
   Not applicable 
_____________________________________________________________________________________________ 
Cross-Listing Department:  (If appropriate): NA 
 
 
 
Course No. 
________________________________________________________  
____________________________ 
Other School or Department affected by change: NA 
 
Action 
Approved 
Disapproved 
Return to 
Reconsider 
Signature 
Date 
Proposed to  
Curriculum Committee 
 X 
 
 
 
 
Curriculum Committee 
X 
 
 
 
 
Faculty 
X 
 
 
 
 
Dean 
X 
 
 
 
 
Other Schools or Departments notified if affected: 
Sent to Dean of Graduate Studies OR Designee, Jon Bartow, on: ____________ by _________________________ 
 
Course Action Form 
Macintosh HD:Users:damira:Dropbox:SUNY2020:UACProposal:CourseActionForms:BFOR 100 Course Action Form.doc 
State University of New York at Albany 
School of Business 
 
 
 
 
Proposal No. ________________________________ 
 
[X] New Course  
 
Revision of: 
 
[] Number 
 
[] Credits 
 
[] Deletion of Courses 
 
 
 
 
[] Title     
               [] Description 
 
[] Cross-Listing  
 
 
 
 
[] Prerequisites   
 [] Put in Suspension 
 
GRADING >A - E 
 
Effective Semester:  Spring 2014 
 
Faculty Area:  Information Technology Management  
 
 
 
Course Number:   
New:  BFOR 100 
 
Course Title:   Introduction to Computing and Information Science 
 
Credits:  3 
 
Prerequisites:  None 
 
Course description to appear in catalog: 
This course provides a foundation of information systems concepts that can be applied to future learning in 
advanced topics. The course will include background in the history and social implications of computing including 
cyber ethics; emergent and contemporary information technology and its nomenclature; information and data 
abstraction, representation, manipulation and storage; operating systems; networking and the Internet, programming 
languages, logic, and algorithms; database systems; digital graphics and multimedia; and information security.   
 
_____________________________________________________________________________________________ 
Justification of Proposal:  
 
The department wants to offer this course as a core course for the School of Business Digital Forensics major and as 
an elective for School of Business students. 
____________________________________________________________________________________________ 
Course presented for S U grading:  
[] Yes 
 
[x] No 
 
   NONE 
 
   Not applicable 
_____________________________________________________________________________________________ 
Cross-Listing Department:  (If appropriate): NA 
 
 
 
Course No. 
________________________________________________________  
____________________________ 
Other School or Department affected by change: NA 
 
Action 
Approved 
Disapproved 
Return to 
Reconsider 
Signature 
Date 
Proposed to  
Curriculum Committee 
 X 
 
 
 
 
Curriculum Committee 
X 
 
 
 
 
Faculty 
X 
 
 
 
 
Dean 
X 
 
 
 
 
Other Schools or Departments notified if affected: 
Sent to Dean of Graduate Studies OR Designee, Jon Bartow, on: ____________ by _________________________ 
 
Course Action Form 
Macintosh HD:Users:damira:Dropbox:SUNY2020:UACProposal:CourseActionForms:BFOR 201 Course Action Form.doc 
State University of New York at Albany 
School of Business 
 
 
 
 
Proposal No. ________________________________ 
 
[] New Course 
 
 
Revision of: 
 
[X] BITM 201 
 
[X] 3 Credits 
 
[] Deletion of Courses 
 
 
 
 
[X] Introduction to Digital Forensics [] Description 
 
[] Cross-Listing  
 
 
 
 
[] Prerequisites   
 [] Put in Suspension 
 
GRADING >A - E 
 
Effective Semester: Fall 2013 
 
Faculty Area: 
Information Technology Management  
 
Course Number:   
New:  BFOR 201 
 
Course Title:  Introduction to Digital Forensics 
 
Credits: 3 
 
Prerequisites:  N/A 
 
Course description to appear in catalog:  
In this course, students will learn the fundamental process of analyzing data collected from electronic devices 
(including computers, media, and other digital evidence). Students will become familiar with proper techniques and 
tools utilized for securing, handling and preserving digital and multimedia evidence at physical crime scenes. 
Students will utilize examination and chain of custody forms, as well as prepare crime scene & digital acquisition 
reports related to administrative, civil and criminal investigations. 
 
_____________________________________________________________________________________ 
 
Justification of Proposal:  
 
The department wants to offer this course as a core course for the School of Business Digital Forensics major and as 
an elective for School of Business students. There has been a revision of the course number and description. The 
description has changed to clarify and distinguish the course content. 
_____________________________________________________________________________________________ 
Course presented for S U grading:  
[] Yes 
 
[x] No 
 
   NONE 
 
   Not applicable 
_____________________________________________________________________________________________ 
Cross-Listing Department:  (If appropriate): NA 
 
 
 
Course No. 
________________________________________________________  
____________________________ 
Other School or Department affected by change: NA 
 
Action 
Approved 
Disapproved 
Return to 
Reconsider 
Signature 
Date 
Proposed to  
Curriculum Committee 
 X 
 
 
 
 
Curriculum Committee 
X 
 
 
 
 
Faculty 
X 
 
 
 
 
Dean 
X 
 
 
 
 
Other Schools or Departments notified if affected: 
Sent to Dean of Graduate Studies OR Designee, Jon Bartow, on: ____________ by _________________________ 
 
Course Action Form 
Macintosh HD:Users:damira:Dropbox:SUNY2020:UACProposal:CourseActionForms:BFOR 202 Course Action Form.doc 
State University of New York at Albany 
School of Business 
 
 
 
 
Proposal No. ________________________________ 
 
[] New Course 
 
 
Revision of: 
 
[X] BITM 202 
 
[X] 3 Credits 
 
[] Deletion of Courses 
 
 
 
 
[X] Cyber Crime Investigation [] Description 
 
[] Cross-Listing  
 
 
 
 
[] Prerequisites   
 [] Put in Suspension 
 
GRADING >A - E 
 
Effective Semester:  Fall 2013 
 
Faculty Area:  Information Technology Management  
 
 
 
Course Number:   
New:  BFOR 202 
 
Course Title:   Cyber Crime Investigations 
 
Credits:  3 
 
Prerequisites:  None 
 
Course description to appear in catalog: 
This course will teach students forensic investigative techniques specifically for managing cyber crimes 
including collection and preservation of data from different sources, such as the Internet and "cloud" 
computing environments. Students will learn the legal processes available for collecting and preserving 
such evidence in conducting cyber investigations. Offered fall semester only. 
_____________________________________________________________________________________________ 
Justification of Proposal:  
 
The department wants to offer this course as a core course for the School of Business Digital Forensics major and as 
an elective for School of Business students. There has been a revision of the course number, title, and description. 
The description has changed to clarify and distinguish the course content. 
 
____________________________________________________________________________________________ 
Course presented for S U grading:  
[] Yes 
 
[x] No 
 
   NONE 
 
   Not applicable 
_____________________________________________________________________________________________ 
Cross-Listing Department:  (If appropriate): NA 
 
 
 
Course No. 
________________________________________________________  
____________________________ 
Other School or Department affected by change: NA 
 
Action 
Approved 
Disapproved 
Return to 
Reconsider 
Signature 
Date 
Proposed to  
Curriculum Committee 
 X 
 
 
 
 
Curriculum Committee 
X 
 
 
 
 
Faculty 
X 
 
 
 
 
Dean 
X 
 
 
 
 
Other Schools or Departments notified if affected: 
Sent to Dean of Graduate Studies OR Designee, Jon Bartow, on: ____________ by _________________________ 
 
Course Action Form 
Macintosh HD:Users:damira:Dropbox:SUNY2020:UACProposal:CourseActionForms:BFOR 203 Course Action Form.doc 
State University of New York at Albany 
School of Business 
 
 
 
 
Proposal No. ________________________________ 
 
[X] New Course  
 
Revision of: 
 
[] Number 
 
[] Credits 
 
[] Deletion of Courses 
 
 
 
 
[] Title     
               [] Description 
 
[] Cross-Listing  
 
 
 
 
[] Prerequisites   
 [] Put in Suspension 
 
GRADING >A - E 
 
Effective Semester:  Spring 2014 
 
Faculty Area:  Information Technology Management  
 
 
 
Course Number:   
New:  BFOR 203 
 
Course Title:   Networking – Introduction to Data Communication 
 
Credits:  3 
 
Prerequisites:  None 
 
Course description to appear in catalog:  
The past couple of decades have witnessed the digital revolution profoundly altering our society. Most of the 
business affairs have been linked to communication and networking technologies. With tremendous advances in 
networking, it is now feasible to connect all the devices such as computers, tablets, smart phones, and mainframes 
together. However, the newly innovative communication and networking technologies pose additional challenges to 
business and IT management. Nowadays, IT professionals must have an elementary understanding of those 
technologies that facilitate them better impose management in the organization or perform advanced analysis such as 
for network forensics. Balanced technical and managerial contents are incorporated to enable students to learn from 
various perspectives. This course will introduce the student to the organization and design of data networks. Topics 
include networking media, Ethernet technology, the TCP/IP protocol suite, subnets, routers and routing protocols, 
Wide Area Networks (WANs), and fundamentals of network management. This course includes hands-on 
experience of networking techniques. Offered fall semester only. 
 
_____________________________________________________________________________________ 
Justification of Proposal:  
 
The department wants to offer this course as a core course for the School of Business Digital Forensics major and as 
an elective for School of Business students. 
____________________________________________________________________________________________ 
Course presented for S U grading:  
[] Yes 
 
[x] No 
 
   NONE 
 
   Not applicable 
_____________________________________________________________________________________________ 
Cross-Listing Department:  (If appropriate): NA 
 
 
 
Course No. 
________________________________________________________  
____________________________ 
Other School or Department affected by change: NA 
 
Action 
Approved 
Disapproved 
Return to 
Reconsider 
Signature 
Date 
Proposed to  
Curriculum Committee 
 X 
 
 
 
 
Curriculum Committee 
X 
 
 
 
 
Faculty 
X 
 
 
 
 
Dean 
X 
 
 
 
 
Course Action Form 
Macintosh HD:Users:damira:Dropbox:SUNY2020:UACProposal:CourseActionForms:BFOR 203 Course Action Form.doc 
Other Schools or Departments notified if affected: 
Sent to Dean of Graduate Studies OR Designee, Jon Bartow, on: ____________ by _________________________ 
 
Course Action Form 
Macintosh HD:Users:damira:Dropbox:SUNY2020:UACProposal:CourseActionForms:BFOR 204 Course Action Form.doc 
State University of New York at Albany 
School of Business 
 
 
 
 
Proposal No. ________________________________ 
 
[X] New Course  
 
Revision of: 
 
[] Number 
 
[] Credits 
 
[] Deletion of Courses 
 
 
 
 
[] Title     
               [] Description 
 
[] Cross-Listing  
 
 
 
 
[] Prerequisites   
 [] Put in Suspension 
 
GRADING >A - E 
 
Effective Semester:  Spring 2014 
 
Faculty Area:  Information Technology Management  
 
 
 
Course Number:   
New:  BFOR 204 
 
Course Title:   Fundamentals Information and Cyber Security 
 
Credits:  3 
 
Prerequisites:  None 
 
Course description to appear in catalog:  
This course covers computer and network security. This course will examine general security concepts that include: 
communication security, infrastructure security, operation/organizational security, basic cryptography and 
steganography. Students will learn and apply de facto security best practices administering clients, servers and 
firewalls in a dedicated computer network laboratory. Students will have the opportunity to assess vulnerabilities 
and administrate information security. Offered spring semester only. 
 
_____________________________________________________________________________________________ 
Justification of Proposal:  
 
The department wants to offer this course as a core course for the School of Business Digital Forensics major and as 
an elective for School of Business students. 
____________________________________________________________________________________________ 
Course presented for S U grading:  
[] Yes 
 
[x] No 
 
   NONE 
 
   Not applicable 
_____________________________________________________________________________________________ 
Cross-Listing Department:  (If appropriate): NA 
 
 
 
Course No. 
________________________________________________________  
____________________________ 
Other School or Department affected by change: NA 
 
Action 
Approved 
Disapproved 
Return to 
Reconsider 
Signature 
Date 
Proposed to  
Curriculum Committee 
 X 
 
 
 
 
Curriculum Committee 
X 
 
 
 
 
Faculty 
X 
 
 
 
 
Dean 
X 
 
 
 
 
Other Schools or Departments notified if affected: 
Sent to Dean of Graduate Studies OR Designee, Jon Bartow, on: ____________ by _________________________ 
 
Course Action Form 
Macintosh HD:Users:damira:Dropbox:SUNY2020:UACProposal:CourseActionForms:BFOR 300 Course Action Form.doc 
State University of New York at Albany 
School of Business 
 
 
 
 
Proposal No. ________________________________ 
 
[x] New Course  
 
Revision of: 
 
[] Number 
 
[] Credits 
 
[] Deletion of Courses 
 
 
 
 
[] Title     
               [] Description 
 
[] Cross-Listing  
 
 
 
 
[] Prerequisites   
 [] Put in Suspension 
 
GRADING >A - E 
 
Effective Semester: Spring 2014 
 
Faculty Area: Information Technology Management  
 
Course Number:   
New:  BFOR 300 
 
Course Title:   Databases for Digital Forensics 
 
Credits: 3 
 
Prerequisites:  BFOR 100 or permission of instructor. 
 
Course description to appear in catalog: 
A large part of digital forensics deals with extraction and collection of data across electronic devices each of which 
has different architecture. In this class students learn the traditional relational database design and then understand 
the architecture of data storage in mobile electronic devices. The class also discusses in depth the storage of data on 
the cloud and the ramifications of that on digital forensics. Students also learn the basic techniques for analyzing 
data including use of Structured Query Language, data mining techniques and social network analysis. Students will 
also use scripting languages to efficiently clean up data from text files and extract information from files. 
Prerequisite(s): BFOR 100 or permission of instructor. Offered fall semester only.  
_____________________________________________________________________________________________ 
Justification of Proposal:  
 
The department wants to offer this course as a core course for the School of Business Digital Forensics major and as 
an elective for School of Business students. 
_____________________________________________________________________________________________ 
Course presented for S U grading:  
[] Yes 
 
[x] No 
 
   NONE 
 
   Not applicable 
_____________________________________________________________________________________________ 
Cross-Listing Department:  (If appropriate): NA 
 
 
 
Course No. 
________________________________________________________  
____________________________ 
Other School or Department affected by change: NA 
 
Action 
Approved 
Disapproved 
Return to 
Reconsider 
Signature 
Date 
Proposed to  
Curriculum Committee 
 X 
 
 
 
 
Curriculum Committee 
X 
 
 
 
 
Faculty 
X 
 
 
 
 
Dean 
X 
 
 
 
 
Other Schools or Departments notified if affected: 
Sent to Dean of Graduate Studies OR Designee, Jon Bartow, on: ____________ by _________________________ 
 
Course Action Form 
Macintosh HD:Users:damira:Dropbox:SUNY2020:UACProposal:CourseActionForms:BFOR 301 Course Action Form.doc 
State University of New York at Albany 
School of Business 
 
 
 
 
Proposal No. ________________________________ 
 
[] New Course 
 
 
Revision of: 
 
[X] BITM 301 
 
[X] 3 Credits 
 
[] Deletion of Courses 
 
 
 
 
[X] Computer Forensics I   [] Description 
 
[] Cross-Listing  
 
 
 
 
[X] BITM 201  
 
 [] Put in Suspension 
 
GRADING >A - E 
 
Effective Semester: Spring 2014 
 
Faculty Area: 
Information Technology Management 
 
Course Number:   
New: BFOR 301 
 
Course Title:  Computer Forensics I 
 
Credits: 3 
 
Prerequisites:  BFOR 201 or permission of instructor 
 
Course description to appear in catalog: 
This course prepares students to conduct digital forensic examination of computers, removable media and other 
electronic devices. Students will use digital forensics tools and techniques to analyze digital evidence pursuant to an 
investigation, while utilizing industry standards and best practices. This course will prepare student in the 
development and implementation of forensic incident response plans, policies and procedures. Students will engage 
in oral and written reporting outlining digital forensic analysis findings and conclusions, in a professionally 
acceptable manner, pursuant to administrative, civil and criminal legal proceedings. 
Prerequisite(s): BFOR 201 or permission of instructor. Offered fall semester only. 
 
 
_____________________________________________________________________________________ 
 
Justification of Proposal:  
The department wants to offer this course as a core course for the School of Business Digital Forensics major and as 
an elective for School of Business students. There has been a revision of the course number and description. The 
description has changed to clarify and distinguish the course content. 
_____________________________________________________________________________________________ 
Course presented for S U grading:  
[] Yes 
 
[x] No 
 
   NONE 
 
   Not applicable 
_____________________________________________________________________________________________ 
Cross-Listing Department:  (If appropriate): NA 
 
 
 
Course No. 
________________________________________________________  
____________________________ 
Other School or Department affected by change: NA 
 
Action 
Approved 
Disapproved 
Return to 
Reconsider 
Signature 
Date 
Proposed to  
Curriculum Committee 
 X 
 
 
 
 
Curriculum Committee 
X 
 
 
 
 
Faculty 
X 
 
 
 
 
Dean 
X 
 
 
 
 
Other Schools or Departments notified if affected: 
Sent to Dean of Graduate Studies OR Designee, Jon Bartow, on: ____________ by _________________________ 
Course Action Form 
Macintosh HD:Users:damira:Dropbox:SUNY2020:UACProposal:CourseActionForms:BFOR 301 Course Action Form.doc 
 
Course Action Form 
Macintosh HD:Users:damira:Dropbox:SUNY2020:UACProposal:CourseActionForms:BFOR 302 Course Action Form.doc 
State University of New York at Albany 
School of Business 
 
 
 
 
Proposal No. ________________________________ 
 
[] New Course 
 
 
Revision of: 
 
[X] BITM 302 
 
[X] 3 Credits 
 
[] Deletion of Courses 
 
 
 
 
[X] eDiscovery                    [] Description 
 
[] Cross-Listing  
 
 
 
 
[] Prerequisites   
 [] Put in Suspension 
 
GRADING >A - E 
 
Effective Semester: Spring 2014 
 
Faculty Area:  Information Technology Management  
 
Course Number:   
New: BFOR 302 
 
Course Title:  eDiscovery Forensics 
 
Credits: 3 
 
Prerequisites:  None 
 
Course description to appear in catalog:  
This course prepares student for the electronic collection, preservation and management of corporate information. It 
provides a foundation on basic corporate incident response challenges and proper collection methods for electronic 
data subject to legal and regulatory requirements. Student will utilize forensics tools for searching, culling and 
presenting corporate data, pursuant to administrative and civil eDiscovery cases. Offered fall semester only.  
___________________________________________________________________________________________ 
Justification of Proposal:  
The department wants to offer this course as a core course for the School of Business Digital Forensics major and as 
an elective for School of Business students. There has been a revision of the course number, title, and description. 
The description has changed to clarify and distinguish the course content. 
_____________________________________________________________________________________________ 
Course presented for S U grading:  
[] Yes 
 
[x] No 
 
   NONE 
 
   Not applicable 
_____________________________________________________________________________________________ 
Cross-Listing Department:  (If appropriate): NA 
 
 
 
Course No. 
________________________________________________________  
____________________________ 
Other School or Department affected by change: NA 
 
Action 
Approved 
Disapproved 
Return to 
Reconsider 
Signature 
Date 
Proposed to  
Curriculum Committee 
 X 
 
 
 
 
Curriculum Committee 
X 
 
 
 
 
Faculty 
X 
 
 
 
 
Dean 
X 
 
 
 
 
Other Schools or Departments notified if affected: 
Sent to Dean of Graduate Studies OR Designee, Jon Bartow, on: ____________ by _________________________ 
 
Course Action Form 
Macintosh HD:Users:damira:Dropbox:SUNY2020:UACProposal:CourseActionForms:BFOR 303 Course Action Form.doc 
State University of New York at Albany 
School of Business 
 
 
 
 
Proposal No. ________________________________ 
 
[x] New Course  
 
Revision of: 
 
[] Number 
 
[] Credits 
 
[] Deletion of Courses 
 
 
 
 
[] Title     
               [] Description 
 
[] Cross-Listing  
 
 
 
 
[] Prerequisites   
 [] Put in Suspension 
 
GRADING >A - E 
 
Effective Semester:  Spring 2014 
 
Faculty Area:  Information Technology Management 
 
Course Number:   
New:  BFOR 303 
 
Course Title:  Computer Forensics II 
 
Credits: 3 
 
Prerequisites:  BFOR 301 or permission of instructor. 
 
Course description to appear in catalog: 
This course prepares students to conduct a digital forensic examination and analysis involving complex cases, 
electronic devices and data, as well as other forensic processes utilized to ensure government and corporate 
continuity. This course will prepare student to develop and implement policies and procedures for computer 
forensic laboratories involving operations and quality control management. It prepares students to compose and 
present oral and written reports that include laboratory audits, forensic analysis findings and court presentation 
material. Prerequisite(s): BFOR 301 or permission of instructor. Offered spring semester only. 
 
_____________________________________________________________________________________________ 
Justification of Proposal:  
 
The department wants to offer this course as a core course for the School of Business Digital Forensics major and as 
an elective for School of Business students. 
_____________________________________________________________________________________________ 
Course presented for S U grading:  
[] Yes 
 
[x] No 
 
   NONE 
 
   Not applicable 
_____________________________________________________________________________________________ 
Cross-Listing Department:  (If appropriate): NA 
 
 
 
Course No. 
________________________________________________________  
____________________________ 
Other School or Department affected by change: NA 
 
Action 
Approved 
Disapproved 
Return to 
Reconsider 
Signature 
Date 
Proposed to  
Curriculum Committee 
 X 
 
 
 
 
Curriculum Committee 
X 
 
 
 
 
Faculty 
X 
 
 
 
 
Dean 
X 
 
 
 
 
Other Schools or Departments notified if affected: 
Sent to Dean of Graduate Studies OR Designee, Jon Bartow, on: ____________ by _________________________ 
 
Course Action Form 
Macintosh HD:Users:damira:Dropbox:SUNY2020:UACProposal:CourseActionForms:BFOR 304 Course Action Form.doc 
State University of New York at Albany 
School of Business 
 
 
 
 
Proposal No. ________________________________ 
 
[x] New Course  
 
Revision of: 
 
[] Number 
 
[] Credits 
 
[] Deletion of Courses 
 
 
 
 
[] Title     
               [] Description 
 
[] Cross-Listing  
 
 
 
 
[] Prerequisites   
 [] Put in Suspension 
 
GRADING >A - E 
 
Effective Semester:  Spring 2014 
 
Faculty Area:  Information Technology Management  
 
Course Number:   
New:  BFOR 304 
 
Course Title:  Network and Mobile Forensics 
 
Credits:  3 
 
Prerequisites:  BFOR 203 and BFOR 301 
 
Course description to appear in catalog: 
This course exposes students to procedures for conducting live network forensics of computer system components 
and data. It prepares students to collect, preserve, and examines networks, computers, mobile devices and relevant 
data that may be critical to an investigation. Students will develop network incident response plans, policies and 
procedures relevant to corporate networks and data, as well as mobile corporate assets, such as mobile devices. It 
prepares students to compose and present oral and written reports that outline network and mobile device forensic 
analysis findings that are technically and legally acceptable in administrative hearings and court proceedings. 
Prerequisite(s): BFOR 203 & BFOR 301. Offered spring semester only. 
 
_____________________________________________________________________________________________ 
Justification of Proposal:  
 
The department wants to offer this course as a core course for the School of Business Digital Forensics major and as 
an elective for School of Business students. 
_____________________________________________________________________________________________ 
Course presented for S U grading:  
[] Yes 
 
[x] No 
 
   NONE 
 
   Not applicable 
_____________________________________________________________________________________________ 
Cross-Listing Department:  (If appropriate): NA 
 
 
 
Course No. 
________________________________________________________  
____________________________ 
Other School or Department affected by change: NA 
 
Action 
Approved 
Disapproved 
Return to 
Reconsider 
Signature 
Date 
Proposed to  
Curriculum Committee 
 X 
 
 
 
 
Curriculum Committee 
X 
 
 
 
 
Faculty 
X 
 
 
 
 
Dean 
X 
 
 
 
 
Other Schools or Departments notified if affected: 
Sent to Dean of Graduate Studies OR Designee, Jon Bartow, on: ____________ by _________________________ 
 
Course Action Form 
Macintosh HD:Users:damira:Dropbox:SUNY2020:UACProposal:CourseActionForms:BFOR 401W Course Action Form.doc 
State University of New York at Albany 
School of Business 
 
 
 
 
Proposal No. ________________________________ 
 
[x] New Course  
 
Revision of: 
 
[] Number 
 
[] Credits 
 
[] Deletion of Courses 
 
 
 
 
[] Title     
               [] Description 
 
[] Cross-Listing  
 
 
 
 
[] Prerequisites   
 [] Put in Suspension 
 
GRADING >A - E 
 
Effective Semester:  Spring 2014 
 
Faculty Area:   Information Technology Management 
 
Course Number:   
New:  BFOR 401W 
 
Course Title:  Advanced Digital Forensics 
 
Credits: 3 
 
Prerequisites:  BFOR 302, BFOR 303 & BFOR 304 
 
Course description to appear in catalog: 
Instructor will guide students through proficiency testing by utilizing digital forensic skills obtained in previous 
coursework to develop an incident response plan to guide a forensic investigation. Based on case-study scenario, 
student will also conduct forensic analysis of several items of digital evidence, preparing comprehensive written 
forensic laboratory reports and present findings to a panel of legal, forensics and management subject matter experts 
for constructive feedback. Students will also prepare exhibits and other materials for court presentation purposes 
based on the case-study scenario, forensic analysis findings and written laboratory reports. Instructor will conduct 
quality control assessments to ensure students are performing forensic analysis that is in compliance with industry 
standards guiding forensic and laboratory work environments Prerequisite(s): BFOR 302, BFOR 303, and BFOR 
304. Offered fall semester only. 
 
_____________________________________________________________________________________________ 
Justification of Proposal:  
 
The department wants to offer this course as a core course for the School of Business Digital Forensics major and as 
an elective for School of Business students. 
_____________________________________________________________________________________________ 
Course presented for S U grading:  
[] Yes 
 
[x] No 
 
   NONE 
 
   Not applicable 
_____________________________________________________________________________________________ 
Cross-Listing Department:  (If appropriate): NA 
 
 
 
Course No. 
________________________________________________________  
____________________________ 
Other School or Department affected by change: NA 
 
Action 
Approved 
Disapproved 
Return to 
Reconsider 
Signature 
Date 
Proposed to  
Curriculum Committee 
 X 
 
 
 
 
Curriculum Committee 
X 
 
 
 
 
Faculty 
X 
 
 
 
 
Dean 
X 
 
 
 
 
Other Schools or Departments notified if affected: 
Course Action Form 
Macintosh HD:Users:damira:Dropbox:SUNY2020:UACProposal:CourseActionForms:BFOR 401W Course Action Form.doc 
Sent to Dean of Graduate Studies OR Designee, Jon Bartow, on: ____________ by _________________________ 
 
Course Action Form 
Macintosh HD:Users:damira:Dropbox:SUNY2020:UACProposal:CourseActionForms:BFOR 402 Course Action Form.doc 
State University of New York at Albany 
School of Business 
 
 
 
 
Proposal No. ________________________________ 
 
[x] New Course  
 
Revision of: 
 
[] Number 
 
[] Credits 
 
[] Deletion of Courses 
 
 
 
 
[] Title     
               [] Description 
 
[] Cross-Listing  
 
 
 
 
[] Prerequisites   
 [] Put in Suspension 
 
GRADING >A - E 
 
Effective Semester:  Spring 2014 
 
Faculty Area:  Information Technology Management 
 
Course Number:   
New:  BFOR 402 
 
Course Title:  Digital Forensics Moot Court 
 
Credits:  4 
 
Prerequisites:  BFOR 302, BFOR 303, BFOR 304 & BFOR 401W (BFOR 401W may be taken concurrently) 
 
Course description to appear in catalog:  
This is a capstone course where students will learn how to provide expert testimony as a part of presenting their 
findings from completion of an advanced level digital forensic analysis. Students will learn how to prepare for and 
give expert witness testimony related to digital evidence, including how to deal with opposing counsel cross-
examinations and how to effectively relay such information to a jury. Students will engage in a “mock” court grand 
jury, suppression hearing, and trial proceedings. Panel of subject matter experts from the legal, forensic and 
management fields will assist in the guidance and constructive feedback of students participating in “mock” court 
proceedings. Instructor will assess student’s competence in providing a technical testimony to a group of non-
technical listeners, such as judges, juries, as well as administrative and human resource officers. Prerequisite(s): 
BFOR 302, BFOR 303, BFOR 304 and BFOR 401W (BFOR 401W may be taken concurrently). Offered spring 
semester only. 
_____________________________________________________________________________________________ 
Justification of Proposal: The department wants to offer this course as a core course for the School of Business 
Digital Forensics major and as an elective for School of Business students. 
_____________________________________________________________________________________________ 
Course presented for S U grading:  
[] Yes 
 
[x] No 
 
   NONE 
 
   Not applicable 
_____________________________________________________________________________________________ 
Cross-Listing Department:  (If appropriate): NA 
 
 
 
Course No. 
________________________________________________________  
____________________________ 
Other School or Department affected by change: NA 
 
Action 
Approved 
Disapproved 
Return to 
Reconsider 
Signature 
Date 
Proposed to  
Curriculum Committee 
 X 
 
 
 
 
Curriculum Committee 
X 
 
 
 
 
Faculty 
X 
 
 
 
 
Dean 
X 
 
 
 
 
Other Schools or Departments notified if affected: 
Sent to Dean of Graduate Studies OR Designee, Jon Bartow, on: ____________ by _________________________ 
 
 
 
University at Albany – State University of New York 
School of Business 
Course and Program Action Form 
Proposal No. 
 
 
Please check one: 
 
Course Proposal 
x Program Proposal 
 
 
Please mark all that apply: 
x New Course 
Revision of: 
 
Number 
 
Description 
 
Cross-Listing 
 
Title 
 
Prerequisites 
 
Shared-Resources Course 
 
Credits 
 
Deactivate/Activate Course (boldface & underline as appropriate) 
 
Other (specify):  
Department: 
 
Effective Semester, Year: Fall 2014 
 
Course Number 
Current:  
New:  
Credits:  
Program 
Title: 
Bachelors of Science in Digital Forensics 
Program Description to appear in Bulletin: 
 
See Attached 
Prerequisites statement to be appended to description in Bulletin: 
See attached 
If S/U is to be designated as the only grading system in the course, check here: 
 
 
This course is (will be) cross listed with (i.e., CAS ###): 
 
This course is (will be) a shared-resources course with (i.e., CAS ###): 
 
 
Explanation of proposal: 
The School of Business proposes to create a Bachelor of Science in Digital Forensics – a 
combined major/minor undergraduate program.  This curriculum is designed to provide a 
foundation of fundamental knowledge of and basic proficiency with digital forensics, and nurture 
the development of students who are able to think critically, perform high-level analysis, adapt to 
changing environments through innovation and exploration, and have a deep understanding of 
the technical, legal, social, financial, political and psychological influences that are related to the 
practice of digital forensics and investigation of cyber crime. 
Other departments or schools which offer similar or related courses and which have certified that this proposal does not 
overlap their offering: 
College of Computing and Information  
 
Chair of Proposing Department (TYPE NAME) 
Assistant to Chair or Department Secretary (TYPE NAME) 
Date 
Sanjay Goel 
Lauri Mosall                                                         October 18, 2013 
 
Approved by Chair(s) of Departments having cross-listed course(s) 
[Copy of e-mail approval(s) on following page.] 
Date 
Dean of College 
Date 
N/A 
 
 
 
Chair of Academic Programs Committee 
Date 
Dean of  Undergraduate or Graduate Studies 
Date 
 
 
 
 
 
 
 
 
 
 
Requirements	
  for	
  the	
  B.S.	
  in	
  Digital	
  Forensics	
  
The	
  BS	
  program	
  in	
  Digital	
  Forensics	
  combined	
  major/minor	
  requires	
  the	
  completion	
  of	
  the	
  
following	
  70	
  credits	
  clustered	
  in	
  four	
  categories:	
  
1. 	
  Foundational	
  Principles	
  (25	
  credits):	
  	
  APSY	
  101,	
  ASOC	
  115,	
  BACC	
  211,	
  BFOR	
  100,	
  BITM	
  215,	
  
RCRJ	
  201,	
  RCRJ	
  203,	
  RCRJ	
  281	
  (or	
  AMAT	
  108).	
  
2. Core	
  Competencies	
  (16	
  credits):	
  	
  RCRJ	
  202,	
  BFOR	
  203,	
  BFOR	
  204,	
  BFOR	
  300,	
  BACC	
  400.	
  
3. Concentration	
  (21	
  credits):	
  	
  BFOR	
  201,	
  BFOR	
  202,	
  BFOR	
  301,	
  BFOR	
  302,	
  BFOR	
  303,	
  BFOR	
  
304,	
  BACC	
  401.	
  
4. Capstone	
  (8	
  credits):	
  	
  BFOR	
  401W	
  and	
  BFOR	
  402	
  
5. Course	
  Descriptions	
  
	
  
BACC 400 Forensic Accounting and Fraud Detection 
This course provides an overview of occupational fraud including misappropriation of 
assets, financial statement fraud and corruption as well as other forensic accounting 
engagements such as tax fraud and matrimonial disputes. The course will explore the 
characteristics of specific fraud schemes along with the characteristics of those who 
perpetrate them (according to the Annual Report to the Nations compiled by the 
Association of Certified Fraud Examiners). Students will acquire an understanding of the 
generally accepted accounting principles violated by the schemes. Students will become 
versed in the principles of internal control over the financial reporting system including 
how these principles work to deter financial fraud and ensure compliance with external 
requirements. Relevant guidance from the professional, regulatory and legal 
environment will be discussed. Prerequisite(s): BACC 211. Offered fall semester only. 
 
BACC 401 Forensic Accounting Investigative Techniques 
Students will learn the process and principal techniques for conducting fraud 
examinations and other forensic investigations as well as why careful attention to them is 
critical to a successful investigation. Students will learn the role of analytical review 
procedures in the investigation of financial fraud. Document analysis and the art of 
effective interviewing during investigations will be explored.  Students will learn the 
proper procedures for evidence handling. Finally students will learn to write a report that 
succinctly and effectively communicates the completed investigation. Relevant guidance 
from the professional, regulatory and legal environment will be discussed. 
Prerequisite(s): BACC 400. Offered spring semester only. 
 
BFOR 100 Introduction to Information Systems (4) 
This course provides a foundation of information systems concepts that can be applied 
to future learning in advanced topics. The course will include background in the history 
and social implications of computing including cyber ethics; emergent and contemporary 
information technology and its nomenclature; information and data abstraction, 
representation, manipulation and storage; operating systems; networking and the 
Internet, programming languages, logic, and algorithms; database systems; digital 
graphics and multimedia; and information security.   
 
BFOR 201 Introduction to Digital Forensics (3) 
In this course, students will learn the fundamental process of analyzing data collected 
from electronic devices (including computers, media, and other digital evidence). 
 
 
Students will become familiar with proper techniques and tools utilized for securing, 
handling and preserving digital and multimedia evidence at physical crime scenes. 
Students will utilize examination and chain of custody forms, as well as prepare crime 
scene & digital acquisition reports related to administrative, civil and criminal 
investigations. 
 
BFOR 202 Cyber Crime Investigations (3) 
This course will teach students forensic investigative techniques specifically for 
managing cyber crimes including collection and preservation of data from different 
sources, such as the Internet and "cloud" computing environments. Students will learn 
the legal processes available for collecting and preserving such evidence in conducting 
cyber investigations. Offered fall semester only. 
 
BFOR	
  203	
  Networking	
  -­‐	
  Introduction	
  to	
  Data	
  Communication	
  w/	
  lab	
  (3)	
  
The past couple of decades have witnessed the digital revolution profoundly altering our 
society. Most of the business affairs have been linked to communication and networking 
technologies. With tremendous advances in networking, it is now feasible to connect all 
the devices such as computers, tablets, smart phones, and mainframes together. 
However, the newly innovative communication and networking technologies pose 
additional challenges to business and IT management. Nowadays, IT professionals must 
have an elementary understanding of those technologies that facilitate them better 
impose management in the organization or perform advanced analysis such as for 
network forensics. Balanced technical and managerial contents are incorporated to 
enable students to learn from various perspectives. This course will introduce the 
student to the organization and design of data networks. Topics include networking 
media, Ethernet technology, the TCP/IP protocol suite, subnets, routers and routing 
protocols, Wide Area Networks (WANs), and fundamentals of network management. 
This course includes hands-on experience of networking techniques. Offered fall 
semester only. 
 
BFOR 204 Fundamentals of Information and Cyber Security (3) 
This course covers computer and network security. This course will examine general 
security concepts that include: communication security, infrastructure security, 
operation/organizational security, basic cryptography and steganography. Students will 
learn and apply de facto security best practices administering clients, servers and 
firewalls in a dedicated computer network laboratory. Students will have the opportunity 
to assess vulnerabilities and administrate information security. Offered spring semester 
only. 
 
BFOR 300 Databases for Digital Forensics (3) 
A large part of digital forensics deals with extraction and collection of data across 
electronic devices each of which has different architecture. In this class students learn 
the traditional relational database design and then understand the architecture of data 
storage in mobile electronic devices. The class also discusses in depth the storage of 
data on the cloud and the ramifications of that on digital forensics. Students also learn 
the basic techniques for analyzing data including use of Structured Query Language, 
data mining techniques and social network analysis. Students will also use scripting 
languages to efficiently clean up data from text files and extract information from files. 
Prerequisite(s): BFOR 100 or permission of instructor. Offered fall semester only.  
 
BFOR 301 Computer Forensics I (3) 
This	
   course	
   prepares	
   students	
   to	
   conduct	
   digital	
   forensic	
   examination	
   of	
   computers,	
  
removable	
  media	
  and	
  other	
  electronic	
  devices.	
  Students	
  will	
  use	
  digital	
  forensics	
  tools	
  and	
  
techniques	
  to	
  analyze	
  digital	
  evidence	
  pursuant	
  to	
  an	
  investigation,	
  while	
  utilizing	
  industry	
  
standards	
   and	
   best	
   practices.	
   This	
   course	
   will	
   prepare	
   student	
   in	
   the	
   development	
   and	
  
 
 
implementation	
  of	
  forensic	
  incident	
  response	
  plans,	
  policies	
  and	
  procedures.	
  Students	
  will	
  
engage	
   in	
   oral	
   and	
   written	
   reporting	
   outlining	
   digital	
   forensic	
   analysis	
   findings	
   and	
  
conclusions,	
   in	
   a	
   professionally	
   acceptable	
   manner,	
   pursuant	
   to	
   administrative,	
   civil	
   and	
  
criminal	
  legal	
  proceedings.	
  
Prerequisite(s):	
  BFOR	
  201	
  or	
  permission	
  of	
  instructor.	
  Offered	
  fall	
  semester	
  only.	
  
 
BFOR 302 eDiscovery Forensics (3) 
This course prepares student for the electronic collection, preservation and management 
of corporate information. It provides a foundation on basic corporate incident response 
challenges and proper collection methods for electronic data subject to legal and 
regulatory requirements. Student will utilize forensics tools for searching, culling and 
presenting corporate data, pursuant to administrative and civil eDiscovery cases. 
Offered fall semester only.  
 
BFOR 303 Computer Forensics II (3) 
This	
   course	
   prepares	
   students	
   to	
   conduct	
   a	
   digital	
   forensic	
   examination	
   and	
   analysis	
  
involving	
  complex	
  cases,	
  electronic	
  devices	
  and	
  data,	
  as	
  well	
  as	
  other	
  forensic	
  processes	
  
utilized	
  to	
  ensure	
  government	
  and	
  corporate	
  continuity.	
  This	
  course	
  will	
  prepare	
  student	
  to	
  
develop	
   and	
   implement	
   policies	
   and	
   procedures	
   for	
   computer	
   forensic	
   laboratories	
  
involving	
  operations	
  and	
  quality	
  control	
  management.	
  It	
  prepares	
  students	
  to	
  compose	
  and	
  
present	
  oral	
  and	
  written	
  reports	
  that	
  include	
  laboratory	
  audits,	
  forensic	
  analysis	
  findings	
  
and	
  court	
  presentation	
  material.	
  	
  
Prerequisite(s):	
  BFOR	
  301	
  or	
  permission	
  of	
  instructor.	
  Offered	
  spring	
  semester	
  only.	
  
 
BFOR 304 Network and Mobile Forensics (3) 
This course exposes students to procedures for conducting live network forensics of 
computer system components and data. It prepares students to collect, preserve, and 
examines networks, computers, mobile devices and relevant data that may be critical to 
an investigation. Students will develop network incident response plans, policies and 
procedures relevant to corporate networks and data, as well as mobile corporate assets, 
such as mobile devices. It prepares students to compose and present oral and written 
reports that outline network and mobile device forensic analysis findings that are 
technically and legally acceptable in administrative hearings and court proceedings. 
Prerequisite(s): BFOR 203 & BFOR 301. Offered spring semester only. 
 
BFOR 401W Advanced Digital Forensics (4) 
Instructor will guide students through proficiency testing by utilizing digital forensic skills 
obtained in previous coursework to develop an incident response plan to guide a 
forensic investigation. Based on case-study scenario, student will also conduct forensic 
analysis of several items of digital evidence, preparing comprehensive written forensic 
laboratory reports and present findings to a panel of legal, forensics and management 
subject matter experts for constructive feedback. Students will also prepare exhibits and 
other materials for court presentation purposes based on the case-study scenario, 
forensic analysis findings and written laboratory reports. Instructor will conduct quality 
control assessments to ensure students are performing forensic analysis that is in 
compliance with industry standards guiding forensic and laboratory work environments 
Prerequisite(s): BFOR 302, BFOR 303, and BFOR 304. Offered fall semester only. 
 
BFOR 402 Digital Forensics Moot Court (4) 
This	
  is	
  a	
  capstone	
  course	
  where	
  students	
  will	
  learn	
  how	
  to	
  provide	
  expert	
  testimony	
  as	
  a	
  
part	
   of	
   presenting	
   their	
   findings	
   from	
   completion	
   of	
   an	
   advanced	
   level	
   digital	
   forensic	
  
analysis.	
  Students	
  will	
  learn	
  how	
  to	
  prepare	
  for	
  and	
  give	
  expert	
  witness	
  testimony	
  related	
  
to	
  digital	
  evidence,	
  including	
  how	
  to	
  deal	
  with	
  opposing	
  counsel	
  cross-­‐examinations	
  and	
  
how	
  to	
  effectively	
  relay	
  such	
  information	
  to	
  a	
  jury.	
  Students	
  will	
  engage	
  in	
  a	
  “mock”	
  court	
  
 
 
grand	
  jury,	
  suppression	
  hearing,	
  and	
  trial	
  proceedings.	
  Panel	
  of	
  subject	
  matter	
  experts	
  from	
  
the	
   legal,	
   forensic	
   and	
   management	
   fields	
   will	
   assist	
   in	
   the	
   guidance	
   and	
   constructive	
  
feedback	
   of	
   students	
   participating	
   in	
   “mock”	
   court	
   proceedings.	
   Instructor	
   will	
   assess	
  
student’s	
   competence	
   in	
   providing	
   a	
   technical	
   testimony	
   to	
   a	
   group	
   of	
   non-­‐technical	
  
listeners,	
   such	
   as	
   judges,	
   juries,	
   as	
   well	
   as	
   administrative	
   and	
   human	
   resource	
   officers.	
  
Prerequisite(s):	
   BFOR	
   302,	
   BFOR	
   303,	
   BFOR	
   304	
   and	
   BFOR	
   401W	
   (BFOR	
   401W	
   may	
   be	
  
taken	
  concurrently).	
  Offered	
  spring	
  semester	
  only.	
  
	
  
 
Major Academic Pathway (MAP) 
Digital Forensics 
Bachelor of Science   combined major/minor 
NOTE: This is a suggested course sequence.                                                            Prepared by Advisement Services - 2014 
Fall Semester 1                 
 
**ASOC 115 SS 
**BFOR 100 
US Historical Perspectives Gen Ed US    
Foreign Language Gen Ed FL  
UUNI 110  WCI 
Spring Semester 1 
 
BITM 215 
APSY 101 
** BFOR 201 
** RCRJ 281/AMAT 108 MS 
Natural Science Gen Ed NS                                      
 
Summer 1 
 
Look for a summer job 
in the area of your 
studies 
 
Consider study abroad  
options 
Fall Semester 2 
RCRJ 201 
** BACC 211 (fall only) 
** BFOR 202 
** BFOR 203 
Humanities Gen Ed HU  
Spring Semester 2 
RCRJ 202  
RCRJ 203 
BFOR 204 
International Perspectives Gen Ed IP 
Arts Gen Ed AR 
 
Summer 2 
 
 
Summer Internship 
Fall Semester 3 * 
BFOR 300 
BFOR 301 
BFOR 302 
Elective 
Elective 
Spring Semester 3 
BFOR 303 
BFOR 304 
Challenges 21st Century Gen Ed CH 
Elective  
Elective 
 
Summer 3 
 
Summer internship 
Fall Semester 4 
BFOR 401W 
BACC 400 
Elective 
Elective 
Elective 
Spring Semester 4 
BFOR 402 
BACC 401 
Elective 
Elective 
Congratulations! 
**  Admission requires 3.0 GPA in starred admission courses, plus 3.25 GPA overall 
 
General Education Requirements, for students matriculating Fall 2014 
 
 
 
MS  Mathematics and Statistics  
WCI  Writing and Critical Inquiry 
AR  Arts                 
HU  Humanities     
NS  Natural Sciences  
SS  Social Sciences    
 
 
Credit bearing Professional Development Options: 
RSSW 290, 291 and 390 – Community Service 
Research within major 
University Internship 
Departmental Internship 
 
 
 
 
US  U.S. Historical Perspectives  
IP    International Perspectives  
FL  Foreign Language (one semester of collegiate study, 
or the equivalent, of a foreign language) 
CH Challenges for the 21st Century 
 
 
Community Engaged Coursework 
Study Abroad 
Tutoring opportunities  
UNIVERSITY POLICY AND PLANNING COUNCIL 
CAMPUS IMPACT FORM 
Proposal Title: 
Digital Forensics Undergraduate Major 
College or School 
School of Business 
Department Information Technology Management 
Program Director 
or Sponsor 
Action Category 
Action Type 
Sanjay Goel 
e-mail 
goel@albany.edu 
--~~----------------------------
[Z] Program Proposal 
D Other (describe) 
IZl New 
D Revision 
D Deactivation 
D Other (describe) 
Does this proposal include any space 
resource implications? 
Approximate sq. ft. needed: 
Program has been identified as a 
Gainful Employment Program (GEP) 
Brief Description of Proposal: 
Oves 
0No 
0 
This is a proposal to create a digital forensics major in the School of Business housed in the Information Technology Management 
Department. This is the only program of its kind in New York State and is a handful of programs throughout the country. Digital 
Forensics is in high demand both in the public sector (law enforcement, federal agencies) and private sector (banks, consulting 
firms, large corporations). The program is academically rigourous with significant hands-on component to be done in laboratories. 
The program will recruit students through direct admit, declaration of major at the end of junior year, or transfer through 
community colleges. 
Impact on Other Programs: 
The proposer had consulted the following service units: 
[Z)ITS 
1Zl the University Library 
D Other 
and it has been jointly determined that there will 0/won't ® be a fiscal impact of the proposed program on the 
service agency. Please attach letters of collaboration/support from impacted programs. 
Faculty and Staff 
a) 
Describe new faculty hiring needed during the next 3 years 
b) 
Explain how program will be administered for the purposes of admissions, advising, course offerings, etc. Discuss 
the available support staff 
Two faculty (lecturer and tenure-track assistant professor) have been hired as a part of the UA 2020 program, 2 faculty hires 
(tenure-track assistant professor) have been approved for the year 2013-2014, and 2 more faculty hires (tenure-track assistant 
professor) are expected in academic year 2014-2015. 
The program will be administered by the program director and the admissions and advising will be managed by the existing 
advisement and admissions staff in the School of Business. 
Version 1.5 1/ 18/2013 
RESOURCE IMPLICATIONS 
(1) 
Year 1 
Year 2 
Year3 
Projected Expenditures (In home department and other affected units) 
Faculty {2) 
From Existing Sources 
185.000 
From New Sources 
Administrative 
From Existing Sources 
Staff {2) 
From New Sources 
Clerical Staff (2) 
From Existing Sources 
From New Sources 
Equipment, 
From Existing Sources 
25.000 
25.000 
25.000 
Supplies, etc.(3) 
From New Sources 
Student Support 
From Existing Sources 
From New Sources 
Facilities 
From Existing Sources 
From New Sources 
Total Projected Expenditures 
s 210.000 
s 25.000 
s 25.000 
Projected Capital Expenditures 
Capital 
From Existing Sources 
Facilities 
From New Sources 
Capital Equipment 
From Existing Sources 
From New Sources 
Total Projected Capital Expenditures 
so 
so 
so 
I 
APPROVALS 
I 
Department Chair 
1\/ I 't/ z_o J 3 
~ 
Da e 
Dean 
\\ 
Dean 
Da 
UPPC Chair 
UPPC Chair 
Date 
Version 1.5 1/18/2013 
 
LI-67A, 1400 Washington Ave, Albany, NY 12222 
Voice: 518/442-4267 Fax: 518/442-5638 
Email: berg@cs.albany.edu 
 
  
 
 
 
College of Computing and Information 
Informatics Department 
 
October 1, 2013 
 
Sanjay Goel, 
Associate Professor and Chair,  
Information Technology Management Department 
School of Business 
University at Albany 
 
Dear Sanjay, 
Writing as chair, please allow me to convey the enthusiasm of the Informatics Department for the 
proposal to create the new undergraduate major in Digital Forensics.  As a long-time colleague of yours 
in this area and others during our years working together in the University’s Center for Information 
Forensics and Assurance (CIFA), I feel that the Digital Forensics undergraduate degree is a fantastic 
next step in UAlbany’s increasing educational and research excellence in areas of Information 
Assurance. 
Specifically, the Informatics Department stipulates that the proposed Digital Forensics major does 
not constitute any kind of significant programmatic overlap with the Informatics Department’s own 
proposed BS in Informatics.  Rather, it nicely complements the ongoing efforts in in the Computer 
Science Department and your own Information Technology Management Department, and our own 
Cyber-security concentration in our Informatics BS proposal.  Each of these programs has their own 
breadth, depth and emphasis; these allow students to choose targeted programs in areas of their interests, 
and together give UAlbany an impressive breadth across Information Assurance. 
As part of our advisement process in CCI, as well in our early courses like CSI105, Computing and 
Information, we point out to students the various computing and information related options available at 
UAlbany (e.g. CS, INF, ITM, FMR).  Once it is approved, we will be delighted to add the Digital 
Forensics program to the list.  We hope that many students take advantage of this opportunity. 
In addition, we will be delighted to make seats in our courses available to students in both the ITM 
and FOR programs if those programs’ faculty feel that it will help promote their learning, either by 
explicit inclusion in degree requirements or DARS exceptions.  We are also of course also open to 
 
LI-67A, 1400 Washington Ave, Albany, NY 12222 
Voice: 518/442-4267 Fax: 518/442-5638 
Email: berg@cs.albany.edu 
 
course co-listing, and any other forms of educational and other resource sharing and collaboration 
between our departments and programs. 
While the proposers of the FOR and INF programs agree that there is no significant programmatic 
overlap between our programs, at our recent meeting it was pointed out that several of the courses 
looked similar based upon the descriptions we have both made available.  These courses include: 
• 
FOR 100X and CSI105 (It’s a CS course, but we use it in our curriculum, and I was a co-
creator) 
• 
FOR 203 and INF 203 (proposed; currently INF 423) 
• 
FOR 204 and INF 306 
Having worked with you in CIFA, and having had very a good working relationship with ITM over the 
years, especially when I was chair of the Computer Science Department, I fully realize the specific 
emphasis of ITM, and now FOR courses.  Based upon that knowledge I stipulate that because of the 
School of Business perspective in general, and the unique character of Digital Forensics, that these 
courses, beyond a certain unavoidable core of technical material, do not duplicate the INF offerings. 
Both personally and professionally I wish you the best of luck with this proposal and the creation of 
this exciting new program.  If I or my department may be of any assistance, please let us know. 
 
 
Sincerely, 
 
George Berg 
Associate Professor and Chair 
 
 
1 
 
An Evaluation of the Resources of the  
University at Albany Libraries in Support  
of Digital Forensics -November 12, 2013 
Introduction 
The University Libraries collect, house, and provide access to all types of published materials in 
support of the research and teaching of the schools, colleges, and academic departments of the 
University.  This evaluation considers those portions of the libraries’ collections and services that 
support a program in Digital Forensics. 
Library Collections 
The University Libraries are among the top 115 research libraries in the country.  The University 
Library, the Science Library, and the Dewey Graduate Library contain more than two million 
volumes and over 2.8 million microforms.  The Libraries subscribe or provide access to over 
75,000 serials. Many thousands more are made available via subscriptions to full-text databases.  
Whenever possible, current subscriptions are available electronically.  Additionally, the Libraries 
serve as a selective depository for U.S. Government publications and house collections of 
software and media.  
Books 
Because of the cross discipline nature of Digital Forensics, it is difficult to provide a precise 
count of the books in the library collection that would support this program. We estimate there 
are well over 20,000 books in those portions of the Library of Congress (LC) classification 
scheme which relate to computer science; 2000 which relate to information technology 
management; the number related to the legal perspective may number less than 100.  
Unlike other disciplines, we have been unable to locate an authoritative bibliography for digital 
forensics in the library science literature. However, using Computer Science as a proxy,  the 
University Libraries book holdings were compared to the listing in the “Computing” chapter in 
RCL:  Resources for College Libraries (volume 5:  Science and Technology) on pages 335 to 349 
(Chicago:  American Library Association, 2007).  This study showed that the University 
Libraries have 180 of 231 (77.9%) of the books listed, which indicates a strong collection for the 
technical perspective. We may need to acquire more titles with a legal or ITM perspective. This 
would require additional funding, or reduction in support of other areas. 
Journals 
To evaluate the strength of the journal holdings in digital forensics, we used computer science as 
a proxy. The University Libraries journal holdings were compared to the “Computer Science, 
Theory & Methods” listing on pages 97 to 98 in the 2007 Journal Citation Reports (Science 
Edition).  The study found that the University Libraries owns or provides access to 48 of 79 
(60.8%) of the journals listed.  Despite the cancellation of several computer science journals 
during the last fifteen years, we conclude that the journal collection is reasonably strong. 
Access provided through the library: 
• Digital Investigation  (Open Access from ScienceDirect) 
• Forensic Science Communications  (FBI) 
2 
 
• Forensic Science International 
• IEEE Transactions on Information Forensics and Security 
• International Journal of Cyber-Security and Digital Forensics (Open access)  
• International Journal of Forensic Computer Science (Open access) 
• International Journal of Legal Medicine 
• Journal of Digital Forensics, Security and Law 
• Journal of Forensic and Legal Medicine 
• Journal of Forensic Sciences 
• Open Forensic Science Journal  
• Open Forensic Science Journal (Open access) 
• Science and Justice  
• Small Scale Digital Device Forensic Journal  (Open Access) 
Not subscribed (should be added if funding is available) 
• International Journal of Digital Crime and Forensics - $625 
• Journal of Digital Forensic Practice - $344 
Databases & Digital Collections with Digital Forensics Content 
• Academic Search Complete 
• ACM Digital Library 
• Business Source Complete 
• Criminal Justice Abstracts1 
• Criminal Justice Periodicals Index1 
• Emerald 120. 
• IEEE Computer Society Digital Library 
• Inspec 
• LexisNexis Academic 
• PAIS Gallerywatch CRS2 
• Proquest Congressional2 
• Public Administration Abstracts2   
• Safari Tech Books Online 
• Scopus 
• Springer Computer Science eBook Collection 
• SpringerLink 
• Westlaw Campus 
• Wiley Online Library. 
• Worldwide Political Science Abstracts2 
 
                                                 
1 This database does not contain the full-text of the cited article, though it links to external sources when full-text is 
available. Articles not available online can be obtained, usually within only a few days, through interlibrary loan. 
2 For the public policy perspective. 
3 
 
Reference Collection 
The reference section of the Science Library houses a collection of resources in support of the 
science and mathematics programs.  Numerous reference books related to computer science are 
available; this includes titles such as: 
• Collins Dictionary of Computing,  
• Concise Encyclopedia of Computer Science,  
• Dictionary of Multimedia and Internet Applications,  
• Encyclopedia of Computer Science,  
• Encyclopedia of Data Warehousing and Mining,  
• Encyclopedia of Forensic Sciences  
• Focal Dictionary of Communications 
• Forensic Science Handbook 
• Forensic Services Directory,  
• Guide to Information Sources in the Forensic Sciences. 
• International Biographical Dictionary of Computer Pioneers 
• Oxford Dictionary of Computing.   
• Webster’s New World Computer Dictionary 
We believe the following should be added to support the digital forensics program:  
• Encyclopedia of Forensic Sciences (2nd edition, 2013) $2,887.50 
Interlibrary Loan and Delivery Services 
The University Libraries' Interlibrary Loan (ILL) Department borrows books and microforms, 
and obtains digital copies of journal articles and other materials not owned by the Libraries from 
sources locally, state-wide, nationally, and internationally.  ILL services are available at no cost 
to the user for faculty, staff, and students currently enrolled at the University at Albany.   
Access to Research Collections 
Library memberships provide access to many other libraries in the Capital District region, in 
New York State, and throughout the United States and Canada.  In the Capital District, the 
Capital District Library Council (CDLC) sponsors the Direct Access Program (DAP). Upon 
presentation of a CDLC DAP card, students and faculty may borrow from or use 47 academic, 
public, law, medical, and technical libraries, including the Rensselaer Polytechnic Institute 
Libraries.  Students and faculty may also use the collections of the New York State Library.  
Statewide, students and faculty may use and borrow materials from most of the SUNY-affiliated 
institutions. 
US Government Information  
In addition to purchased information, the library is a natural portal to US Government 
information. Below is a list of resources the library could make available to students in this 
program: 
• Handbook of Forensic Services - Published by the Federal Bureau of Investigation 
Laboratory Division 
4 
 
• Homeland Security Digital Library - From the Department of Homeland Security 
• In the Spotlight: Forensic Science: Publications - From NCJRS, the National Criminal 
Justice Reference Service 
• NCJRS Publications/Products - From the National Criminal Justice Reference Service 
• NIJ Publication Collections - From the National Institute of Justice 
Summary and Conclusions 
The University Libraries are making a considerable financial commitment to build and maintain 
collections in support of the primary areas associated with digital forensics: computer science, 
criminal justice, and information technology management.  The studies conducted for this report 
indicate strong and reasonably strong book and journal collections.  Books and journal articles 
not owned by the University Libraries may be obtained through interlibrary loan.   
Michael Knee 
Bibliographer for Computer Science 
Richard Irving 
Bibliographer for Public Affairs 
Christian Poehlmann 
Bibliographer for Business & Economics 
 
Office of the Chief Information Officer 
	
  
 
University Administration Building, Room 232 
1400 Washington Avenue, Albany, NY 12222 
PH:	
  518-956-8080	
  	
  	
  FX: 518-437-4534	
  
www.albany.edu 
   
 
November 25, 2013 
 
 
Richard Fogarty 
Undergraduate Affairs Council 
University at Albany, State University of New York 
LI 36, 1400 Washington Ave.  
Albany, NY 12222 
 
RE: UAC Approval 
 
Dear Rick: 
 
It gives us great pleasure in sending this letter in support of the Digital Forensics Major being 
planned in the School of Business. We have been working closely with Prof. Sanjay Goel and the 
School of Business Office of Computer Services (OCS) over the last several months in the planning 
and design of the laboratory to support digital forensics and cyber security laboratory activities.  
 
Based on in-depth discussions, the laboratory will be operated by Prof. Goel and the OCS team. 
We do not anticipate the Digital Forensics major to require additional resource implications for 
Information Technology Services. Information Technology Services (ITS) currently delivers a 
number of highly relevant services that can be used by instructors and students in support of the 
major. With the several online courses, the Blackboard (v9.1) learning management system and the 
Virtual Information Commons (vIC), which enables access to specialized academic software from 
any location might be useful. We have worked together with Prof. Goel in the past in investigations 
to expand this service to provide functionality to support the needs associated with the laboratory 
exercises being offered for information security and digital forensics courses.  
 
In addition, ITS staff have deep experience training and supporting faculty to develop fully-online 
courses, as well as blended courses. These services are standard at the University. In line with 
these activities, the ITS Faculty Technology Resources (FTR) group has partnered with the Institute 
for Teaching, Learning, and Academic Leadership (ITLAL) on campus to developed a flipped 
classroom project. Staff expertise in FTR will be available to consult with you as you move forward 
with implementing this type of classroom in your curriculum.  
 
I personally have overseen the development and growth of the SUNY Learning Network, which won 
the 2001 Educause Award for Teaching and Learning. I am also on the faculty of the Educause 
Leadership Institute and I maintain ongoing relationships with CIOs across SUNY community 
colleges. I understand that this program will be able to be taken as a 2+2 program from local 
community colleges and would be able to provide support with coordination with other CIOs.  
 
We are excited to see this new major being started at the University. Digital forensics is a growing 
and exciting field with a definite need in the information technology workplace. We wish Prof. Goel 
good luck in establishing the major and look forward to providing support towards its success.  
 
Sincerely, 
 
Christine E. Haile 

Metadata

Resource Type:
Document
Rights:
Image for license or rights statement.
CC BY 4.0
Date Uploaded:
December 27, 2018

Using these materials

Access:
The archives are open to the public and anyone is welcome to visit and view the collections.
Collection restrictions:
Access to this record group is unrestricted.
Collection terms of access:
Records in this collection were created by the University at Albany, SUNY, and are public records.

Access options

Ask an Archivist

Ask a question or schedule an individualized meeting to discuss archival materials and potential research needs.

Schedule a Visit

Archival materials can be viewed in-person in our reading room. We recommend making an appointment to ensure materials are available when you arrive.