Notice : The University strongly encourages all F-1 and J-1 students to follow pre-COVID enrollment rules described under the OIPS webpage
- DFOR 500 Intro Forensic Tech/Analysis
- DFOR 510 Digital Forensics Analysis
- DFOR 637 Cloud Forensics
- DFOR 660 Network Forensics
- DFOR 661 Digital Media Forensics
- DFOR 663 Operation Intrusion Detection for Forensics
- DFOR 670 Fraud Analytics
- DFOR 672 Mobile Device Forensics
- DFOR 761 Malware Reverse Engineering
- DFOR 767 Penetration Testing in Digital Forensics
- DFOR 780 Adv Topics Digital Forensics
- DFOR 790 Advanced Digital Forensics
Notice : The University strongly encourages all F-1 and J-1 students to follow pre-COVID enrollment rules described under the OIPS webpage
- DFOR 661 Digital Media Forensics
- DFOR 675 Linux Forensics
Notice : The University strongly encourages all F-1 and J-1 students to follow pre-COVID enrollment rules described under the OIPS webpage
- DFOR 500 Intro. to Forensic Technology and Analysis
- DFOR 510 Digital Forensics Analysis
- DFOR 660 Network Forensics
- DFOR 661 Digital Media Forensics
- DFOR 664 Incident Response Forensics
- DFOR 671 Digital Forensics Ethics & Law
- DFOR 672 Mobile Device Forensics
- DFOR 710 Memory Forensics
- DFOR 740 Advanced Offensive and Defensive Strategies
- DFOR 761 Malware Reverse Engineering
- DFOR 771 Digital Forensics Profiling
- DFOR 772 Forensic Artifact Extraction
- DFOR 780 Darknet Technologies
- DFOR 790 Advanced Digital Forensics
Notice : The University strongly encourages all F-1 and J-1 students to follow pre-COVID enrollment rules described under the OIPS webpage
- DFOR 500 Intro Forensic Tech/Analysis
- DFOR 510 Digital Forensics Analysis
- DFOR 660 Network Forensics
- DFOR 661 Digital Media Forensics
- DFOR 663 Operation Intrusion Detection for Forensics
- DFOR 670 Fraud Analytics
- DFOR 672 Mobile Device Forensics
- DFOR 761 Malware Reverse Engineering
- DFOR 767 Penetration Testing Forensics
- DFOR 780 Darknet Technologies
- DFOR 790 Advanced Digital Forensics
- DFOR 661 Digital Media Forensics
- DFOR 675 Linux Forensics
- DFOR 500 Intro Forensic Tech/Analysis
- DFOR 510 Digital Forensics Analysis
- DFOR 660 Network Forensics
- DFOR 661 Digital Media Forensics
- DFOR 664 Incident Response Forensics
- DFOR 671 Digital Forensics Ethics & Law
- DFOR 710 Memory Forensics
- DFOR 740 Advanced Offensive and Defensive Strategies
- DFOR 761 Malware Reverse Engineering
- DFOR 771 Digital Forensics Profiling
- DFOR 772 Forensic Artifact Extraction
- DFOR 790 Advanced Digital Forensics
- DFOR 500 Intro Forensic Tech/Analysis
- DFOR 510 Digital Forensics Analysis
- DFOR 637 Cloud Forensics
- DFOR 660 Network Forensics
- DFOR 661 Digital Media Forensics
- DFOR 663 Operation Intrusion Detection for Forensics
- DFOR 670 Fraud Analytics
- DFOR 672 Mobile Device Forensics
- DFOR 761 Malware Reverse Engineering
- DFOR 767 Penetration Testing in Digital Forensics
- DFOR 780 Darknet Technologies
- DFOR 790 Advanced Digital Forensics
- DFOR 500 Intro Forensic Tech/Analysis
- DFOR 510 Digital Forensics Analysis
- DFOR 660 Network Forensics
- DFOR 661 Digital Media Forensics
- DFOR 664 Incident Response Forensics
- DFOR 710 Memory Forensics
- DFOR 760 Legal and Ethical Issues in IT
- DFOR 761 Malware Reverse Engineering
- DFOR 762 Mobile Device Forensics
- DFOR 764 Mac Forensics
- DFOR 771 Digital Forensics Profiling
- DFOR 772 Foreign Artifact Extraction
- DFOR 790 Advanced Digital Forensics
- DFOR 510 Digital Forensics Analysis
- DFOR 660 Network Forensics
- DFOR 661 Digital Media Forensics
- DFOR 663 Operations of Intrusion Detection for Forensics
- DFOR 737 Cloud Forensics
- DFOR 761 Malware Reverse Engineering
- DFOR 762 Mobile Device Forensics
- DFOR 767 Penetration Testing in Computer Forensics
- DFOR 770 Fraud and Forensics in Accounting
- DFOR 780 Exploring the Darknet
- DFOR 790 Advanced Computer Forensics