Curriculum | 12 credit hours
In this hands-on program, you’ll begin with a foundational course, progress through 3 advanced graduate courses — including a specialized elective of your choice — to learn the real-world tools and techniques of digital forensics and incident response. This is the curriculum order for this program.
Required Core Courses | 9 credit hours
ISE 6420: Computer Forensic Investigations - Windows | FOR500 + GCFE
SANS Course: FOR500: Windows Forensic Analysis
Certification: GIAC Certified Forensic Examiner (GCFE)
3 Credit Hours
ISE 6420 Computer Forensic Investigations - Windows focuses on the critical knowledge of the Windows Operating System that every digital forensic analyst needs to investigate computer incidents successfully. Students learn how computer forensic analysts focus on collecting and analyzing data from computer systems to track user-based activity that can be used in internal investigations or civil/criminal litigation. The course covers the methodology of in-depth computer forensic examinations, digital investigative analysis, and media exploitation so each student will have complete qualifications to work as a computer forensic investigator helping to solve and fight crime.
ISE 6425: Advanced Digital Forensics, Incident Response, & Threat Hunting | FOR508 + GCFA
SANS Course: FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics
Certification: GIAC Certified Forensic Analyst (GCFA)
3 Credit Hours
ISE 6425 teaches the necessary capabilities for forensic analysts and incident responders to identify and counter a wide range of threats within enterprise networks, including economic espionage, hacktivism, and financial crime syndicates. The course shows students how to work as digital forensic analysts and incident response team members to identify, contain, and remediate sophisticated threats-including nation-state sponsored Advanced Persistent Threats and financial crime syndicates. Students work in a hands-on lab developed from a real-world targeted attack on an enterprise network in order to learn how to identify what data might be stolen and by whom, how to contain a threat, and how to manage and counter an attack.
ISE 6440: Advanced Network Forensics and Analysis | FOR572 + GNFA
SANS Course: FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response
Certification: GIAC Network Forensic Analyst (GNFA)
3 Credit Hours
ISE 6440: Advanced Network Forensics and Analysis focuses on the most critical skills needed to mount efficient and effective post-incident response investigations. Moving beyond the host-focused experiences in ISE 6420 and ISE 6425, ISE 6440 covers the tools, technology, and processes required to integrate network evidence sources into investigations, covering high-level NetFlow analysis, low-level pcap exploration, and ancillary network log examination. Hands-on exercises in FOR 572 cover a wide range of open source and commercial tools, and real-world scenarios help the student learn the underlying techniques and practices to best evaluate the most common types of network-based attacks.
Elective Courses | 3 credit hours
Students select one of the following.
ISE 5201: Hacker Tools, Techniques, Exploits, & Incident Handling | SEC504 + GCIH
SANS Course: SEC504: Hacker Tools, Techniques, and Incident Handling
Certification: GIAC Certified Incident Handler Certification (GCIH)
3 Credit Hours
By adopting the viewpoint of a hacker, ISE 5201 provides an in-depth focus into the critical activity of incident handling. Students are taught how to manage intrusions by first looking at the techniques used by attackers to exploit a system. Students learn responses to those techniques, which can be adopted within the framework of the incident handling process to handle attacks in an organized way. The faculty instruction, lab exercises, and exam are coordinated to develop and test a student's ability to utilize the core capabilities required for incident handling.
ISE 6270: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals | SEC595 + GMLE
SANS Course: SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals
Certification: GIAC Machine Learning Engineer (GMLE)
3 Credit Hours
This course is squarely centered on solving information security problems. This course covers the necessary mathematics theory and fundamentals students absolutely must know to allow them to understand and apply the machine learning tools and techniques effectively. The course progressively introduces and applies various statistic, probabilistic, or mathematic tools (in their applied form), allowing you to leave with the ability to use those tools. The hands-on projects provide a broad base from which you can build your own machine learning solutions. This course teaches how AI tools like ChatGPT really work so that you can intelligently discuss their potential use by organizations and how to build effective solutions to solve real cybersecurity problems using machine learning and AI.
ISE 6442: Enterprise Cloud Forensics and Incident Response | FOR509 + GCFR
SANS Course: FOR509: Enterprise Cloud Forensics and Incident Response
Certification: GIAC Cloud Forensics Responder (GCFR)
3 Credit Hours
In ISE 6442: Enterprise Cloud Forensics and Incident Response, examiners will learn how each of the major cloud service providers (Microsoft Azure, Amazon AWS and Google Cloud Platform) are extending analyst's capabilities with new evidence sources not available in traditional on-premise investigations. Incident response and forensics are primarily about following breadcrumbs left behind by attackers. This class is primarily a log analysis class to help examiners come up to speed quickly with cloud based investigation techniques. Numerous hands-on labs throughout the course will allow you to access evidence generated based on the most common incidents and investigations. You will learn where to pull data from and how to analyze it to find evil.
ISE 6445: Cyber Threat Intelligence | FOR578 + GCTI
SANS Course: FOR578: Cyber Threat Intelligence
Certification: GIAC Cyber Threat Intelligence (GCTI)
3 Credit Hours
ISE 6445 will equip you, your security team, and your organization in the tactical, operational, and strategic level cyber threat intelligence skills and tradecraft required to better understand the evolving threat landscape and to counter those threats accurately and effectively. This course focuses on structured analysis to establish a solid foundation for any security skillset and to amplify existing skills.
ISE 6450: Advanced Smartphone Forensics | FOR585 + GASF
SANS Course: FOR585: Smartphone Forensic Analysis In-Depth
Certification: GIAC Advanced Smartphone Forensics Certification (GASF)
3 Credit Hours
The focus of ISE 6450 is on teaching students how to perform forensic examinations on devices such as mobile phones and tablets. Students will add to their forensics skills with this course's focus on the advanced skills of mobile forensics, device file system analysis, mobile application behavior, event artifact analysis and the identification and analysis of mobile device malware. Students will learn how to detect, decode, decrypt, and correctly interpret evidence recovered from mobile devices. The course features a number of hands-on labs that allow students to analyze different datasets from smart devices and leverage the best forensic tools and custom scripts to learn how smartphone data hide and can be easily misinterpreted by forensic tools.
ISE 6455: Mac and iOS Forensic Analysis and Incident Response | FOR518 + GIME
SANS Course: FOR518: Mac and iOS Forensic Analysis and Incident Response
Certification: GIAC iOS and macOS Examiner (GIME)
3 Credit Hours
ISE 6455 provides the techniques and skills necessary to take on any Mac or iOS case without hesitation. The intense hands-on forensic analysis and incident response skills taught in the course will enable students to broaden their capabilities and gain the confidence and knowledge to comfortably analyze any Mac or iOS device. In addition to traditional investigations, the course presents intrusion and incident response scenarios to help analysts learn ways to identify and hunt down attackers that have compromised Apple devices.
ISE 6460: Reverse-Engineering Malware | FOR610 + GREM
SANS Course: FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
Certification: GIAC Reverse Engineering Malware Certification (GREM)
3 Credit Hours
ISE 6460 teaches students how to examine and reverse engineer malicious programs - spyware, bots, Trojans, etc. - that target or run on Microsoft Windows, within browser environments such as JavaScript or Flash files, or within malicious document files (including Word and PDF). The course builds a strong foundation for reverse-engineering malicious software using a variety of system and network monitoring utilities, a disassembler, a debugger and other tools. The malware analysis process taught in this class helps students understand how incident responders assess the severity and repercussions of a situation that involves malicious software and plan recovery steps. Students also experience how forensics investigators learn to understand key characteristics of malware discovered during the examination, including how to establish indicators of compromise (IOCs) for scoping and containing the incident.
ISE 6608: Enterprise-Class Incident Response & Threat | FOR608 + GEIR
SANS Course: FOR608: Enterprise-Class Incident Response & Threat Hunting
Certification: GIAC Enterprise Incident Response (GEIR)
3 Credit Hours
ISE 6608 focuses on identifying and responding to incidents too large to focus on individual machines. The concepts are similar: gathering, analyzing, and making decisions based on information from hundreds of machines. This requires the ability to automate and the ability to quickly focus on the right information for analysis. By using example tools built to operate at enterprise-class scale, students will learn the techniques to collect focused data for incident response and threat hunting. Students will then dig into analysis methodologies, learning multiple approaches to understand attacker movement and activity across hosts of varying functions and operating systems by using timeline, graphing, structured, and unstructured analysis techniques.