Search
Close this search box.

MS ISDF Curriculum

Outline of courses and certificates required to complete NU Ontario’s Information Security & Digital Forensics Program.

 MS ISDF Curriculum


Our master’s degree program in information security and digital forensics (ISDF) is designed to prepare students and working professionals for an exciting and rewarding career in cybersecurity, both in government and in private business. The 36-credit hour program can be completed in four semesters of full-time study and equips individuals with the knowledge necessary for the Certified Information Systems Security Management Professionals (CISSP) certification.

Students are trained utilizing professional applications in computer and mobile forensics, and provided knowledge and expertise in network security, ethical hacking, and privacy. This training occurs in one of our new on-campus information security labs.

Core Courses

Presents students with the opportunity to explore and discuss information security, to learn about current information security threats and how to protect information. Students will gain experience in the use of network protection mechanisms such as firewalls, intrusion detection systems, and other security tools. Three (3) Credit Hours.

Introduces the students to research and topics in Data Privacy. Privacy is increasingly becoming critical to both organizations and private citizens. This course explores privacy from various fronts including its impact on businesses. Additionally, students will examine privacy from a global perspective, in particular, how international privacy policies concerning information security compare to those in the US. Three (3) Credit Hours.

A study of the existing risk management frameworks, models, processes and tools to equip students with the theory, science and practical knowledge to operationalize risk management in an organization or government agency. Three (3) Credit Hours.

Presents students with the opportunity to explore and discuss ethical hacking, and to specifically learn about methods used to prevent unauthorized access to networks. Students will gain experience in the use of penetration testing tools, vulnerability assessment tools as well as reporting. Furthermore, students will look at exploits in detail to understand preventative measures. Three (3) Credit Hours.

Introduces network firewall security. It will cover basic installation techniques, discuss how to make an intelligent choice of firewall technology and present basic firewall troubleshooting. Moreover, it will cover different intrusion detection systems and their signatures. Students will complete hands-on exercises and case projects for testing and evaluating various firewall techniques. Three (3) Credit Hours.

Introduces students to research in foundations of software security. Basic static and dynamic enforcement of security policies to enhance software security will be investigated. Language-based security and tools for specifying security policies for different programming languages will also be discussed. Three (3) Credit Hours.

Introduces students to the techniques and tools of computer forensic investigations. Students will learn how to utilize computer forensic tools in investigations. The course maps to the objectives of the IACIS certification. Topics include coverage of the latest technology including cell phones, and portable devices. Three (3) Credit Hours.

Advances student’s knowledge of computer forensics and allows students to sit for the ACE certification. Topics include password recovery, network forensics and forensic case investigations. Additionally, students will research current computer forensics issues in a changing digital world. Three (3) Credit Hours.

Introduces students to the foundations of modern cryptography, with an eye toward practical applications. The objective of this course is to provide a foundation of cryptography in an applied manner so that students can grasp its importance in relation to the rest of the information security field. The course covers the principles of number theories and cryptographic algorithms and cryptanalysis. Three (3) Credit Hours.

Will familiarize students with mobile devices and technology used by carriers as it relates to mobile forensics. Students will identify data that can be retrieved from mobile devices, such as cell phones, smartphones, and GPS devices. Recovered data will be analyzed and investigated to recreate crime scenes. Three (3) Credit Hours.

The combination of theory, principles, best practices, methodologies, tools, and technologies associated with Information Security and digital forensics. The Capstone seminar uses scholarly research methods to develop analytics, problem- solving, and research skills required to solve a real-world information security challenges. Three (3) Credit Hours

The combination of theory, principles, best practices, methodologies, tools, and technologies associated with Information Security and digital forensics. The Capstone seminar uses scholarly research methods to develop analytics, problem- solving, and research skills required to solve a real-world information security challenges. CIS 600/601 require ISDF students to present their findings/research to an open forum on campus, Three (3) Credit Hours.

Curriculum Card

Stay Connected