This course gives students and professionals the necessary managerial, technical and legal background to support investment decisions in security technology.
It discusses security from the perspective of hackers (i.e., technology issues and defenses) and lawyers (i.e., legal issues and defenses).
Studies focus on a variety of aspects related to terrorist organizations and individuals, gaining an understanding of how various terrorist cults and personalities affect national security, how understanding terrorism personalities can aid the counterterrorism war and what the future looks like in the war against terrorism. Risk analysis and the formulation of a comprehensive plan, followed by a vigorous and continuous testing program, are essential elements to surviving an emergency.
This course examines terrorism in the modern world with a review of the historical origins of terrorism. Topics include threat assessment, risk analysis, formulating the plan, staffing the emergency operations center (EOC), coordinating with supporting agencies and the importance of continuing liaison managing an actual incident and conducting an effective follow-up analysis. This course examines a general overview of the criminal justice system, with an emphasis on decision points and administrative practices in police and other criminal justice agencies, as well as basic criminal procedures.
This course emphasizes criminal intelligence as opposed to criminal investigation. Such measures as financial investigations, technical defenses and counterintelligence activities are studied.
This course is an introduction to terrorist cults and personalities. This course examines emergency planning as it relates to surviving natural and man-made disasters.
This course balances current and past research, theories and applications and practical examples and issues.
Topics include: historical perspectives, the court process, alternatives to imprisonment, correctional functions, institutional clients, rights of correctional clients, reintegration systems and the future of corrections.
Courses begin monthly, so we're ready when you are.This course is intended to turn those who already have some computer and internet experience into effective users of the internet and to reveal how the internet can augment their traditional investigative methodology.It covers not only technical issues, but includes how to formulate good search strategies and how to make sense of the results.Students learn how to predict trends, weaknesses, capabilities, intentions, changes and warnings needed to dismantle criminal organizations. This course is designed to teach the student to analyze the implications of September 11, 2001 and the new war on terrorism for border controls, cross-border relations and economic integration in North America. This course is a comprehensive review of issues and elements to be considered in the planning and organization of a counterterrorism program.Students are introduced to techniques such as association and link analysis, visual investigative analysis (VIA), telephone toll analysis, matrix analysis, reporting and application to violent crime and organized crime to include drug, white collar and money laundering. It presents an examination of techniques and procedures, which can be applied to programs developed at both the national and local level.