Shadow
Home :: Future Students :: Career & College Promise :: Pathways ::

Cyber Crime Technology


CCT-110: This course introduces and explains the various types of offences that qualify as cyber-crime activity. Emphasis is placed on identifying cyber-crime activity and the response to these problems from both the private and public domains. Upon completion, students should be able to accurately describe and define cyber-crime activities and select an appropriate response to deal with the problem.

CCT-112: This course covers ethical considerations and accepted standard practices applicable to technological investigations and computer privacy issues relative to the cyber-crime investigator. Topics include illegal and unethical investigative activities, end-justifying-the-means issues, and privacy issues of massive personal database information gathered by governmental sources. Upon completion, students should be able to examine their own value systems and apply ethical considerations in identifiable cyber-crime investigations.

CCT-121: This course introduces the fundamental principles of computer crime investigation processes. Topics include crime scene/incident processing, information gathering techniques, data retrieval, collection and preservation of evidence, preparation of reports and court presentations. Upon completion, students should be able to identify cyber-crime activity and demonstrate proper investigative techniques to process the scene and assist in case prosecution.

CCT-231: This course covers the applicable technological laws dealing with the regulation of cyber security and criminal activity. Topics include an examination of state, federal and international laws regarding cyber-crime with an emphasis on both general and North Carolina statutes. Upon completion, students should be able to identify the elements of cyber-crime activity and discuss the trends of evolving laws.