Skip to Main Content
Navigated to ECI Courses.

Course 

Description

ECI 313 Financial Investigations

This course is designed to introduce and apply financial investigative techniques to the detection and resolution of criminal activity. It includes an in-depth discussion of financial investigative approaches, law and legal concepts guiding criminal prosecutions in the United States, concepts of evidence and procedure, the movement of money through financial institutions, tracing money through a business including discussions of business organization and accounting systems, various methods of tracing funds and interviewing techniques used in these investigations.
 
Credits: 3
Prerequisite(s)

ECI 333 Information Security

With the expansion of global networks, organizations have an increasing need to understand how to protect critical information assets from a myriad of threats.  This course provides a broad overview of the field of information security, with a focus on security management practices.  It covers terminology, history and the process of managing an information security program.  The course includes a discussion of several of the ten domains which comprise the common body of knowledge for information security.  This course sets the foundation for further study in computer and network security.
 
Credits: 3
Prerequisite(s): Junior Status

ECI 340 Intelligence Research Methods

This course is designed to introduce students to the intelligence process and its role in research and criminal investigations.  Using analytic and database software, students will apply the intelligence process to basic research on topics in economic crime investigation, criminal justice and business. The course will culminate with students presenting their research on an assigned topic in both written and oral formats.
 
Credits: 3
Prerequisite(s): Junior Status

ECI 345 Computer and Network Security

This course will focus on the protection of the Confidentiality, Integrity, and Availability of information.  Physical security and other security management topics will be discussed as they pertain to computer and network security.  The identification and authentication of users and types of authentication will be covered.  Lectures will include the discussion of formal security models and associated access controls. An emphasis will be placed on network security technologies including:  firewalls/packet filtering and intrusion detection systems, business continuity planning/disaster recovery and the importance of logs and audits will also be covered.
 
Credits: 3
Prerequisite(s): CIS 270

ECI 350 Law of Economic Crime

Economic Crime Investigation focuses on those complex crimes designed to bring financial rewards to the offender. The course will examine substantive and procedural law affecting financial institutions, commercial businesses and their agents and employees in relation to economic and business-related crimes. This course will identify criminal statutes and case law applicable to economic crimes, and through a study of these will give students a thorough knowledge of the elements required to successfully identify, investigate and prosecute economic crimes.
 
Credits: 3
Prerequisite(s): Junior Status

ECI 355 Computer Crime

The media reports terrorist attacks on computer centers, electronic fraud on international funds transfer networks, viruses and worms in software and e-mail, corporate espionage on business networks, and crackers breaking into systems on the Internet. Computer criminals are becoming ever more technically sophisticated, and it’s an increasing challenge to keep up with their methods. This course will focus on computer crimes: what they are, how to prevent them, and how to detect, investigate and prosecute them if they do occur. Computer crime laws will also be covered. Other topics will include evidence collection during a computer crime investigation as well as the preparation and execution of a search warrant.
 
Credits: 3
Prerequisite(s): ECI 354

ECI 360 Computer Forensics

A police officer makes a gruesome discovery, a body is found.  Located near the corpse is a cellular telephone, a digital camera and a computer.  The officer is unsure on how to proceed.  On the other side of town, a search warrant of a business is being conducted.  A server and the computers networked to it are believed to contain the evidence of a crime.  The detectives are trying to decide on what to seize and how to take it.  More and more crimes involve digital evidence that requires seizing, imaging and analysis.  The evidence needs to be reviewed for possible investigative leads and for possible presentation in court.  This course will focus on how to properly seize, image and examine digital evidence. It will include creating and verifying the duplicate image of digital evidence, analyzing the data to locate evidence, and recovering evidence.
 
Credits: 3
Prerequisite(s): ECI 355

ECI 365 Investigative Software Tools

Intelligence led policing and intelligence based investigative strategies are coming to the forefront of law enforcement.  Private industry is also becoming increasingly aware of the strategic intelligence model as it applies to corporate planning, competitive practices and maintaining corporate integrity. This course is designed to introduce students to several key software tools that are widely used and considered essential for intelligence research and criminal investigations.  These software tools will include, but not be limited to, Analyst Notebook, iBase, and Idea.  Students will be given a thorough understanding of how to apply these tools in the course of the intelligence process and /or during the course of a criminal investigation.  The course will culminate with students preparing a project using all the software tools introduced during the course.
 
Credits: 3
Prerequisite(s): Junior Status

ECI 375 AI: Machine Learning and Impact on Society

The course explores the full breadth and depth of the field of artificial intelligence (AI) and introduces the students to the latest technologies involving machine learning, deep learning, transfer learning, multiagent systems, robotics, natural language processing, causality, probabilistic programming, privacy, fairness, and safe AI. Using a unified approach to AI, the course demonstrates how the various subfields of AI fit together to build actual, useful programs. In-depth coverage of both basic and advanced topics provides students with a basic understanding of the frontiers of AI without compromising complexity and depth. Students are presented with the latest technologies and present concepts in a manner which includes expanded coverage of probabilistic programming; multiagent decision making; deep learning; and deep learning for natural language processing. Students will address issues concerning ethics, privacy, fairness, the future of work, and safe AI.
 
Credits: 3
Prerequisite(s): CS 254 and Junior Status

ECI 381 Business Continuity: Strategic Contingency Planning for Businesses and Organizations

Student will learn the development of business continuity management policies and planning.  management process for a variety of business environments as well as management systems, tools and techniques needed to establish, monitor and maintain business continuity will be examined.  Students will develop skills to create essential continuity plans for various businesses and organizations that identify vritical processes, required personnel, and procedures to preserve and secure vital records to continue operating during and after man-made or natural disasters
 
Credits: 3
Prerequisite(s): Junior Status

ECI 410 Introduction to Cryptography

In this course, the key terms, concepts and principles of cryptography are defined and explained.  Application of cryptographic techniques to ensure confidentiality, integrity, authentication, access control, and non-repudiation issues will also be covered.  Other topics will include the history of classical cryptographic and cryptanalytic techniques, modern symmetric and asymmetric algorithms, Federal Information Processing Standard (FIPS) algorithms, random and pseudo­random number generators and cryptographic hash functions.  Issues involving cryptographic application at various OSI layers in networking communications will also be discussed.
 
Credits: 3
Prerequisite(s): MA 235

ECI 450 Senior Seminar

This is the capstone course for ECI students. The primary goal of this course is to integrate previous learning experiences in a manner that will help students further develop their investigative, communication and problem solving skills. The course uses a problem-based methodology which allows to students experience the key aspects of investigating and prosecuting an economic crime.  Students also research, evaluate and discuss noteworthy current and historical fraud cases through written and oral presentations.
 
Credits: 3
Prerequisite(s): Senior Status

ECI 498 Internship

This course will place a student in an experiential situation with an agency or corporation. There are two major components: the student must work a minimum of 120 hours at the intern site and participate in weekly seminars.
 
Credits: 3
Prerequisite(s): Senior Status