Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Education

Reinvigorating A Technical Countering Weapons Of Mass Destruction Distance Learning Graduate Certificate Program, James C. Petrosky, Gaiven Varshney, Jeremy Slagley, Sara Shaghaghi Oct 2021

Reinvigorating A Technical Countering Weapons Of Mass Destruction Distance Learning Graduate Certificate Program, James C. Petrosky, Gaiven Varshney, Jeremy Slagley, Sara Shaghaghi

Faculty Publications

Current Countering Weapons of Mass Destruction (CWMD) demands can be divided broadly into policy and science. The science of chemical, biological, and radiological/nuclear weapons informs the limits of development, production, employment, operation, detection, risk characterization, human and material protection, and medical intervention. In short, the science of weapons of mass destruction (WMD) should precede and inform the development of policy. It is to this end that the Air Force Institute of Technology (AFIT) CWMD program was re-established, providing a technical educational option for practitioners to understand the science behind a very technically challenging subject.


Graduate Digital Forensics Education At The Air Force Institute Of Technology, Gilbert L. Peterson, Richard A. Raines, Rusty O. Baldwin Jan 2007

Graduate Digital Forensics Education At The Air Force Institute Of Technology, Gilbert L. Peterson, Richard A. Raines, Rusty O. Baldwin

Faculty Publications

The Department of Electrical and Computer Engineering (AFIT/ENG) at the Air Force Institute of Technology (AFIT), currently offers a graduate-level introductory course in digital forensics. Students are introduced and exposed to several challenges and topics in the digital forensics course. The course addresses the ethical and legal procedures as well as basic forensic science principles in only the most general manner. A larger percentage of lecture and lab time is spent discussing the technical details of incident response and media analysis. The detail into the network forensics and digital device analysis topics start to breach technical details but not to …