Joseph Greenfield



Joseph Greenfield is an Associate Professor of Information Technology Practice with domain specialization in computer security and digital forensics. While at USC, he has developed ten courses in the fields of information security and digital forensics in addition to building two academic minors: Applied Computer Security and Digital Forensics. His professional and academic research lie in the realm of BitTorrent forensics, specialized server acquisitions, and non-standard information storage containers. Mr. Greenfield's efforts were instrumental in establishing an academic alliance with the United States Secret Service and the Los Angeles Electronic Crimes Task Force. His students have graduated and pursued careers in law enforcement and private consulting companies.

He holds both a Bachelor's Degree in Computer Engineering and a Masters Degree in Computer Science from the University of Southern California, in addition to being an AccessData Certified Examiner (ACE). He is a frequent presenter to the Los Angeles Electronic Crimes Task Force, the Information Systems Security Association and other industry groups.

In addition to being a full-time faculty member at USC, Mr. Greenfield works professionally with the Los Angeles computer forensics firm Maryman & Associates.


Office Hours
Spring 2017:
Tuesday & Thursday
2:00 - 4:00 PM
Office Location
OHE 530F
Email Address
joseph.greenfield (at)
Phone Number
(213) 740-4542


Current Courses Teaching

ITP-1252From Hackers to CEOs; An Introduction to Information Security
ITP-3753Digital Forensics
ITP-4754Advanced Digital Forensics

All Courses Taught

Not offered in Spring 2017
Not offered in Spring 2017
ITP-1012Introduction to Business Information Technologies
ITP-1092Introduction to Java Programming
ITP-1252From Hackers to CEOs; An Introduction to Information Security
ITP-3253Ethical Hacking and Systems Defense
ITP-3753Digital Forensics
ITP-4574Network Security
ITP-4754Advanced Digital Forensics
ITP-4774Security and Computer Forensics
ITP-4993Introduction to Computer Forensics