Program Overview

As new technological innovations continue to proliferate in our society, so do the opportunities for technology exploitation. Once a mere nuisance, hackers now threaten private citizens, businesses, and government agencies.

Government and law enforcement agencies need skilled professionals who can join the fight against cyber crime, cyber terrorism, identity theft, and the exploitation of minors. Companies and other private sector organizations need skilled professionals with both business acumen and technology skills for recognizing and mitigating vulnerabilities.

The BS in Cyber Forensics and Information Security combines the disciplines of technology, business, organizational behavior, and law. Students learn techniques used to detect, respond to, and prevent network intrusions. They also master broader concepts such as the responsible use of resources, the appropriate management of risks, and the alignment of information technology with the organization.

Program Educational Objectives

Five years after graduation the graduates should be:

  1. Contributing to the work force in their specialty such as but not limited to information security, network/Internet security, cyber forensics, computer forensics, or digital forensics.
  2. Advancing their careers via continuous learning and professional development through the attainment of professional certification, professional study and research or graduate education.
  3. Assuming positions of leadership within their organization.
  4. Contributing to economic development and society through the development, maintenance and management of computer-based information systems and information/network security systems for business, government, and other organizations.

Program Outcomes

When a student successfully completes all requirements for the B.S. in Cyber Forensics and Information Security degree, he/she will be able to . . .

  1. Demonstrate the use of various computer forensic software tools and techniques as well as follow proper legal procedures for obtaining, analyzing, and reporting digital forensic evidence.
  2. Properly report the findings of a cyber forensic investigation in both written form (using proper grammar, writing style, and citation) and in oral form (i.e., within the context of a trial, hearing, or deposition).
  3. Identify and analyze legal issues within technology, such as:  on-line contracts, computer crime, fraud, privacy, defamation, hate speech, indecency, obscenity, cyber- squatting, and intellectual property.
  4. Demonstrate various techniques for preventing unauthorized attacks to computer networks and apply measures for minimizing the damage caused by network intruders.

Tuition

For more information, visit the Tuition & Fee's Schedule page.

Concentrations