Cybersecurity and Digital Forensics B.S.
The B.S. in Cybersecurity and Digital Forensics combines the disciplines of technology, business, organizational behavior, and law. You learn the techniques used to detect, respond to, and prevent network intrusions, and also master broader concepts such as the responsible use of resources, the appropriate management of risks, and the alignment of information technology with the organization.
Faculty with practical experience in cybersecurity will work closely with you to build your competence in this fast-growing field. Professional opportunities and internships prepare you for career settings, while special study programs and the student group Top Secret Colonials give you many options to test your abilities and broaden your competencies.
Graduates go on to work for law enforcement agencies, companies, and other private sector organizations as skilled professionals with both business acumen and technology skills for recognizing and mitigating vulnerabilities.
The Computing Accreditation Commission of ABET has accredited the B.S. degree programs in Computer Information Systems, Cyber Forensics and Information Security, and Information Sciences.
Wheatley Center 320
- 4-Year Course Plan
Freshman Year, Fall
Freshman Year, Spring
Sophomore Year, Fall
Sophomore Year, Spring
Junior Year, Fall
Junior Year, Spring
Senior Year, Fall
- Additional Program Details
Program Educational Objectives
Five years after graduation, the graduates should:
- Contributing to the work force in their specialty such as but not limited to computer forensics, mobile security, network security, software security, database security, or information security.
- Advancing their careers via continuous learning and professional development through the attainment of professional certification, professional study and research or graduate education.
- Assuming positions of leadership within their organization.
- Contributing to economic development and society through the prevention and detection of cyber threats in the computer-based information systems for business, government, and other organizations.
At the time of graduation, the graduate should have:
- An ability to design, implement and evaluate a computer-based information system, process, component, or program to meet desired business or organizational specifications
- An ability to apply knowledge of information systems, programming and mathematics appropriate to the discipline.
- An ability to demonstrate sufficient background knowledge in Operating Systems, Networking, Data Communication, Database Technology, Information Systems Planning, and Project Management
- An ability to analyze an information systems problem, define performance specifications to solve the problem and identify feasible solutions while recognizing the local and global impact of computing on individuals, organizations and society
- An ability to function effectively on teams and to be able to communicate effectively with a range of audiences
- An ability to use current techniques, skills, and tools necessary for information systems practices by recognizing the need for, and the ability to engage in, continuing professional development
- An ability to understand professional, ethical, legal, security and social issues and responsibilities
- An ability to demonstrate the use of various computer forensic software tools and techniques as well as follow proper legal procedures for obtaining, analyzing, and reporting digital forensic evidence.
- An ability to properly report the findings of a cyber forensic investigation in both written form (using proper grammar, writing style, and citation) and in oral form (i.e., within the context of a trial, hearing, or deposition).
- An ability to Identify and analyze legal issues within technology, such as: on-line contracts, computer crime, fraud, privacy, defamation, hate speech, indecency, obscenity, cyber- squatting, and intellectual property.
- An ability to demonstrate various techniques for preventing unauthorized attacks to computer networks and apply measures for minimizing the damage caused by network intruders.
- An ability to evaluate and implement the needed information security controls for any information system and to provide an assurance framework where the security processes or controls, or both, are embedded in information systems technologies.
- An ability to evaluate and implement an I/T Governance Framework Taxonomy such as COBIT (Control Objectives for Information and Related Technology) to provide the student with an integrated theoretical and practical perspective of technology and information systems governance, control and assurance.
- An ability to examine the contents of mobile devices such as a cell phone, smart phone or GPS, and also be able to determine the necessary protocols which are necessary to handle external media and devices that may have connected with handheld devices
Enrollment and Graduation Data
- 2020: 218 enrolled, 51 graduates
- 2019: 228 enrolled, 47 graduates
- 2018: 218 enrolled, 52 graduates
- 2017: 214 enrolled, 35 graduates
- 2016: 174 enrolled, 24 graduates
- 2015: 144 enrolled, 23 graduates
- 2014: 137 enrolled, 22 graduates
- 2013: 100 enrolled, 11 graduates
- 2012: 48 enrolled, 1 graduate
These are some of the classes for students in this academic program:
School of Informatics, Humanities and Social Sciences
Focus on delivering information in a way that makes an impact. Create images that capture attention, compose words that inspire, and design technology that changes how we live.Visit School Site