Cybersecurity and Digital Forensics B.S.

Apply Today
Available - On Campus
Available - Online

The B.S. in Cybersecurity and Digital Forensics combines the disciplines of technology, business, organizational behavior, and law. You learn the techniques used to detect, respond to, and prevent network intrusions, and also master broader concepts such as the responsible use of resources, the appropriate management of risks, and the alignment of information technology with the organization.

Faculty with practical experience in cybersecurity will work closely with you to build your competence in this fast-growing field. Professional opportunities and internships prepare you for career settings, while special study programs and the student group Top Secret Colonials give you many options to test your abilities and broaden your competencies.

Graduates go on to work for law enforcement agencies, companies, and other private sector organizations as skilled professionals with both business acumen and technology skills for recognizing and mitigating vulnerabilities.

The Computing Accreditation Commission of ABET has accredited the B.S. degree programs in Computer Information Systems, Cyber Forensics and Information Security, and Information Sciences.


Contact Information

Peter Wu
Department Head
412-397-6458 phone
Wheatley Center 320

4-Year Course Plan

Freshman Year, Fall

Freshman Year, Spring

Sophomore Year, Fall

Sophomore Year, Spring

Junior Year, Fall

  • INFS3235 Computer & Network Security
  • INFS3222 IT Security, Control, Assurance
  • SOCI1010 Principles of Sociology
  • Area of Interest Course 1
  • Area of Interest Course 2
  • Area of Interest Course 3

Junior Year, Spring

  • INFS4240 DBMS
  • INFS3223 It Governance
  • INFS3450 Quant Analysis for I/S
  • Area of Interest Course 4
  • Area of Interest Course 5

Senior Year, Fall

  • INFS4170 Glob, Econ, Soc., Eth iss I/S
  • INFS3191 Mobile Forensics
  • Open Elective 1
  • Open Elective 2
  • Open Elective 3

Senior Year, Spring

  • INFS4810 Project Management
  • INFS4180 Network Forensics, Intr Det/Response
  • Open Elective 4
  • Open Elective 5
  • Open Elective 6
  • INFS4860 Program Outcomes Assessment
Additional Program Details

Program Educational Objectives

Five years after graduation, the graduates should:

  • Contributing to the work force in their specialty such as but not limited to computer forensics, mobile security, network security, software security, database security, or information security.
  • Advancing their careers via continuous learning and professional development through the attainment of professional certification, professional study and research or graduate education.
  • Assuming positions of leadership within their organization.
  • Contributing to economic development and society through the prevention and detection of cyber threats in the computer-based information systems for business, government, and other organizations.

Student Outcomes

At the time of graduation, the graduate should have:

  • An ability to design, implement and evaluate a computer-based information system, process, component, or program to meet desired business or organizational specifications
  • An ability to apply knowledge of information systems, programming and mathematics appropriate to the discipline.
  • An ability to demonstrate sufficient background knowledge in Operating Systems, Networking, Data Communication, Database Technology, Information Systems Planning, and Project Management
  • An ability to analyze an information systems problem, define performance specifications to solve the problem and identify feasible solutions while recognizing the local and global impact of computing on individuals, organizations and society
  • An ability to function effectively on teams and to be able to communicate effectively with a range of audiences
  • An ability to use current techniques, skills, and tools necessary for information systems practices by recognizing the need for, and the ability to engage in, continuing professional development
  • An ability to understand professional, ethical, legal, security and social issues and responsibilities
  • An ability to demonstrate the use of various computer forensic software tools and techniques as well as follow proper legal procedures for obtaining, analyzing, and reporting digital forensic evidence.
  • An ability to properly report the findings of a cyber forensic investigation in both written form (using proper grammar, writing style, and citation) and in oral form (i.e., within the context of a trial, hearing, or deposition).
  • An ability to Identify and analyze legal issues within technology, such as:  on-line contracts, computer crime, fraud, privacy, defamation, hate speech, indecency, obscenity, cyber- squatting, and intellectual property.
  • An ability to demonstrate various techniques for preventing unauthorized attacks to computer networks and apply measures for minimizing the damage caused by network intruders.
  • An ability to evaluate and implement the needed information security controls for any information system and to provide an assurance framework where the security processes or controls, or both, are embedded in information systems technologies.
  • An ability to evaluate and implement an I/T Governance Framework Taxonomy such as COBIT (Control Objectives for Information and Related Technology) to provide the student with an integrated theoretical and practical perspective of technology and information systems governance, control and assurance.
  • An ability to examine the contents of mobile devices such as a cell phone, smart phone or GPS, and also be able to determine the necessary protocols which are necessary to handle external media and devices that may have connected with handheld devices

Enrollment and Graduation Data

  • 2020: 218 enrolled, 51 graduates
  • 2019: 228 enrolled, 47 graduates
  • 2018: 218 enrolled, 52 graduates
  • 2017: 214 enrolled, 35 graduates
  • 2016: 174 enrolled, 24 graduates
  • 2015: 144 enrolled, 23 graduates
  • 2014: 137 enrolled, 22 graduates
  • 2013: 100 enrolled, 11 graduates
  • 2012: 48 enrolled, 1 graduate

Sample Courses:

These are some of the classes for students in this academic program:

Digital Evidence Analysis
Network Forensics, Internal Detection & Response
IT Governance, Control & Assurance
Major Credits
Information Science
Core Credits
Communication Skills, Economics, Humanities, History, Sciences, etc.
Elective Credits

Top Employers

top employers

School of Informatics, Humanities and Social Sciences

School of Informatics, Humanities and Social Sciences

Focus on delivering information in a way that makes an impact. Create images that capture attention, compose words that inspire, and design technology that changes how we live.

Visit School Site

We’re ready when you’re ready.
Request additional information:

Let us know and we can share some more details about our degree programs and other majors and study options at RMU.

Is it ok for RMU to send important updates and information with text messages?


Call us at:


Schedule a Visit