Programs
Digital Forensics Technology 100% Online
Digital Forensics Technology Overview
In today’s digital landscape, unlimited possibilities exist for communication, business and entertainment online. However, the rise in cyber innovation and usage brings with it a brand new age of electronic crime and security threats due to the widespread amount of sensitive, personal and often times classified information transmitted every day. This intensifies the demand for skilled workers who have the ability to conduct digital forensics investigations and assist in securing computer systems and mobile networks in nearly every industry. ECPI University’s new Digital Forensics Technology track is designed to provide students with the knowledge and skills necessary to install, secure, test, and maintain computer networks in order to eliminate digital threats and protect critical infrastructure.
Key skilled required:
- An in-depth understanding of computer science and relevant software programs
- Investigative, analytical and problem solving abilities
- Awareness and vigilance when dealing with classified or sensitive company information
- Strong communication skills and the ability to work in a team setting
This program provides a hands-on, skills based learning approach that mirrors actual work environments. If you want a career that combines knowledge of cyber networks, and the ability to gather electronic evidence to protect communities and businesses from digital threats, consider a degree in Cyber and Information Security Technology with a focus on Digital Forensics Technology.
Cyber-attacks and other digital crimes affect individuals, communities, businesses and even national security. With a focus on digital forensics technology, students will have the opportunity to investigate electronic crimes in a computer science environment. CIS graduates are required in many industries, so employment could be expected in almost any military, public or private business setting.
ECPI University’s new program emphasizes knowledge and skill of cybercrime detection, as well as the design, development and implementation of cloud computing tools and software. Students will also have the opportunity to develop strategies to assist clients with technical problems. With this program, you could expect to assess and implement several security controls to protect an organization from threats and vulnerabilities as well as conduct electronic crime investigations as it relates to criminal law.
Through ECPI’s year-round schedule, you could earn a Bachelor of Science in Computer and Information Science with a Cyber and Information Security Technology major, Digital Forensics Technology track in as little as 2.5 years.
Students majoring in Cyber and Information Security Technology with a Digital Forensics Technology track typically vie for employment in highly technology-focused, computer science related fields. Technology industries are on the hunt for skilled personnel who are able to not only decrease cyber-attacks and computer related crimes, but who also have robust knowledge of cyber and mobile networks, as well as software and computer systems.
Top career choices in this field include:
- Digital Forensics Analyst
- Cyber Security Specialist
- Security Architect
- Computer Forensic Investigator
- Information Security Analyst
- Information Security Engineer
Course ID | Course Name | Credits |
---|---|---|
BUS121 | Introduction to Business | 3 |
BUS472 | Applied Project Management | 3 |
BUS472L | Applied Project Management Lab | 1 |
CIS126 | Introduction to Programming | 3 |
CIS142 | Introduction to Cloud Solutions | 3 |
CIS150 | Introduction to Networking | 3 |
CIS206 | Linux Administration | 3 |
CIS212 | Principles of Cybersecurity | 3 |
CIS223 | Introduction to Databases | 3 |
ONE OF THESE TWO COURSES: | ||
CIS123 | Introduction to Scripting | 3 |
CIS228 | Service Desk Fundamentals | 3 |
Course ID | Course Name | Credits |
---|---|---|
CAP480 | Arts and Sciences Capstone | 3 |
COM115 | Principles of Communication | 3 |
ENG110 | College Composition | 3 |
ENG120 | Advanced Composition | 3 |
HUM205 | Culture and Diversity | 3 |
MTH131 | College Algebra | 3 |
MTH140 | Statistics | 3 |
PSY105 | Introduction to Psychology | 3 |
PSY220 | Positive Psychology | 3 |
ONE LECTURE COURSE AND CORRESPONDING LAB FROM THE FOLLOWING: | ||
PHY120 | Physics | 3 |
PHY120L | Physics Lab | 1 |
BIO122 | Environmental Biology | 3 |
BIO122L | Environmental Biology Lab | 1 |
Course ID | Course Name | Credits |
---|---|---|
CIS106 | Introduction to Operating Systems | 3 |
CIS115 | Computer Applications | 3 |
COR090 | Career Orientation Seminar | 0 |
FOR110 | Essentials for Success | 3 |
Course ID | Course Name | Credits |
---|---|---|
CIS101 | Computer Configuration I | 3 |
CIS202 | Introduction to Routing and Switching | 3 |
CIS202L | Introduction to Routing and Switching Lab | 1 |
CIS204 | Intermediate Routing and Switching | 3 |
CIS207L | Routing and Switching LAB | 1 |
CIS225 | Network Protocols and Services | 3 |
CIS245 | Windows Client and Server | 3 |
CIS245L | Windows Client and Server Lab | 1 |
CIS251 | Advanced Windows Server | 3 |
CIS256 | Windows Active Directory | 3 |
CIS256L | Windows Active Directory LAB | 1 |
CIS321 | Network Scripting | 3 |
CIS403 | Ethical Hacking | 3 |
CIS425 | Advanced Defense and Countermeasures | 3 |
ONE OF THESE TWO COURSES: | ||
CIS495 | Cyber and Network Security Capstone | 3 |
CIS490 | Bachelor's Externship-CIS | 3 |
Course ID | Course Name | Credits |
---|---|---|
CJ106 | Criminal Law I | 3 |
CJ125 | Criminal Procedure | 3 |
CJ200 | Investigations | 3 |
CJ310 | Digital Forensic Analysis | 3 |
CJ315 | Mobile Device Forensics | 3 |
Students in the B.S. in Computer & Information Science program develop planning, design, implementation, and support skills in operating systems, networking, software programs, and security. Students develop additional focused skills based on which major the student pursues. Students also learn principles of excellent customer service in order to assist clients with technical issues.
Upon successful completion of the Bachelor of Science in Computer & Information Science, graduates are able to:
- Design, implement, and evaluate computer-based solutions that incorporate the appropriate computing requirements identified through the analysis of specific organizational or computing problems
- Function effectively on teams to establish goals, plan tasks, meet deadlines, manage risk, and produce deliverables
- Apply written, oral, and graphical communication in both technical and non-technical environments
- Evaluate and use appropriate technical literature
- Engage in continuous professional development through user groups, associations, conferences, readings, research, and other channels
- Develop and apply ethical and legal best practices in the maintenance and security of information and systems
- Develop cloud computing tools
In addition to the B.S. CIS Program Outcomes, students in the Cyber and Information Security Technology Major learn about installing, securing, testing, and maintaining computer networks.
Upon successful completion of the Cyber and Information Security Technology Major, graduates are able to:
- Plan, design, configure and administer a network and security infrastructure
- Maintain, monitor, and troubleshoot a network and security infrastructure
- Assess and implement technical and non-technical security controls to protect an organization from threats and vulnerabilities
Click above to experience an actual online class in real time.