Digital Forensics Technology
Digital Forensics Technology Overview
In today’s digital landscape, unlimited possibilities exist for communication, business and entertainment online. However, the rise in cyber innovation and usage brings with it a brand new age of electronic crime and security threats due to the widespread amount of sensitive, personal and often times classified information transmitted every day. This intensifies the demand for skilled workers who have the ability to conduct digital forensics investigations and assist in securing computer systems and mobile networks in nearly every industry. ECPI University’s new Digital Forensics Technology track is designed to provide students with the knowledge and skills necessary to install, secure, test, and maintain computer networks in order to eliminate digital threats and protect critical infrastructure.
Key skilled required:
- An in-depth understanding of computer science and relevant software programs
- Investigative, analytical and problem solving abilities
- Awareness and vigilance when dealing with classified or sensitive company information
- Strong communication skills and the ability to work in a team setting
This program provides a hands-on, skills based learning approach that mirrors actual work environments. If you want a career that combines knowledge of cyber networks, and the ability to gather electronic evidence to protect communities and businesses from digital threats, consider a degree in Cyber and Information Security Technology with a focus on Digital Forensics Technology.
28 semester credit hours
Course ID Course Name Credits BUS121 Introduction to Business 3 BUS472 Applied Project Management 3 BUS472L Applied Project Management Lab 1 CIS126 Introduction to Programming 3 CIS142 Introduction to Cloud Solutions 3 CIS150 Introduction to Networking 3 CIS206 Linux Administration 3 CIS212 Principles of Cybersecurity 3 CIS223 Introduction to Databases 3 ONE OF THESE TWO COURSES: CIS123 Introduction to Scripting 3 CIS228 Service Desk Fundamentals 3
*For allowable substitutions of arts and sciences courses, see the Arts & Sciences Department section in the ECPI University Course Catalog.
Arts and Sciences*
31 semester credit hours
Course ID Course Name Credits CAP480 Arts and Sciences Capstone 3 COM115 Principles of Communication 3 ENG110 College Composition 3 ENG120 Advanced Composition 3 HUM205 Culture and Diversity: Exploring the Humanities 3 MTH131 College Algebra 3 MTH140 Statistics 3 PSY105 Introduction to Psychology 3 PSY220 Positive Psychology 3 ONE LECTURE COURSE AND CORRESPONDING LAB FROM THE FOLLOWING: PHY120 Physics 3 PHY120L Physics Lab 1 BIO122 Environmental Biology 3 BIO122L Environmental Biology Lab 1
9 semester credit hours
Course ID Course Name Credits CIS106 Introduction to Operating Systems 3 CIS115 Computer Applications 3 COR090 Career Orientation Seminar 0 FOR110 Essentials for Success 3
Cyber and Information Security Technology Major Required Courses
37 semester credit hours plus electives
Course ID Course Name Credits CIS101 Computer Configuration I 3 CIS202 Introduction to Routing and Switching 3 CIS202L Introduction to Routing and Switching Lab 1 CIS204 Intermediate Routing and Switching 3 CIS207L Routing and Switching LAB 1 CIS225 Network Protocols and Services 3 CIS245 Windows Client and Server 3 CIS245L Windows Client and Server Lab 1 CIS251 Advanced Windows Server 3 CIS256 Windows Active Directory 3 CIS256L Windows Active Directory LAB 1 CIS321 Network Scripting 3 CIS403 Ethical Hacking 3 CIS425 Advanced Defense and Countermeasures 3 ONE OF THESE TWO COURSES: CIS495 Cyber and Network Security Capstone 3 CIS490 Bachelor's Externship-CIS 3
Digital Forensics Technology Track
15 semester credit hours
Course ID Course Name Credits CJ106 Criminal Law I 3 CJ125 Criminal Procedure 3 CJ200 Investigations 3 CJ310 Digital Forensic Analysis 3 CJ315 Mobile Device Forensics 3
- Program Description
Cyber-attacks and other digital crimes affect individuals, communities, businesses and even national security. With a focus on digital forensics technology, students will have the opportunity to investigate electronic crimes in a computer science environment. CIS graduates are required in many industries, so employment could be expected in almost any military, public or private business setting.
ECPI University’s new program emphasizes knowledge and skill of cybercrime detection, as well as the design, development and implementation of cloud computing tools and software. Students will also have the opportunity to develop strategies to assist clients with technical problems. With this program, you could expect to assess and implement several security controls to protect an organization from threats and vulnerabilities as well as conduct electronic crime investigations as it relates to criminal law.
Through ECPI’s year-round schedule, you could earn a Bachelor of Science in Computer and Information Science with a Cyber and Information Security Technology major, Digital Forensics Technology track in as little as 2.5 years.
- Possible Career Track
Students majoring in Cyber and Information Security Technology with a Digital Forensics Technology track typically vie for employment in highly technology-focused, computer science related fields. Technology industries are on the hunt for skilled personnel who are able to not only decrease cyber-attacks and computer related crimes, but who also have robust knowledge of cyber and mobile networks, as well as software and computer systems.
Top career choices in this field include:
- Digital Forensics Analyst
- Cyber Security Specialist
- Security Architect
- Computer Forensic Investigator
- Information Security Analyst
- Information Security Engineer
Students in the B.S. in Computer & Information Science program develop planning, design, implementation, and support skills in operating systems, networking, software programs, and security. Students develop additional focused skills based on which major the student pursues. Students also learn principles of excellent customer service in order to assist clients with technical issues.
Upon successful completion of the Bachelor of Science in Computer & Information Science, graduates are expected to:
- Design, implement, and evaluate computer-based solutions that incorporate the appropriate computing requirements identified through the analysis of specific organizational or computing problems
- Function effectively on teams to establish goals, plan tasks, meet deadlines, manage risk, and produce deliverables
- Apply written, oral, and graphical communication in both technical and non-technical environments
- Evaluate and use appropriate technical literature
- Engage in continuous professional development through user groups, associations, conferences, readings, research, and other channels
- Develop and apply ethical and legal best practices in the maintenance and security of information and systems
- Develop cloud computing tools
In addition to the B.S. CIS Program Outcomes, students in the Cyber and Information Security Technology Major learn about installing, securing, testing, and maintaining computer networks.
Upon successful completion of the Cyber and Information Security Technology Major, graduates are expected to:
- Plan, design, configure and administer a network and security infrastructure
- Maintain, monitor, and troubleshoot a network and security infrastructure
- Assess and implement technical and non-technical security controls to protect an organization from threats and vulnerabilities
- Program Guide
- Download Program Guide (1.14 MB)