Digital Forensics Technology Overview
In today’s digital landscape, unlimited possibilities exist for communication, business and entertainment online. However, the rise in cyber innovation and usage brings with it a brand new age of electronic crime and security threats due to the widespread amount of sensitive, personal and often times classified information transmitted every day. This intensifies the demand for skilled workers who have the ability to conduct digital forensics investigations and assist in securing computer systems and mobile networks in nearly every industry. ECPI University’s new Digital Forensics Technology track is designed to provide students with the knowledge and skills necessary to install, secure, test, and maintain computer networks in order to eliminate digital threats and protect critical infrastructure.
Key skilled required:
- An in-depth understanding of computer science and relevant software programs
- Investigative, analytical and problem solving abilities
- Awareness and vigilance when dealing with classified or sensitive company information
- Strong communication skills and the ability to work in a team setting
This program provides a hands-on, skills based learning approach that mirrors actual work environments. If you want a career that combines knowledge of cyber networks, and the ability to gather electronic evidence to protect communities and businesses from digital threats, consider a degree in Cyber and Information Security Technology with a focus on Digital Forensics Technology.
Digital Forensics Technology Curriculum
|Course ID||Course Name||Credits|
|BUS121||BUS121 Introduction to Business||3.00|
|CIS123||CIS123 Introduction to Python Scripting||3.00|
|CIS126||CIS126 Introduction to Programming||3.00|
|CIS142||CIS142 Introduction to Cloud Solutions||3.00|
|CIS150||CIS150 Introduction to Networking||3.00|
|CIS206||CIS206 Linux Administration||3.00|
|CIS212||CIS212 Principles of Cybersecurity||3.00|
|CIS223||CIS223 Introduction to Databases||3.00|
|PMT472||PMT472 Applied Project Management||3.00|
|PMT472L||PMT472L Applied Project Management LAB||1.00|
|Credit Hour(s) total||28.00|
|Course ID||Course Name||Credits|
|CAP480||CAP480 Arts and Sciences Capstone||3.00|
|COM115||COM115 Principles of Communication||3.00|
|ENG110||ENG110 College Composition||3.00|
|ENG120||ENG120 Advanced Composition||3.00|
|HUM205||HUM205 Culture and Diversity: Exploring the Humanities||3.00|
|MTH131||MTH131 College Algebra||3.00|
|PSY105||PSY105 Introduction to Psychology||3.00|
|PSY220||PSY220 Positive Psychology||3.00|
|PHY120L||PHY120L Physics LAB||1.00|
|BIO122||BIO122 Environmental Biology||3.00|
|BIO122L||BIO122L Environmental Biology LAB||1.00|
*For allowable substitutions of arts and sciences courses, see the Arts & Sciences Department page.
|Course ID||Course Name||Credits|
|CIS101||CIS101 Computer Configuration I||3.00|
|CIS202||CIS202 Introduction to Routing and Switching||3.00|
|CIS202L||CIS202L Introduction to Routing and Switching LAB||1.00|
|CIS204||CIS204 Intermediate Routing and Switching||3.00|
|CIS207L||CIS207L Network Routing and Switching LAB||1.00|
|CIS225||CIS225 Network Protocols and Services||3.00|
|CIS245||CIS245 Windows Client and Server||3.00|
|CIS245L||CIS245L Windows Client and Server LAB||1.00|
|CIS251||CIS251 Advanced Windows Server||3.00|
|CIS256||CIS256 Windows Active Directory||3.00|
|CIS256L||CIS256L Windows Active Directory LAB||1.00|
|CIS321||CIS321 Network Scripting||3.00|
|CIS403||CIS403 Ethical Hacking||3.00|
|CIS425||CIS425 Advanced Defense and Countermeasures||3.00|
|CIS495||CIS495 Cyber and Network Security Capstone||3.00|
|CIS490||CIS490 Bachelor’s Externship-CIS||3.00|
*Choose one of the following: CIS495 - Cyber and Network Security Capstone or CIS490 - Bachelor's Externship-CIS
Visit the ECPI University Catalog for the most current program information.
Digital Forensics Technology Program Description
Cyber-attacks and other digital crimes affect individuals, communities, businesses and even national security. With a focus on digital forensics technology, students will have the opportunity to investigate electronic crimes in a computer science environment. CIS graduates are required in many industries, so employment could be expected in almost any military, public or private business setting.
ECPI University’s new program emphasizes knowledge and skill of cybercrime detection, as well as the design, development and implementation of cloud computing tools and software. Students will also have the opportunity to develop strategies to assist clients with technical problems. With this program, you could expect to assess and implement several security controls to protect an organization from threats and vulnerabilities as well as conduct electronic crime investigations as it relates to criminal law.
Through ECPI’s year-round schedule, you could earn a Bachelor of Science in Computer and Information Science with a Cyber and Information Security Technology major, Digital Forensics Technology track in as little as 2.5 years.
Digital Forensics Technology Possible Career Track
Students majoring in Cyber and Information Security Technology with a Digital Forensics Technology track typically vie for employment in highly technology-focused, computer science related fields. Technology industries are on the hunt for skilled personnel who are able to not only decrease cyber-attacks and computer related crimes, but who also have robust knowledge of cyber and mobile networks, as well as software and computer systems.
Top career choices in this field include:
- Digital Forensics Analyst
- Cyber Security Specialist
- Security Architect
- Computer Forensic Investigator
- Information Security Analyst
- Information Security Engineer
Digital Forensics Technology Outcomes
Students in the B.S. in Computer & Information Science program develop planning, design, implementation, and support skills in operating systems, networking, software programs, and security. Students develop additional focused skills based on which major the student pursues. Students also learn principles of excellent customer service in order to assist clients with technical issues.
Upon successful completion of the Bachelor of Science in Computer & Information Science, graduates are expected to:
- Design, implement, and evaluate computer-based solutions that incorporate the appropriate computing requirements identified through the analysis of specific organizational or computing problems
- Function effectively on teams to establish goals, plan tasks, meet deadlines, manage risk, and produce deliverables
- Apply written, oral, and graphical communication in both technical and non-technical environments
- Evaluate and use appropriate technical literature
- Engage in continuous professional development through user groups, associations, conferences, readings, research, and other channels
- Develop and apply ethical and legal best practices in the maintenance and security of information and systems
- Develop cloud computing tools
In addition to the B.S. CIS Program Outcomes, students in the Cyber and Information Security Technology Major learn about installing, securing, testing, and maintaining computer networks.
Upon successful completion of the Cyber and Information Security Technology Major, graduates are expected to:
- Plan, design, configure and administer a network and security infrastructure
- Maintain, monitor, and troubleshoot a network and security infrastructure
- Assess and implement technical and non-technical security controls to protect an organization from threats and vulnerabilities