As new technological innovations continue to proliferate in our society,
so do the opportunities for technology exploitation. Once a mere
nuisance, hackers now threaten private citizens, businesses, and
Government and law enforcement agencies need skilled professionals who
can join the fight against cyber crime, cyber terrorism, identity theft,
and the exploitation of minors. Companies and other private sector
organizations need skilled professionals with both business acumen and
technology skills for recognizing and mitigating vulnerabilities.
The BS in Cyber Forensics and Information Security combines the
disciplines of technology, business, organizational behavior, and law.
Students learn techniques used to detect, respond to, and prevent
network intrusions. They also master broader concepts such as the
responsible use of resources, the appropriate management of risks, and
the alignment of information technology with the organization.
Program Educational Objectives
Five years after graduation the graduates should be:
- Contributing to the work force in their specialty such as but not limited to information security, network/Internet security, cyber forensics, computer forensics, or digital forensics.
- Advancing their careers via continuous learning and professional development through the attainment of professional certification, professional study and research or graduate education.
- Assuming positions of leadership within their organization.
- Contributing to economic development and society through the development, maintenance and management of computer-based information systems and information/network security systems for business, government, and other organizations.
When a student successfully completes all requirements for the B.S. in Cyber Forensics and Information Security degree, he/she will be able to . . .
- Demonstrate the use of various computer forensic software tools and techniques as well as follow proper legal procedures for obtaining, analyzing, and reporting digital forensic evidence.
- Properly report the findings of a cyber forensic investigation in both written form (using proper grammar, writing style, and citation) and in oral form (i.e., within the context of a trial, hearing, or deposition).
- Identify and analyze legal issues within technology, such as: on-line contracts, computer crime, fraud, privacy, defamation, hate speech, indecency, obscenity, cyber- squatting, and intellectual property.
- Demonstrate various techniques for preventing unauthorized attacks to computer networks and apply measures for minimizing the damage caused by network intruders.
Checksheet for Required Courses