Computer Forensics Degree Specialization
Computer forensics experts acquire, investigate, and report on the electronic evidence of criminal cases. This Computer Forensics specialization can help you master leading computer forensic software applications and gain an understanding of the diversity of computer crime and the laws and principals concerned with computer forensics and electronic evidence. You'll also learn how to discover data that resides in a computer system, and recover deleted, encrypted, or damaged file information. With this high-demand skill set, you'll play a key role in identifying and prosecuting criminals.
Follow a career track in Computer Forensics by choosing this specialization when you earn your bachelor's degree in Computer Information Systems (CIS) from DeVry University.
Learn more about the advantages of studying at DeVry University. Request more information.
Related Programs: Consider one of the justice administration specializations through the College of Liberal Arts & Sciences as part of its Justice Administration bachelor's degree program:
Computer Forensics Courses
When you specialize your Computer Information Systems degree in Computer Forensics, your coursework at DeVry University may include these career-enhancing courses:
- Digital Crime: Evidence and Procedure – Through an introduction to basic legal concepts and evidentiary procedures for investigating criminal activity involving computers and computer-based systems, students in this Computer Forensics course explore practical application of law and legal procedures in the digital age.
- Computer Ethics – Students in this course explore the nature and social impact of computer technology, and the corresponding formulation and justification of governmental and organizational policies for ethical uses of such technology. Topics include legal, ethical, and sociological concerns about the ubiquity of computer software and hardware, as well as concerns about the proliferation and pervasive nature of computer networks.
- Digital Forensics I and II – The first of these two Computer Forensics courses focuses on applying basic forensic techniques used to investigate illegal and unethical activity within a PC or local area network (LAN) environment and then resolving related issues. The second explores advanced investigative techniques to track leads over local and wide area networks, including international computer crime.
- Information Systems Security Planning and Audit – This course provides an in-depth look at the kind of risk factor analysis that must be performed in order to design a flexible and comprehensive security plan. Topics include assessing threats, developing countermeasures, protecting information, using auditing practices to verify compliance with policies and procedures, and building a case for presentation in private and public settings.