Computer Forensics Degree Specialization
Computer forensics experts acquire, investigate, and report on the electronic evidence of criminal cases. This Computer Forensics specialization can help you master leading computer forensic software applications and gain an understanding of the diversity of computer crime and the laws and principals concerned with computer forensics and electronic evidence. You'll also learn how to discover data that resides in a computer system, and recover deleted, encrypted, or damaged file information. With this high-demand skill set, you'll play a key role in identifying and prosecuting criminals.
Follow a career track in Computer Forensics by choosing this specialization when you earn your bachelor's degree in Computer Information Systems (CIS) from DeVry University.
Learn more about DeVry's Computer Forensics degree specialization online.
Learn more about the advantages of studying at DeVry University. Request more information.
When you specialize your Computer Information Systems degree in Computer Forensics, your coursework at DeVry University may include these career-enhancing courses:
Digital Crime: Evidence and Procedure
Digital Forensics I and II
Information Systems Security Planning and Audit
Through an introduction to basic legal concepts and evidentiary procedures for investigating criminal activity involving computers and computer-based systems, students in this Computer Forensics course explore practical application of law and legal procedures in the digital age.
Students in this course explore the nature and social impact of computer technology, and the corresponding formulation and justification of governmental and organizational policies for ethical uses of such technology. Topics include legal, ethical, and sociological concerns about the ubiquity of computer software and hardware, as well as concerns about the proliferation and pervasive nature of computer networks.
The first of these two Computer Forensics courses focuses on applying basic forensic techniques used to investigate illegal and unethical activity within a PC or local area network (LAN) environment and then resolving related issues. The second explores advanced investigative techniques to track leads over local and wide area networks, including international computer crime.
This course provides an in-depth look at the kind of risk factor analysis that must be performed in order to design a flexible and comprehensive security plan. Topics include assessing threats, developing countermeasures, protecting information, using auditing practices to verify compliance with policies and procedures, and building a case for presentation in private and public settings.