REQUEST INFO

  


Computer Forensics Degree Specialization

Computer Forensics Degree Specialization

Want to pursue a career in computer information systems and interested in solving and responding to cybercrime? Then this specialization may be the right fit for you. In our Computer Forensics specialization, you’ll learn protocols and techniques necessary to respond to and minimize damage from a cyberattack. You’ll also learn how a computer forensic team works to identify breaches and hacks, understand the source and recover assets.

calendar

Classes Start

on campus, online

Program Available

On Campus/Online
cost

Program Cost

$497/Credit Hour
book
39
Courses

Program Coursework

With our Tech Core, curriculum specifically designed to arm you with a foundation in technology, you’ll get hands-on learning in Engineering Technology, Information Technology and Software and Information Systems and build relevant skills you can put to work tomorrow. When you specialize your Computer Information Systems degree in Computer Forensics, your coursework at DeVry University may include these courses:

Digital Forensics I and II

Principles and Theory of Security Management

Information Systems Security Planning and Audit

Digital Forensics I and II

The first of these two Computer Forensics courses focuses on applying basic forensic techniques used to investigate illegal and unethical activity within a PC or local area network (LAN) environment and then resolving related issues. The second explores advanced investigative techniques to track leads over local and wide area networks, including international computer crime.

Principles and Theory of Security Management

This course surveys the scope of security management, introducing principles and frameworks for recognizing security issues and solutions. Aspects of protecting people, information and physical assets, including loss prevention, are examined. Legal foundations, historical roots, operations and tools of security management are introduced, as is the role of security in contemporary business, government and public settings.

Information Systems Security Planning and Audit

This course provides an in-depth look at the kind of risk factor analysis that must be performed in order to design a flexible and comprehensive security plan. Topics include assessing threats, developing countermeasures, protecting information, using auditing practices to verify compliance with policies and procedures, and building a case for presentation in private and public settings.

To learn more about required and elective Computer Forensics courses as well as those for the CIS degree program, request information or see the undergraduate academic catalog.

1 As part of this program, one complimentary laptop is provided to students enrolled in the Associate of Information Technology and Networking, Bachelor’s of Information Technology and Networking, Bachelor’s of Software Development, Bachelor’s of Electronics Engineering Technology/Engineering Technology – Electronics and Bachelor’s of Computer Information Systems. The laptop is issued during the student’s second session. Certain restrictions apply.

All students enrolled in site-based programs will be required to take some coursework online and, for some programs and locations, a substantial portion of the program may be required to be completed online.