Live Chat Now
Give us a call

Send us a text



Computer Information Systems

Bachelor’s Degree Specialization in Computer Forensics

Develop Your Skills with a Computer Forensics Degree Specialization

Are you interested in learning how to protect companies from cyber criminals? Get started with a Bachelor’s Degree in Computer Information Systems with a Specialization in Computer Forensics from DeVry University. This program will help you develop stronger deductive and inductive reasoning skills to formulate and test theories about how cybercrimes were committed, conduct digital investigations, collect relevant digital evidence and prevent cyberattacks from happening.

Our Computer Forensics Degree Program Specialization is anchored with our unique Tech Core curriculum, which immerses you in a core set of courses that help you develop skills related to operating systems, programming, hardware, connectivity and security that you can leverage in today’s IoT economy.

Get to Know Our Computer Forensics Degree Specialization

Part of our Bachelor’s Degree in Computer Information Systems program, the Computer Forensics Degree Specialization is designed to help you build your understanding of computer forensics software applications, relevant laws, ethics and how to recover lost data and unencrypt files in order to provide court-ready evidence, preparing you to pursue new career opportunities. These investigators identify, track and assist in the prosecution of cybercriminals and to help solve cybercrimes. In some cases, they may even help law enforcement by uncovering lost data from cyberattacks and suspects’ devices.

This program teaches you how to utilize computer forensic software applications and the laws and ethics that affect digital evidence. You will also learn how to recover and gather evidence from viruses and information security breaches that could be encrypted or destroyed—such as erased files and emails—and use them to prepare reports that may be submitted in court.

Classes Start Every 8 Weeks

Accreditation and Recognition Matter


Being accredited means we’ve met rigorous quality standards and are committed to giving you the education you deserve. We're proud that DeVry University is accredited by The Higher Learning Commission (HLC),

In addition, DeVry University’s Cyber Security curriculum is acknowledged and verified as an approved provider by National Initiative for Cyber Security Careers and Studies (NICCS). 

Why DeVry?

Why Choose Computer Forensics at DeVry?

Work With IoT Technologies & Systems

Immerse yourself in the Internet of Things (IoT) world and obtain hands-on experience with IoT, cloud, software and security technologies and systems.

Certification Exam Reimbursement

Elements of this curriculum help prepare you to pursue industry certification opportunities that can validate your knowledge and skills to employers. Once you meet the program requirements, we’ll reimburse you for up to $300 toward the cost of one industry certification exam attempt. Certifications include:   


CompTIA A+
CompTIA Linux+
CompTIA Network+
CompTIA Cloud Essentials+
CompTIA Security+

Other certifications may also be eligible for reimbursement. Speak to your Student Support Advisor for additional information.

Complimentary Laptop

You’ll get a complimentary laptop as part of your technology program1. It’s our way of investing in your education—and you.

Questions for our admissions team?
Computer Forensics Specialization Program
Scholars Program

Future Cyber Defenders Scholars Program

Take your ambition to the next level with a cybersecurity scholars program that helps you build your network, boost your skills and pursue the career you want.
Minimum Completion Time*
2 years
8 months
Normal Completion Time
4 years


Choose the schedule that best fits your goals and commitments. You can earn your Bachelor's Degree in as few as 2 years and 8 months*.

Or, follow a normal schedule and complete your program in 4 years.**

* Minimum completion time does not include breaks and assumes 3 semesters of year-round, full-time enrollment in 13-19 credit hours a semester per 12 month period.
** Normal completion time includes breaks and assumes 2 semesters of enrollment in 13-19 credit hours per semester per 12 month period.

Knowledge & Skills

What You'll Learn

The Computer Forensics Degree Specialization covers the following:

  • Digital Crime Evidence and Procedure
    Study basic legal concepts and evidentiary procedures for investigating criminal activity involving computers and computer-based systems. Explore practical application of the law and legal procedures in the digital age.
  • Digital Forensics
    Apply basic forensic techniques used to investigate illegal and unethical activity within a PC or local area network (LAN) environment and resolve related issues.
  • Information Systems Security Planning and Audit
    Understand the risk factor analysis that must be performed in order to design a flexible and comprehensive security plan.
  • Computer Ethics
    Explore the nature and social impact of computer technology, and the corresponding formulation and justification of governmental and organizational policies for ethical uses of such technology.
  • Complex Problem-Solving
    Apply critical and analytical thinking to identify complex problems, evaluate options and implement solutions.
  • Structured Analysis and Design
    Explore the systems analysis and design process using information systems methodologies and techniques to analyze business activities and solve problems. Learn how to identify, define and document business problems, and then develop information system models to solve them.
Embedded Programs

Embedded Programs - Demonstrate Skills at Every Step

You can earn two additional credentials while earning your Computer Information Systems degree with a specialization in Computer Forensics. All courses in our Programming Essentials Certificate Program and Information Technology and Networking Associate Degree are embedded in this program2 so, you can earn a certificate and an associate degree on the way to your bachelor's degree at DeVry.

Credit Hours*
Credit Hours*
Credit Hours*

*The figures displayed represent the minimum credit hours required for graduation. Additional coursework may be necessary to complete program requirements.


Career Opportunities in Computer Forensics

Graduates who have earned our Computer Forensics Degree Specialization may consider careers including, but not limited to:
  • Computer Digital Forensic Investigator† ††

    Computer digital forensic investigators use a combination of technology and detective-like skills to uncover evidence of criminal activity in computers. They are experts at data recovery and work with law enforcement agencies to locate and extract evidence in a way that allows it to be presented in a court of law.

  • Digital Forensics Analysts

    Conduct investigations on computer-based crimes establishing documentary or physical evidence, such as digital media and logs associated with cyber intrusion incidents. Analyze digital evidence and investigate computer security incidents to derive information in support of system and network vulnerability mitigation. Preserve and present computer-related evidence in support of criminal, fraud, counterintelligence, or law enforcement investigations.

  • Computer Systems Analysts

    Analyze science, engineering, business, and other data processing problems to develop and implement solutions to complex applications problems, system administration issues, or network concerns. Perform systems management and integration functions, improve existing computer systems, and review computer system capabilities, workflow, and schedule limitations. May analyze or recommend commercially available software.

  • Information Security Analysts

    Monitor an organization's networks for security breaches and investigate when one occurs. Use and maintain software, such as firewalls and data encryption programs, to protect sensitive information. Check for vulnerabilities in computer and network systems.

Learn more about
Careers in Digital Forensics

†Applicants for jobs in the justice administration field may be subject to pre-employment screenings such as, but not limited to, criminal background checks, drug and/or alcohol testing, physical and/or psychological examinations and credit checks. Unsatisfactory screening results may disqualify an applicant for a position in the justice administration field. Additional government-required training programs may be necessary to obtain employment in this field.
††Employment in this occupation may require years of relevant experience.

Program Courses

Computer Forensics Specialization

General Education Courses
Communication Skills
Advanced Composition
Technical Writing

+ Choose one below:

Public Speaking
Intercultural Communication
Technology, Society and Culture

+ Choose one below:

Ethical and Legal Issues in the Professions
Diversity, Equity and Inclusion in the Workplace
Social Sciences
Principles of Economics
Culture and Society

+ Choose one below:

Environmental Sociology
Cultural Diversity in the Professions
Mathematics and Natural Sciences
Algebra for College Students
Everyday Physics
Data-Driven Decision-Making
Personal and Professional Development
Career Development
Critical Thinking and Problem-Solving
Tech Core Courses
Tech Core
Introduction to Technology and Information Systems
Introduction to Operating Systems
Introduction to Programming
Introduction to Digital Devices
Fundamentals of Information Technology and Networking
Introduction to Cloud Computing
Fundamentals of Information Systems Security
Program Courses
Information Systems and Programming
Programming with Objects
Intermediate Programming
Database Systems and Programming Fundamentals
AI-Driven Business Application Coding
Business Application Programming with Lab
Application Development
Web Interface Design with Lab
Web Application Development with Lab
Interactive Web Page Scripting with Lab
Career Preparation
Introduction to Technical Project Management
Preparation for the Profession
Project Management
Senior Project
Specialized Courses
Computer Forensics
Digital Forensics I with Lab
Digital Forensics II with Lab
Cybersecurity and Data Privacy
Information Systems Security Planning and Audit

FAQs: Computer Forensics

Should I specialize in Computer Forensics?

A Computer Forensics Specialization can be an excellent choice for those who are analytically inclined and interested in law enforcement. We offer a Computer Forensics Degree Program Specialization as part of our Bachelor’s in Computer Information Systems. This exciting profession enables you to help stop cybercrime by catching criminals and recovering important data in the process. A bachelor's degree with a specialization in this subject can help you take the first steps towards a career focused on computer forensics.

What jobs can you pursue with a Computer Forensics Specialization?

Among other career opportunities, graduates with our Computer Forensics Specialization may consider careers such as a Computer Digital Forensic Investigator†, †† and a Computer Programmer.

Applicants for jobs in the justice administration field may be subject to pre-employment screenings such as, but not limited to, criminal background checks, drug and/or alcohol testing, physical and/or psychological examinations and credit checks. Unsatisfactory screening results may disqualify an applicant for a position in the justice administration field. Additional government-required training programs may be necessary to obtain employment in this field.
††Employment in this occupation may require years of relevant experience.

What is Computer Forensics?

Computer forensics is the practice of recovering data from a device, often for the purpose of uncovering evidence of criminal activity. The practice itself is reactionary, meaning that it only takes place after an incident has occurred and is not concerned with preventing the incident itself.

Computer forensics jobs typically serve one of two purposes. They either assist with an investigation or help people and companies recover data that has been lost. In the first instance, a computer forensics specialist will be given access to a suspect's personal device, such as a laptop, desktop or smartphone. Once they have the device, they begin using a variety of skills, such as programming, hardware knowledge and software knowledge, to locate important data. In a law enforcement case, they will ideally uncover data that is of value to the prosecution and can be presented in a court of law. In order to do this, the data must be recovered in a very particular manner that does not violate the suspect's rights.

Academic Catalog
2023 - 2024 Academic Catalog
Program Guides
Program Overview

1As part of this program, one complimentary laptop is provided to students enrolled in the Associate in Cybersecurity and Networking, Associate in Information Technology and Networking, Associate in Engineering Technology, Bachelor’s in Computer Information Systems, Bachelor’s in Information Technology and Networking, Bachelor’s in Cybersecurity and Networking, Bachelor’s in Software Development, Bachelor’s in Engineering Technology.
2Future programmatic changes could impact the ability to earn additional credentials en route to an eligible degree program. Refer to the academic catalog for details.
3Students enrolled at a New Jersey location take ENGL108 in lieu of this course.
4Students enrolled at a Nevada location must take POLI332 in lieu of this requirement.
5Students who complete CARD415 instead of CARD405 apply CARD415 to fulfill this requirement.