Nov 08, 2024  
2024-2025 General Catalog [Current] 
    
2024-2025 General Catalog [Current]

Cybersecurity - Information Forensics (Certificate)

Location(s): Main Campus



Program Summary

Information Forensics training is an important tool for law enforcement, security professionals, and IT specialists. Training equips professionals with the knowledge and skills needed to identify and recover digital evidence. This may include deleted files and emails and must be done in a secure and legal manner. The purpose of Information Forensics is to identify and preserve the digital evidence in its most-pure form, to make it possible for relevant investigation procedures to be performed and conclusions made. For corporates and businesses, Information Forensics is a very important part related to the incident response process.

Program Information

  • All courses must be passed with a “C-” (1.7) or better to be counted in the certificate.
  • Credits older than 10 years must be approved by the CSCY Department Chair before being allowed to count towards the major due to the rapid change in the industry.

Certificate Completion

This certificate program must be completed in conjunction with a degree program. The certificate will be awarded at the same time as the degree program and cannot be earned independently of a degree.

Total Credits, Certificate: 18


Program Learning Outcomes


Upon successful completion of the program, students should be able to:

  • Conduct digital investigations that conform to accepted professional standards and are based on the investigative process: identification, preservation, examination, analysis, reporting, and ethical standards.
  • Identify and document potential security breaches of computer data that suggest violations of legal, ethical, moral, policy, and/or societal standards.
  • Work collaboratively with clients, management, and/or law enforcement to advance digital investigations or protect the security of digital resources.
  • Communicate effectively the results of a computer, network, and/or data forensic analysis verbally, in writing, and in presentations to both technical and lay audiences.