Cybersecurity & Computer Forensics

Increased cybersecurity threats and new homeland security policies have produced a growing national demand for cyber-security professionals with knowledge of cybersecurity, ethical hacking, intrusion testing, vulnerability assessment, and computer forensics. In addition, the growth of universal and mobile computing requires new approaches to information security and the protection of information systems from unauthorized access, modification, or destruction. The Cybersecurity and Computer Forensics program prepares students for entry level employment in cybersecurity and information security careers including cyber incident and response, vulnerability detection and assessment analyst, information security analyst, computer forensic analyst, and computer forensics investigator. Foundation courses introduce students to the legal, ethical, and theoretical issues in cybersecurity and computer forensics technology. Core courses expand student depth and skills in ethical hacking, criminal justice, evidentiary analysis, and the development of a forensically sound environment. Capstone courses provide practicum experience and opportunity to participate in the Collegiate Cyber Defense Competition (CCDC).

Successful completion of this program leads to an Associate of Applied Science degree in Cybersecurity and Computer Forensics. Students are required to have access to computer, internet, and browser. This degree can be completed online.

Degree & Certificate Options

  • Cybersecurity and Computer Forensics AAS Degree
  • Cybersecurity and Computer Forensics AAS-T Degree

Short-Term Proficiency Certificate

  • Cybersecurity and Computer Forensics Certificate

Student Learning Outcomes

Upon completion of this program, students will be able to:

  • Demonstrate an understanding of the core concepts, tools, and methods used to secure computer systems
  • Identify and present indicators that a cybersecurity incident has occurred
  • Apply criminal justice methods to cybersecurity and computer forensic investigations
  • Plan, implement, and evaluate penetration testing and ethical hacking of computer systems
  • Identify, analyze, and mitigate threats to internal computer systems
  • Collect, process, analyze, and present computer forensic evidence
  • Work in teams to analyze and resolve cybersecurity issues
  • Apply critical thinking skills to risk analysis of computer systems




Professional Technical Program