Program Overview

Do you want to help companies protect their precious information assets? Or, assist law enforcement agencies in the fight against cyber terrorism and crimes?

Gainful Employment Disclosure

Gainful employment programs are those "that prepare students for gainful employment in a recognized occupation." Public institutions are required to report this information for all undergraduate and graduate programs that are Title IV eligible and that lead to certificates, diplomas, graduate certificates or specialist awards. Degree programs at all levels are not considered to be gainful employment programs.

Gainful Employment Disclosure button

Declare Your Program

After you are admitted to the university as an undergraduate student, you also need to be accepted to a specific major/program.

Declare Your Program Button

Requirements

Courses required for your specific program are listed in the right column on this page. They include prerequisite, foundation, core and elective courses. Contact your advisor with questions concerning your degree plan.

To be eligible for acceptance to the Computer Forensics Certificate program, students must submit a College of Sciences Undergraduate Program Declaration Form when the following is completed:

  • Bachelor's degree in any discipline from a regionally accredited college/university with a GPA of 2.5 or better or with the ICS department consent

The computer forensics certificate is a 22-24 credit program that is designed for students who have already earned a bachelor's degree and would like to re-shape their skills and knowledge in the field of computer forensics. Students without a bachelor's degree are not eligible for pursuing this certificate.

Course Overlapping

Students are allowed to have up to 8 credits overlapped with their current or previously completed majors or minors. If students have more than 8 credits overlapped, they are required to take additional coordinator-approved courses to cover the difference.

How Admissions Works

We are looking forward to you joining us. Take the first step by filling out this application.
Course List

Prerequisites

Requirements ( 22-24 total credits)

Computer Forensics Cert Core Courses

  • CFS 262 Computer and Operating Systems Fundamentals I
    4 credits

    This course covers the fundamental concepts of a single user operating system. The topics discussed in the course are the basic concepts of computer organization and architecture, memory management, process handling, disk and file management and control, and peripherals operation. Students also have the opportunities to learn the techniques and procedures of system installation, configuration, administration, and trouble shooting. The operating systems illustrated in the course are MS Windows and/or Mac OS X.

    Course Outline Class Schedule <<<<<<< HEAD ======= >>>>>>> 35179410ff55d83bece68cc1d84aadaa0fa744b8
  • CFS 264 Computer and Operating Systems Fundamentals II
    4 credits

    This course covers the fundamental concepts of a multi-user operating system. The topics discussed in the course are conventional computer organization and architecture, memory management, process handling, disk and file management and control, and peripherals operation. Students also have the opportunities to learn the techniques and procedures of system installation, configuration, administration, and trouble shooting. The operating systems illustrated in the course are Linux and Unix.

    Course Outline Class Schedule <<<<<<< HEAD ======= >>>>>>> 35179410ff55d83bece68cc1d84aadaa0fa744b8
  • CFS 280 Introduction to Computer Forensics
    4 credits

    In this course, students learn the fundamental principles and concepts in computer forensics. The topics include the classification of the digital evidence, the procedure of discovering and preserving evidence, types of computer and Internet crimes, and analysis of computer crime statistics and demographics. Students also learn how to search and retrieve information to find the evidence using some common tools. Related legal procedures, regulations, and laws are also discussed briefly.

    Course Outline Class Schedule <<<<<<< HEAD ======= >>>>>>> 35179410ff55d83bece68cc1d84aadaa0fa744b8
  • ICS 140 Computational Thinking with Programming
    4 credits

    An introduction to the formulation of problems and developing and implementing solutions for them using a computer. Students analyze user requirements, design algorithms to solve them and translate these designs to computer programs. The course also provides an overview of major areas within the computing field. Topics include algorithm design, performance metrics, programming languages and paradigms, programming structures, number representation, Boolean algebra, computer system organization, data communications and networks, operating systems, compilers and interpreters, cloud computing, data analytics, mobile computing, internet of things, and artificial intelligence) database, internet, security, privacy, ethics, and other societal and legal issues. Lab work and homework assignments involving flow charting tools and programming using a language such as Python form an integral part of the course.

    Course Outline Class Schedule <<<<<<< HEAD ======= >>>>>>> 35179410ff55d83bece68cc1d84aadaa0fa744b8

Computer Forensics Cert Elective Courses 1

  • One of the following classes is required:
    • BLAW 320 Legal Environment of Organizations
      4 credits

      The behavior of organizations and people in organizations is influenced in a variety of ways by the Constitution, state and federal legislation, regulations by all levels of government, by judicial opinions and by ethical considerations. This course explores selected aspects of the legal environment, including antitrust and fair trade laws, the law of contracts, laws and regulations concerning the workplace and workplace behavior, environmental protections, and ethical standards. Issues relating to franchising and trading in securities are also addressed within the context of the law and ethics.

      Course Outline Class Schedule <<<<<<< HEAD ======= >>>>>>> 35179410ff55d83bece68cc1d84aadaa0fa744b8
    • CFS 484 Computer Laws
      4 credits

      In this course, students will learn the law relating to computer software, hardware, and the Internet. The areas of the law include intellectual property, cyberspace privacy, copyright, software licensing, hardware patent, and antitrust laws. Legislation and public policies on cyberspace technology, cryptographic method export controls, essential infrastructure protection and economic development are also discussed in class.

      Course Outline Class Schedule <<<<<<< HEAD ======= >>>>>>> 35179410ff55d83bece68cc1d84aadaa0fa744b8
    • CJS 210 Constitutional Law
      3 credits

      This course provides an overview and critical examination of constitutional law as it relates to criminal justice issues. A historical overview of the U.S. Constitution is covered along with how the Constitution works in the legal system including the role of the Supreme Court and constitutional interpretation. The first, fourth, fifth, sixth, eighth, and fourteenth amendments are emphasized. The course also examines how the Constitution protects the rights of those charged as well as the rights of law-abiding citizens.

      Course Outline Class Schedule <<<<<<< HEAD ======= >>>>>>> 35179410ff55d83bece68cc1d84aadaa0fa744b8
    • POL 331 Law and the Legal Process
      4 credits

      This course begins to examine law, both what it is and how it is practiced. The course focuses on the limits of law, the practice of law, and the strengths and weaknesses of the U.S. legal system. Students analyze these issues in the context of current controversial legal disputes.

      Course Outline Class Schedule <<<<<<< HEAD ======= >>>>>>> 35179410ff55d83bece68cc1d84aadaa0fa744b8

Computer Forensics Cert Elective Courses 2

  • One of the following classes is required:
    • CFS 380 Digital Evidence Analysis
      4 credits

      In this course, students continue not only to learn how to identify and collect digital evidence through forensics search tools, but also to study the emerging data mining techniques. The topics include how to design a plan for a computer crime investigation; how to select a computer software tool to perform the investigation; how to articulate the laws applying to the appropriation of computers for forensics analysis; how to verify the integrity of the evidence being obtained; how to prepare the evidence collected for the use in the court; and how to present the evidence as an expert eyewitness in court. Some hypothetical and real cases are also discussed in class.

      Course Outline Class Schedule <<<<<<< HEAD ======= >>>>>>> 35179410ff55d83bece68cc1d84aadaa0fa744b8
    • CJS 367 Exploring Forensic Science
      0 credits

      This course will provide the student with a general overview and a better understanding of the wide range of disciplines found within the forensic sciences. Fundamental topics such as forensic anthropology, forensic entomology, forensic pathology, and forensic accounting will be discussed. In addition 'traditionally' recognized topics in forensic science such as DNA, Trace Evidence, Impression Evidence, Drugs, and Questioned Documents will be covered. The course instructor will utilize multi-media in a lecture format, utilizing case-studies, video supplements and expert guest speakers.

      Course Outline Class Schedule <<<<<<< HEAD ======= >>>>>>> 35179410ff55d83bece68cc1d84aadaa0fa744b8
    • CJS 387 White Collar Crime
      4 credits

      This course presents an overview of white collar crime. Students explore theories of white collar crime and corporate criminal liability. The investigation, prosecution and sentencing of white-collar offenders are examined. "Crime in the suites" is compared to "crime in the streets." Issues related to diversity are explored.

      Course Outline Class Schedule <<<<<<< HEAD ======= >>>>>>> 35179410ff55d83bece68cc1d84aadaa0fa744b8