Degree Accreditation

The BS Cyber Forensics and Information Security degree program is accredited by the Computing Accreditation Commission of ABET,


As new technological innovations continue to proliferate in our society, so do the opportunities for technology exploitation. Once a mere nuisance, hackers now threaten private citizens, businesses, and government agencies. 

Government and law enforcement agencies need skilled professionals who can join the fight against cyber crime, cyber terrorism, identity theft, and the exploitation of minors. Companies and other private sector organizations need skilled professionals with both business acumen and technology skills for recognizing and mitigating vulnerabilities. 

The Cyber Forensics and Information Security online degree program combines the disciplines of technology, business, organizational behavior, and law. Students learn techniques used to detect, respond to, and prevent network intrusions. They also master broader concepts such as the responsible use of resources, the appropriate management of risks, and the alignment of information technology with the organization.

Program Educational Objectives

Five years after graduation the graduates should be:
  1. Contributing to the work force in their specialty such as but not limited to computer forensics, mobile security, network security, software security, database security, or information security.
  2. Advancing their careers via continuous learning and professional development through the attainment of professional certification, professional study and research or graduate education.
  3. Assuming positions of leadership within their organization.
  4. Contributing to economic development and society through the prevention and detection of cyber threats in the computer-based information systems for business, government, and other organizations.

Program Outcomes

At the time of graduation, the graduate should have:

  1. An ability to design, implement and evaluate a computer-based information system, process, component, or program to meet desired business or organizational specifications.
  2. An ability to apply knowledge of information systems, programming and mathematics appropriate to the discipline.
  3. An ability to demonstrate sufficient background knowledge in Operating Systems, Networking, Data Communication, Database Technology, Information Systems Planning, and Project Management.
  4. An ability to analyze an information systems problem, define performance specifications to solve the problem and identify feasible solutions while recognizing the local and global impact of computing on individuals, organizations and society.
  5. An ability to function effectively on teams and to be able to communicate effectively with a range of audiences.
  6. An ability to use current techniques, skills, and tools necessary for information systems practices by recognizing the need for, and the ability to engage in, continuing professional development.
  7. An ability to understand professional, ethical, legal, security and social issues and responsibilities.
  8. An ability to demonstrate the use of various computer forensic software tools and techniques as well as follow proper legal procedures for obtaining, analyzing, and reporting digital forensic evidence.
  9. An ability to properly report the findings of a cyber forensic investigation in both written form (using proper grammar, writing style, and citation) and in oral form (i.e., within the context of a trial, hearing, or deposition).
  10. An ability to Identify and analyze legal issues within technology, such as:  on-line contracts, computer crime, fraud, privacy, defamation, hate speech, indecency, obscenity, cyber- squatting, and intellectual property.
  11. An ability to demonstrate various techniques for preventing unauthorized attacks to computer networks and apply measures for minimizing the damage caused by network intruders.
  12. An ability to evaluate and implement the needed information security controls for any information system and to provide an assurance framework where the security processes or controls, or both, are embedded in information systems technologies.
  13. An ability to evaluate and implement an I/T Governance Framework Taxonomy such as COBIT (Control Objectives for Information and Related Technology) to provide the student with an integrated theoretical and practical perspective of technology and information systems governance, control and assurance.
  14. An ability to examine the contents of mobile devices such as a cell phone, smart phone or GPS, and also be able to determine the necessary protocols which are necessary to handle external media and devices that may have connected with handheld devices.

Enrollment and Graduates for Totally online program

Spring Term Enrollment

2016 -- 30 Students Enrolled, 5 Graduates
2017 -- 37 Students Enrolled, 4 Graduates