Cyber/Computer Forensics and Counterterrorism

Stan T.Leave a Comment

About this program

A program focusing on the principles and techniques used to identify, search, seize and analyze digital media and to conduct cyber investigations against criminal and terrorist activity. Includes instruction in computer boot processes and drives, jumper setting, file access and reconstruction, hacking, network systems, cryptography, programming, investigative techniques, forensic imagery, web-based investigation methods, cyberterrorism, and applicable laws and administrative procedures.

Career Opportunities

Private Detectives and Investigators

Daniel J. McBride from American Eagle Investigations
1 reviews
gather, analyze, compile, and report information regarding individuals or organizations to clients, or detect occurrences of unlawful acts or infractions of rules in private establishment.
$60100
Bachelor's degree
Strong job growth
High job satisfaction
Personality Match

Police Detectives

conduct investigations to prevent crimes or solve criminal cases.
$89300
No degree required
High job satisfaction
Personality Match

Interest Match

Criminal Justice Professors

teach courses in criminal justice, corrections, and law enforcement administration. Includes both teachers primarily engaged in teaching and those who do a combination of teaching and research.
$74740
Master's degree
Strong job growth
High job satisfaction
Personality Match

Interest Match


IT Analysts

1 reviews
plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.
$107580
Bachelor's degree
Strong job growth
High job satisfaction
Personality Match

Interest Match


Related Majors

Critical Infrastructure Protection

A program focusing on the design, planning and management of systems and procedures for protecting critical national physical and cyber infrastructure from external threats, including terrorism. Includes instruction in homeland security policy, critical infrastructure policy, information security, matrix vulnerability assessment, threat assessment, physical security, personnel security, operational security, contingency planning, case analyses of specific industries and systems, redundancy planning, emergency and disaster planning, security systems, and intelligence operations.

Terrorism and Counterterrorism Operations

A program focusing on the study of terrorism as a global and national threat and the methods for analyzing and countering it. Includes instruction in psychology, cultural studies, terrorist history and organization, terrorist capabilities, terrorist finance and international money-laundering, threat assessment, intelligence operations, incident command systems, border security, emergency response, joint operations, surveillance and communications systems, cyberterrorism, weapons of mass destruction, counterterrorist operations, and applications to specific terrorist organizations and threats.


Security Science and Technology

A program of study that focuses on the general application of science and technology to security.

Criminalistics and Criminal Science

A program that focuses on the application of clinical and criminal laboratory science, investigative techniques, and criminology to the reconstruction of crimes and the analysis of physical evidence. Includes instruction in laboratory science, laboratory procedures, criminology and police science, evidentiary testing and analysis, computer applications, record-keeping, reconstruction techniques, evidence handling and storage, and applications to specific types of evidence and crimes.

Cybersecurity Defense Strategy/Policy

A program that focuses on the study of strategy, policy, and standards regarding the security of and operations in cyberspace. Includes instruction in incident response, information assurance, recovery policies, vulnerability reduction, deterrence, threat reduction, and resiliency.


Financial Forensics and Fraud Investigation

A program focusing on the principles and techniques of conducting investigations into financial crime, terrorist activity, and the analysis and use of accounting data as evidence. Includes instruction in the principles of accounting, investigative auditing, computer investigations, accounting system documents and software, business corruption, criminal and terrorist financial networks, international money markets and movement, net worth analysis, financial fraud, exposing concealed assets, records seizure, fraud and money laundering statutes, fraud case initiation, case management, and case presentation.

Forensic Science and Technology

A program that focuses on the application of the physical, biomedical, and social sciences to the analysis and evaluation of physical evidence, human testimony and criminal suspects. Includes instruction in forensic medicine, forensic dentistry, anthropology, psychology, entomology, pathology, forensic laboratory technology and autopsy procedures, DNA and blood pattern analysis, crime scene analysis, crime scene photography, fingerprint technology, document analysis, witness and suspect examination procedures, applicable law and regulations, and professional standards and ethics.

Geospatial Intelligence

A program that prepares individuals to analyze security and intelligence problems using a geographic perspective by relating human actions to cultural, political, economic, social, and physical landscapes. Includes instruction in aerial photography analysis, cartography, geographic information systems (GIS), physical geography, remote sensing, spatial programming, and quantitative methods in geographic research.



Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.