About this program
A program that prepares individuals to analyze security and intelligence problems using a geographic perspective by relating human actions to cultural, political, economic, social, and physical landscapes. Includes instruction in aerial photography analysis, cartography, geographic information systems (GIS), physical geography, remote sensing, spatial programming, and quantitative methods in geographic research.
Career Opportunities
Police Detectives
conduct investigations to prevent crimes or solve criminal cases.
$89300
No degree required
High job satisfaction
Police and Detectives Supervisors
directly supervise and coordinate activities of members of police force.
$97180
No degree required
High job satisfaction
Personality Match
Criminal Justice Professors
teach courses in criminal justice, corrections, and law enforcement administration. Includes both teachers primarily engaged in teaching and those who do a combination of teaching and research.
$74740
Master's degree
Strong job growth
High job satisfaction
Geography Professors
teach courses in geography. Includes both teachers primarily engaged in teaching and those who do a combination of teaching and research.
$87160
Doctoral degree
Strong job growth
High job satisfaction
Geographers
study the nature and use of areas of the Earth's surface, relating and interpreting interactions of physical and cultural phenomena. Conduct research on physical aspects of a region, including land forms, climates, soils, plants, and animals, and conduct research on the spatial implications of human activities within a given area, including social characteristics, economic activities, and political organization, as well as researching interdependence between regions at scales ranging from local to global.
$85620
Bachelor's degree
Strong job growth
Cartographers and Photogrammetrists
research, study, and prepare maps and other spatial data in digital or graphic form for one or more purposes, such as legal, social, political, educational, and design purposes. May work with Geographic Information Systems (GIS). May design and evaluate algorithms, data structures, and user interfaces for GIS and mapping systems. May collect, analyze, and interpret geographic information provided by geodetic surveys, aerial photographs, and satellite data.
$72420
Post-secondary certificate
Strong job growth
High job satisfaction
Related Majors
Homeland Security
A program focusing on security policy, planning and operations dedicated to the protection of U.S. territory, assets, infrastructure, institutions and citizens from external threats. Includes instruction in national security policy, government relations, intelligence, law enforcement, security technology, communications and information technology, homeland security planning and operations, disaster planning and applications to specific threat scenarios.
Crisis/Emergency/Disaster Management
A program focusing on the application of the incident command system model to formulating and implementing effective response to natural and man-made disasters. Includes instruction in contingency planning, hazard and risk assessment, joint operations, law and ethics, emergency response and recovery, event mitigation, emergency rescue and medical operations, incident command, terrorism and national security issues, law enforcement, relief administration, volunteer and citizen coordination, public relations and applications to specific types of incidents.
Critical Infrastructure Protection
A program focusing on the design, planning and management of systems and procedures for protecting critical national physical and cyber infrastructure from external threats, including terrorism. Includes instruction in homeland security policy, critical infrastructure policy, information security, matrix vulnerability assessment, threat assessment, physical security, personnel security, operational security, contingency planning, case analyses of specific industries and systems, redundancy planning, emergency and disaster planning, security systems, and intelligence operations.
Terrorism and Counterterrorism Operations
A program focusing on the study of terrorism as a global and national threat and the methods for analyzing and countering it. Includes instruction in psychology, cultural studies, terrorist history and organization, terrorist capabilities, terrorist finance and international money-laundering, threat assessment, intelligence operations, incident command systems, border security, emergency response, joint operations, surveillance and communications systems, cyberterrorism, weapons of mass destruction, counterterrorist operations, and applications to specific terrorist organizations and threats.
Security Science and Technology
A program of study that focuses on the general application of science and technology to security.
Criminalistics and Criminal Science
A program that focuses on the application of clinical and criminal laboratory science, investigative techniques, and criminology to the reconstruction of crimes and the analysis of physical evidence. Includes instruction in laboratory science, laboratory procedures, criminology and police science, evidentiary testing and analysis, computer applications, record-keeping, reconstruction techniques, evidence handling and storage, and applications to specific types of evidence and crimes.
Cyber/Computer Forensics and Counterterrorism
A program focusing on the principles and techniques used to identify, search, seize and analyze digital media and to conduct cyber investigations against criminal and terrorist activity. Includes instruction in computer boot processes and drives, jumper setting, file access and reconstruction, hacking, network systems, cryptography, programming, investigative techniques, forensic imagery, web-based investigation methods, cyberterrorism, and applicable laws and administrative procedures.
Cybersecurity Defense Strategy/Policy
A program that focuses on the study of strategy, policy, and standards regarding the security of and operations in cyberspace. Includes instruction in incident response, information assurance, recovery policies, vulnerability reduction, deterrence, threat reduction, and resiliency.

.jpg)
.jpg)
.jpg)
.jpg)
.jpg)
.jpg)