This program is eligible for free tuition

This program is designed to fill a critical and growing need for cyber security personnel in the public and private sector. Upon completion, you will be capable of investigating computer crimes, properly seizing and recovering computer evidence, and aiding in the prosecution of cyber criminals.

Skills learned enable you to investigate computer crimes, develop security best practices, and secure network infrastructure.

To combat computer related crime, you will also understand counter measures against hacking, spam, and computer viruses through network intrusion detection and evidence gathering. The work of cyber crime investigators often aids in criminal investigations, supports lawsuits, and prevents future attacks.

Courses help individuals develop an understanding of identity theft, networking, incident response, exploitation, social engineering, black hat/gray hat hacking, and network security. Counter measures against hacking, spam, and computer viruses through cyber sleuthing and evidence gathering are used to combat cyber crimes.

Careers in Cyber Security & Digital Crime can be found in local, regional, and national sectors such as governmental agencies, law enforcement and security, homeland security, law firms, businesses: human resources and information technologies, insurance agencies and companies, banks and credit card companies, health services, and educational systems.

Professional opportunities are plentiful in this innovative and expanding career.

Apply Now Visit Register

Transfer to a Four-Year School

If a bachelor's degree is your educational goal, getting a head start on your major has never been easier. You can apply the credits from this associate degree toward a bachelor's degree at a four-year college and university. To make the most of your time and money, tell your advisor about your transfer plans early in the admissions process.

Four-Year College Agreements

Career Options

Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.