UNDERGRADUATE CERTIFICATE IN CYBERCRIME INVESTIGATION
Total Credit Hours: 15
Program Length: As little as 8 months
The Cybercrime Investigation Certificate provides individuals a bridge between criminal justice foundational knowledge and the growing law enforcement and business challenges of cybercrime. Learners in the cybercrime Investigation certificate have an opportunity to learn about the investigative challenges and societal impact of cybercrime, criminal investigative methods, legal and regulatory issues, and how the wide-ranging scope of threats manifests themselves across cyberspace. Learners will also analyze mitigation measures from an enterprise level perspective. Our program is aligned with academic and industry wide technical competencies illustrated in American Society for Industrial Security (ASIS’s) Enterprise Security Model.
- Complete in as little as 8 months
- No prerequisites
- Transfer credits toward any bachelor’s degree at SC
- Program aligned with ASIS’s Enterprise Security Model
Recently ranked as one of the Top Accredited Online Colleges, Southwestern College offers quality online degrees to adult learners. With courses taught by expert faculty and access to a variety of student resources, SC learners are provided with the tools and flexibility needed to succeed in their education while preparing for professional advancement.
Anyone interested in completing the Certificate in Cyber Crime Investigation may complete a Southwestern College Professional Studies Application for Admission. The five courses comprising the Cyber Crime Investigation Certificate can be completed in eight months or less and there are no prerequisites.
Individuals completing the Cyber Crime Investigation Certificate at Southwestern College may apply these 15 multi-discipline credit hours toward any bachelor’s degree offered by Southwestern College Professional Studies as either a major requirement or an elective.
The Cyber Crime Investigation Certificate is offered in an online format. Courses are delivered in six-week sessions to allow maximum flexibility for busy professionals.
CORE MAJOR REQUIREMENTS
SMGT341: Principles of Information Security
This course introduces learners to the fundamentals of information security management to prepare them to be able to plan, implement, and maintain the information security function within an organization. Learners will examine the technical components of information security and security planning, legal and ethical issues, and impact of emerging issues surrounding information security. They will explore various strategies to identify, assess, and mitigate information security risks within an organization. Learners will also be introduced to security technology, intrusion detection, cryptography, and physical security.
CJUS362: Criminal Investigations
This course surveys the principles, practices, concepts, and theories applicable to the investigation procedures of law enforcement agents and agencies. Learners will assess the skills necessary for the effective conduct and management of criminal investigations, not limited to, but including techniques for collecting, preserving, and evaluating physical evidence. Learners will examine evidence collection relying on interviews and interrogation techniques with a focus on ethical standards and the admissibility of evidence. Learners will also review case law, legal standards and procedures associated with criminal investigations and examine the range of evidence that can be collected and admitted in federal and state criminal courts. Finally, learners will examine the elements of successful courtroom demeanor and testimony and techniques for effective prosecution of criminal cases.
In today’s technology centered society and business environment cybercrime is a major concern. This course introduces learners to the many different types of cybercrime and the challenges facing the criminal justice system in the investigation and prosecution of such. Learners will analyze issues including, but not limited to hacking, digital forensics, cyber security policy and legal principles, fraud, and internet schemes, and cyber-bullying. Learners will also examine investigative techniques and mitigation strategies.
COT420: Enterprise Forensics
This course surveys the essentials of computer forensics methodology to manage civil, criminal, and administrative investigations. Learners will examine how computer forensics combines elements of computer science and law to collect data from various computer systems. Learners study tools and techniques of obtaining and analyzing digital evidence in legal cases in order to help prepare them to use those tools and techniques to investigate complex digital forensics cases.
ISM431: Enterprise Security
This course teaches learners how to apply an information security management plan to an organization’s enterprise systems. This includes the integration of physical and digital security technologies into an enterprise security system that meets the requirements of an organizational information security plan and its policies.