The Cybercrime Investigation Certificate provides individuals a bridge between criminal justice foundational knowledge and the growing law enforcement and business challenges of cybercrime. Learners in the cybercrime Investigation certificate have an opportunity to learn about the investigative challenges and societal impact of cybercrime, criminal investigative methods, legal and regulatory issues, and how the wide-ranging scope of threats manifests themselves across cyberspace. Learners will also analyze mitigation measures from an enterprise level perspective. Our program is aligned with academic and industry wide technical competencies illustrated in American Society for Industrial Security (ASIS’s) Enterprise Security Model.
Anyone interested in completing the Certificate in Cyber Crime Investigation may complete a Southwestern College Professional Studies Application for Admission. The five courses comprising the Cyber Crime Investigation Certificate can be completed in eight months or less and there are no prerequisites.
Individuals completing the Cyber Crime Investigation Certificate at Southwestern College may apply these 15 multi-discipline credit hours toward any bachelor’s degree offered by Southwestern College Professional Studies as either a major requirement or an elective.
The Cyber Crime Investigation Certificate is offered in an Online format. Courses are delivered in six-week sessions to allow maximum flexibility for busy professionals.
This course introduces learners to the fundamentals of information security management to prepare them to be able to plan, implement, and maintain the information security function within an organization. Learners will examine the technical components of information security and security planning, legal and ethical issues, and impact of emerging issues surrounding information security. They will explore various strategies to identify, assess, and mitigate information security risks within an organization. Learners will also be introduced to security technology, intrusion detection, cryptography, and physical security. Credit 3 hours.
This course surveys the principles, practices, concepts, and theories applicable to the investigation procedures of law enforcement agents and agencies. Learners will assess the skills necessary for the effective conduct and management of criminal investigations, not limited to, but including techniques for collecting, preserving, and evaluating physical evidence. Learners will examine evidence collection relying on interviews and interrogation techniques with a focus on ethical standards and the admissibility of evidence. Learners will also review case law, legal standards and procedures associated with criminal investigations and examine the range of evidence that can be collected and admitted in federal and state criminal courts. Finally, learners will examine the elements of successful courtroom demeanor and testimony and techniques for effective prosecution of criminal cases. Credit 3 hours.
In today’s technology centered society and business environment cybercrime is a major concern. This course introduces learners to the many different types of cybercrime and the challenges facing the criminal justice system in the investigation and prosecution of such. Learners will analyze issues including, but not limited to hacking, digital forensics, cyber security policy and legal principles, fraud, and internet schemes, and cyber-bullying. Learners will also examine investigative techniques and mitigation strategies. Credit 3 hours.
This course surveys the essentials of computer forensics methodology to manage civil, criminal, and administrative investigations. Learners will examine how computer forensics combines elements of computer science and law to collect data from various computer systems. Learners study tools and techniques of obtaining and analyzing digital evidence in legal cases in order to help prepare them to use those tools and techniques to investigate complex digital forensics cases. Credt 3 hours.
This course teaches learners how to apply an information security management plan to an organization’s enterprise systems. This includes the integration of physical and digital security technologies into an enterprise security system that meets the requirements of an organizational information security plan and its policies. Credit 3 hours.