Online Certificate of Advanced Studies in Computer Forensics: Career Outlook

Gain a unique skill set in the growing field of computer forensics.

With security breaches on the rise, companies need skilled computer forensic examiners, and Utica College's online Advanced Studies certificate in Computer Forensics prepares you to meet that need.

  • $95,510 average salary for information security professionals1
  • 28% employment growth projected from 2016 to 2026, much faster than the national average1
  • 30% of those with a CHFI certification have 1–4 years of experience2

The Computer Forensics Certificate also helps you prepare to take the EC-Council Certified Hacking Forensic Investigator (CHFI) certificate, a sought-after credential that opens up even more employment opportunities across major industries.

This certificate is composed of six three-credit courses and students are expected to take one class every eight weeks.

Career Opportunities

Graduates from this certificate have gone on to work in positions like these:

  • Information Security Analyst: Provide and implement security solutions that maximize productivity for organizations while following strict privacy policies. Main duties include research, collecting data, and developing security strategies.
  • Penetration Tester: Use a wide variety of tools to probe and find vulnerabilities in an organization's network. Seek out and fix passive threats to network integrity, such as poor password policies and user security practices.
  • Forensic Computer Analyst: Process large amounts of data and analyze computer-based information for forensic evidence. Some tasks may include handling computer hard drives and storage devices to analyze user patterns, using different computer programs to recover information from destroyed media devices, and more.

 
Request More Information

We'd love to get to know you and hear more about your educational and professional goals. If you'd like to learn more about one of our programs, fill out this form and we'll be in touch:

          I consent to receiving SMS/MMS messages generated by an autodialer from Utica College or its representatives at the mobile number I provided. Consent is not required to receive information. Message & data rates may apply. Send STOP to 35254 to unsubscribe. Send HELP to 35254 for help. Click here for Terms & Conditions and Privacy Policy
          Yes! I'd like to schedule an appointment with an admissions counselor.If this option is not selected, an admission specialist will still contact you at a time of their choosing.
          CAPTCHA
          This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.

          Learning Outcomes

          • Use computer forensics tools and techniques to solve issues related to malicious cyber incidents

          • Apply network forensics tools and techniques to complex, network-related cyber incidents and scenarios

          • Examine the role that data hiding, steganography and anonymity play in computer and network-related investigations

          • Analyze the role that malware plays in investigating computer and network-related investigations

          • Understand the legal, social, and ethical constraints associated with a computer and network forensics investigation

          Continue Your Education

          When you're ready to advance your education, you can seamlessly transfer equivalent courses from this certificate into this degree:

          Note that not all of your credit hours may transfer into this degree. You must obtain permission from the program director.

          Beyond the Degree

          We have the tools to help you make your next career move:

          One-on-One Mentors

          Work with your program director and professors for professional mentorship and support.

          Job Search Assistance

          Build your résumé, do mock interviews, and find new opportunities in your area.

          Career Counseling

          Have our experts review your résumé and LinkedIn and learn to stand out from the crowd.

          UC Career Connect

          Register for events, create a visual profile for employers, and apply for jobs and internships through our online portal.

          SOURCES:

          1Bureau of Labor Statistics, U.S. Department of Labor (May 2017). Occupational Outlook Handbook, "Information Security Analysts." Retrieved on December 6, 2018, from https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm.
          2PayScale (2018). "Computer Hacking Forensic Investigator (CHFI) Salary." Retrieved on December 6, 2018, from https://www.payscale.com/research/US/Certification=Computer_Hacking_Forensic_Investigator_%28CHFI%29/Salary.