Computer crime covers a wide area of illegal activities, including fraud, child pornography, terrorism, and espionage. With the Computer Forensics specialization of the MS in Cybersecurity, you'll learn forensic tools, analysis, and methods that are used to investigate network-based incidents, including unauthorized observation and manipulation of data, and the illegal use of digital devices.
The computer forensics curriculum covers:
- :: Methods and tools for detecting cyber intrusions and approaches to incident response
- :: Tracking of internet criminals and the recovery, analysis, and preservation of digital evidence and volatile data
- :: Forensic analysis of a networked computer system, including handheld telecommunications devices such as cell phones and PDAs
- :: Scientifically valid procedures for conducting computer and network forensics investigations, including international, jurisdictional, and privacy issues
The Federal Bureau of Investigation (FBI) reported that its Internet Computer Crime Complaint Center (IC3) received reports of more than $800 Million in losses for 2014. Furthermore, only an estimated 10% of the nation’s fraud victims report their crimes to the IC3, so the total annual impact of internet crimes is likely in the billions1 Computer crimes cost corporations revenue, threaten national security, and cause harm to members of the public.
Where Can Computer Forensic Investigators Specialize?
Graduates of Utica College’s MS in Cybersecurity that specialize in Computer Forensics work in the field in a panoply of roles, industries and specialties. As an expert in computer forensics, you could follow a career path investigating:
- :: Auto fraud scams
- :: Government impersonation email scams
- :: Real estate fraud
- :: Tax evasion
- :: Virtual crypto-currency schemes like fraudulent Bitcoin scams
- :: Human sex trafficking
- :: Child pornography
- :: Confidence fraud/romance scams such as catfishing
- :: Compromised business email
- :: Organized crime
- :: Intimidation/extortion including payday loan schemes
- :: Drug smuggling
- :: Terrorism
- :: Violent crimes
- :: Social media crimes including click-jacking, doxing and pharming
Five Computer Forensics Certifications to Elevate Your Career
The curriculum of the MS in Cybersecurity and the Computer Forensics specialization will prepare you with the foundational, comprehensive knowledge that serves as a launchpad for additional study and exam preparation, should you decide to pursue any of the following industry certifications.
Computer Forensic Computer Examiner – CFCE
IACIS – International Association of Computer Investigative Specialists
Certified Computer Examiner – CCE
ISFCE - International Society of Forensic Computer Examiners
GIAC Certified Forensic Examiner or Analyst – GCFE or GCFA
GIAC - Global Information Assurance Certification
Computer Hacking Forensic Investigator V8 – CHFI
EC-Council - International Council of E-Commerce Consultants
Professional Certified Investigator – PCI
Answer the call to become a computer forensics professional and be a part of the solution to this growing issue with the Computer Forensics specialization of the Master's in Cybersecurity degree at Utica College: Request more information or call us today at 315.732.2640 or toll-free 866.295.3106.
2 Salary information from Payscale.com. Job growth data for 2012-2022 from the Bureau of Labor Statistics. Best cities, based on number of job listings, from Indeed.com.