From mission-critical business systems to e-commerce and the Internet, IT is not only an industry in its own right, it’s a fundamental building block of all other industries. AIU offers an industry-current BSIT program with an in-depth specialization in Digital Investigations that’s designed to give students the real-world knowledge they need to get to the next level. Areas covered include examining techniques for collection, preservation, analysis and reporting of digital-network evidence.
The Bachelor of Science in Information Technology degree with a specialization in Digital Investigations is designed to provide students industry-relevant knowledge and experience in conducting investigations as a digital-crime professional.
We can help you learn how to:
- Summarize details of essential computer concepts
- Use an operating system interface to access, add, troubleshoot and configure hardware and manage files
- Implement a relational database management system utilizing the concepts of database design and data modeling
- Develop business applications using programming languages, tools and software development methodologies
- Collect and evaluate digital crime evidence while maintaining evidence integrity and usefulness by following proper procedures
By studying key topics in Digital Investigations, you have an opportunity to acquire fundamental understanding of digital and network investigations as you pursue your interest in opportunities involving the detection and prevention of computer crime.
At AIU, more of your program courses will be focused on this specialization than at other similar schools. For a Bachelor of Science in Information Technology degree with a specialization in Digital Investigations, your classes can include:
Introduction to Cyber Crime and Digital Investigations
This course provides students with an introduction to the concepts and systems involved in digital investigations and cyber crime. The course discusses recognized incident response policies and procedures for collecting, preserving, analyzing, and reporting digital evidence, cyber crime history, and current and future threats.
Digital Investigations I
This course will examine digital investigation tools, threats, and techniques. Topics may include procedures, steganography, operating systems, tool validation plans, and open source software.
Principles in Electronic Discovery
This course is designed to provide students with the essential information related to electronic discovery. Discussions will focus on organizational electronic discovery needs and how digital investigators can fulfill those needs. Topics may include finding data collection, media restoration, file and email conversion, keyword and metadata searching, filtering, and classification and presentation of data.
During this course, students will examine forensic techniques for collection, preservation, analysis, and reporting of digital network evidence. Topics may include network traffic analysis, electronic mail, and Internet investigations.
This course discusses advanced topics in digital forensics related to the globalization of electronic data. International organization regulations, language barrier, rogue providers, and other topics will be covered in this course.
Digital Investigations II
During this course, students will examine digital investigation techniques for applications running for network operating systems.
Applications of Discrete Mathematics and Statistics in IT
In this course, students will examine the essential mathematics and logic skills required in Information Technology areas such as networking, systems administration, security, programming, database management, and computer hardware. Students will build on their mathematical proficiency to prepare for the challenges they are likely to encounter as an IT professional. This course discusses the importance of discrete mathematics, probability and statistics in IT. Students in this course will further their understanding of discrete mathematics and statistics necessary for application development and systems analysis. Students will also learn how to apply statistical techniques to improve the performance of IT systems. Real-world scenarios and problems from the IT industry are included throughout this course.
System Architecture and Integration
In this course, students will analyze the system integration requirements and apply appropriate frameworks, methodologies, and techniques that are used to manage, administer, acquire, develop, implement, and integrate enterprise systems.
Comprehensive IT Project
In this lower division capstone course, students will examine IT project management and systems architecture. Topics covered include project management concepts of time, scope, and costs, as well as systems architecture, sourcing, acquisition, development, and deployment processes.
Information Technology Security
This survey course covers information security concepts and mechanisms. Information security concepts reviewed may include data protection techniques, software security, information assurance process, enterprise network security, and attack types/countermeasures.
Data Structures and Implementation
This course will introduce students to basic data structures and algorithms which are to be used as tools in designing solutions to real-life problems. Students will become familiar with the specification, usage, implementation and analysis of basic data structures and algorithms.
Program Capstone for IT
This course offers students the opportunity to demonstrate their level of understanding regarding the application of information technology concepts, technologies, and methodologies. Students are expected to employ their knowledge about hardware, systems, applications, and security management.
View the Course Catalog.
Course content subject to change.
Tuition and Fees
Don't let tuition worries stop you from pursuing a degree. AIU offers a variety of grants, scholarships, financial aid as well as straightforward pricing with no hidden costs to help make college more affordable for our students.
Tuition and Fees Schedule
Find more information on Tuition and Financial Aid for AIU Campuses and Military.
What is financial aid?
Financial aid is the name used for federal, state and private resources that may help pay for college costs. Typically financial aid consists of grants, scholarships, loans and student employment. At American InterContinental University, we strive to take as much stress out of the financial aid process as possible for our students.
How do I apply for financial aid?
The Free Application for Federal Student Aid, more commonly known as the FAFSA, is the single application needed to apply for all sources of federal aid. The FAFSA can be completed online at www.fafsa.ed.gov
Tuition and Financial Aid Resources
For more information on tuition and financial aid and how you can save money on tuition, click the links below:
Tuition and Financial Aid Guide: Find out how you can save money on tuition.
Transfer Credit Guide: You can transfer in up to 75% of your qualifying credits towards your degree.
Grants Guide: Find out if you qualify for one of AIU’s grants and scholarships.
Net Price Calculator: Get an estimate of your tuition and fees including financial aid, grants, scholarships, loans and military benefits.
What can you do with a bachelor’s degree in Digital Investigations?
Digital-investigations professionals work to keep identities safe and big databases of information from being hacked. They help companies ensure their secrets are safe from the competition, give everyday people the security to carry out the intimate details of their daily lives online, and allow governments the freedom to communicate with one another without the worry of disclosing sensitive information.
What Is Cyber Security Like On the Job?
Professionals in this field need to be able to handle fast-paced environments, manage surges in high-urgency and detailed work, and deal with potentially unpredictable working hours. They've got to stay on their toes, because it's a field in which anything can happen at any time.
On the job, cyber-security professionals spend their days digging deep to identify software and Internet vulnerabilities to stay ahead of hackers, preventing cyber crimes like bank fraud, designing secure software using code to fend off hacking attempts, and knowing the ins and outs of various computer systems to find more in-depth, defensive ways to protect digital assets and private information.
Though many offices have an open, informal atmosphere (far from the stiff-necked imagery often associated with IT security), even during slower times of work, cyber security professionals should be able to stay agile and on top of their game.
Roles in cyber security commonly include:
● Information-security analysis
● Web penetration testing
● Security engineering
● Security architecture
● Source-code auditing
● Security consulting