Bachelor of Science in Information Technology (BSIT) Degree with a Concentration in Digital Investigations

Computer Forensics Degree Online

Organizations rely on skilled information technology professionals who can combat the growing threat of web-based crime. Study how to develop essential IT skills through our Computer Forensics Degree online with special emphasis on Cybersecurity systems, digital laws and their enforcement.

Next Start Date:
January 10, 2024
Total Credits:
Online, Atlanta, Houston
Estimate tuition and fees with our Tuition and Graduation Calculator

Computer Forensics Degree Online Program Details

Computer Forensics Degree Online Program Outline

From mission-critical business systems to e-commerce and the Internet, IT is not only an industry in its own right, it’s a fundamental building block of all other industries. AIU offers an industry-relevant Computer Forensics Degree Online program that’s designed to provide students with the opportunity to develop real-world knowledge to help prepare for the next step. Areas covered include examining techniques for collection, preservation, analysis and reporting of digital-network evidence.

The Bachelor of Science in Information Technology degree with a concentration in Digital Investigations is designed to provide students industry-relevant knowledge and experience in conducting investigations as a digital-crime professional.

Digital Investigations programs can help you learn how to:

  • Summarize details of essential computer concepts
  • Use an operating system interface to access, add, troubleshoot and configure hardware and manage files
  • Implement a relational database management system utilizing the concepts of database design and data modeling
  • Develop business applications using programming languages, tools and software development methodologies
  • Collect and evaluate digital crime evidence while maintaining evidence integrity and usefulness by following proper procedures

Download program detail PDF

Earn an IT Certificate Alongside Your BSIT Degree

As you work to complete your BSIT degree with a Concentration in Digital Investigations, you may opt to earn an Information Technology Certificate at no additional cost to you. These certificates are designed to coincide with students learning along their path towards degree completion.

After you have successfully passed or received transfer credit for the courses listed in your degree concentration, you will be able to obtain documentation of the certificate from AIU. You may even work with your academic advisor to change non-IT general electives to the IT courses that lead to a certificate—this means you can earn more than one certificate at a time!

Unlike certifications that are tied to industry exams, the certificates issued represent competency of learning from a member of an accredited university system.

What undergraduate-level certificates are available?

  • Digital Investigations Certificate
  • Information Assurance & Security Certificate
  • Network Administration Certificate
  • Software Analysis and Development Certificate

Estimate Tuition and Grad Date

Total tuition for this degree program may vary depending on your educational needs, existing experience, and other factors.

Estimate your costs, potential savings and graduation date.

Computer Forensics Degree Courses

Degree Requirements


General Education
ENGL106 English Composition I 4.5
ENGL107 English Composition II 4.5
MATH125 General College Mathematics 4.5
UNIV103 Academic and Professional Success 4.5
UNIV106 Technology and Information Literacy 4.5
UNIV109 Interpersonal Communication 4.5
Humanities (2 Courses) 9
Natural Sciences (2 Courses) 9
Social and Behavioral Sciences (2 courses) 9
General Education Elective (1 Course) 4.5
Total Credit Hours: 58.5
ITCO101 Discovering Information Technology 4.5
ITCO103 Introduction to Computer and Network Hardware 4.5
ITCO105 Information Technology and Society 4.5
ITCO107 Developing Professional Communications 4.5
ITCO211 Introduction to Operating Systems 4.5
ITCO221 Fundamentals of Programming and Logic 4.5
ITCO231 Introduction to Databases 4.5
ITCO251 Network Infrastructure Basics 4.5
ITCO299 Comprehensive IT Project 4.5
ITCO361 Information Technology Security 4.5
ITCO385 Introduction to Mobile Technologies and Internet of Things 4.5
ITCO391 Human/Computer Interfaces and Interactions 4.5
ITCO498 Program Capstone for IT 4.5
Total Credit Hours: 58.5
A combination of any 3 undergraduate Information Technology courses 0
and 0
A combination of any 7 undergraduate General Elective courses 0
Total Credit Hours: 45

Prerequisites must be met for selected electives.

Students enrolled in the general Information Technology track will select a total of 10 undergraduate General Elective courses, in lieu of a combination of General Elective and Information Technology Elective courses.

General Information Technology Track

In lieu of a Concentration, this generalist track allows students to select a combination of Information Technology Electives from any of the Concentrations below. Please contact your advisor to select or change your Electives, or to determine course eligibility.

Select 4 Information Technology Electives 0
Total Credit Hours: 18

Prerequisites must be met for selected electives.

Digital Investigations
ITDI372 Introduction to Cyber Crime and Digital Investigations 4.5
ITDI375 Digital Investigations I 4.5
ITDI379 Digital Investigations II 4.5
ITDI473 Network Investigations 4.5
Total Credit Hours: 18

Total Credit Hours : 180

This program includes a series of courses that correlate to the respective content and competencies of the A+, Network+, and Security+ certification exams offered by CompTIA¹ and the Certified Ethical Hacker certification exam offered by EC-Council¹. These credentials can serve as independent validation of the knowledge and skills required to be successful in the fields of information technology (IT) computer user support, IT security, and networking.


CompTIA A+ Certification1 CompTIA Network+ Certification1 CompTIA Security+ Certification1 EC-Council Certified Ethical Hacker1
ITCO 103 Introduction to Computer and Network Hardware ITCO 251 Network Infrastructure Basics ITCO 361 Information Technology Security ITAS 367 Principles and Methods in Cryptographic Security
ITCO 211 Introduction to Operating Systems ITNA 353 Routing and Switching ITAS 362 Introduction to Information Assurance and Information Security ITAS 465 Ethical Hacking and Penetration Testing
ITNA 355 Advanced Routing and Switching ITAS 363 Telecommunications and Network Infrastructure Security
ITNA 357 Network Security Management


AIU B.S.I.T. students will be eligible to receive a discounted rate for the CompTIA examination fee² once all of the respective courses above have been successfully completed in residence with the universityᶟ.

For more information on the A+, Network+, or Security+ certifications, including exam objectives, sample questions, and certification information, please visit

For more information on the Certified Ethical Hacker certification, including information about the exam, course outlines, and requirements, please visit

¹American InterContinental University does not prepare students to take the exam necessary to receive the A+, Network+, Security+, or Certified Ethical Hacker credential. AIU cannot guarantee that students or graduates of this program will be eligible to take third party certification examinations. Certification requirements for taking and passing these exams are controlled by outside entities and are subject to change without notice to AIU.

²Students must contact the office of the Registrar in order to receive the promo code for the discounted exam rate.

ᶟIn order to receive the discounted CompTIA exam rate, the listed courses must be completed in residence at American InterContinental University.

Computer Forensics Degree Classes Overview

By studying key topics in Digital Investigations, you have an opportunity to work to develop a fundamental understanding of digital and network investigations as you pursue your interest in opportunities involving the detection and prevention of computer crime.

For a Computer Forensics Degree Online, your classes may include:

Introduction to Cyber Crime and Digital Investigations

This course is designed to provide students with an introduction to the concepts and systems involved in digital investigations and cyber crime. The course explores recognized incident response policies and procedures for collecting, preserving, analyzing, and reporting digital evidence, cyber crime history, and current and future threats.

Digital Investigations I

This course will examine digital investigation tools, threats, and techniques. Topics may include procedures, steganography, operating systems, tool validation plans, and open source software.

Principles in Electronic Discovery

This course is designed to provide students with essential information related to electronic discovery. Discussions will focus on organizational electronic discovery needs and how digital investigators can fulfill those needs. Topics may include finding data collection, media restoration, file and email conversion, keyword and metadata searching, filtering, and classification and presentation of data.

Network Investigations

During this course, students will examine forensic techniques for collection, preservation, analysis, and reporting of digital network evidence. Topics may include network traffic analysis, electronic mail, and Internet investigations.

Global Investigations

This course discusses advanced topics in digital forensics related to the globalization of electronic data. International organization regulations, language barrier, rogue providers, and other topics will be covered in this course.

Digital Investigations II

During this course, students will examine digital investigation techniques for applications running for network operating systems.

System Architecture and Integration

In this course, students will analyze the system integration requirements and apply appropriate frameworks, methodologies, and techniques that are used to manage, administer, acquire, develop, implement, and integrate enterprise systems.

Comprehensive IT Project

In this lower division capstone course, students will examine IT project management and systems architecture. Topics covered include project management concepts of time, scope, and costs, as well as systems architecture, sourcing, acquisition, development, and deployment processes.

Information Technology Security

This survey course covers information security concepts and mechanisms. Information security concepts reviewed may include data protection techniques, software security, information assurance process, enterprise network security, and attack types/countermeasures.

Data Structures and Implementation

This course will introduce students to basic data structures and algorithms which are to be used as tools in designing solutions to real-life problems. Students will become familiar with the specification, usage, implementation and analysis of basic data structures and algorithms.

Program Capstone for IT

This course offers students the opportunity to demonstrate their level of understanding regarding the application of information technology concepts, technologies, and methodologies. Students are expected to employ their knowledge about hardware, systems, applications, and security management. 

View the University Catalog.

Course content subject to change.

Ways to Save on Your Computer Forensics Degree Online

Frequently Asked Questions

What is a Bachelor of Science in Information Technology (BSIT) degree with a concentration in Digital Investigations?

The BSIT degree with a concentration in Digital Investigations is designed to provide you with knowledge, skills, and abilities relevant for the digital investigations field. The digital investigations degree online program emphasizes problem-based and hands-on learning, so upon graduation you can be ready to pursue a career path in the field.

How long does it take to earn a BSIT-digital investigations degree?

Our bachelor’s degree programs are designed as 48-month programs. However, many factors can impact your time to completion. The time it may take you to earn your digital investigation degree can be influenced by course loads proficiency and/or transfer credits, and breaks.

What kind of courses will I take during my digital investigations degree program?

As you work to complete your degree concentration in digital investigations, you will be immersed in courses such as: Introduction to Cybercrime and Digital Investigations; Digital Investigations I; Digital Investigations II; and Network Investigations.

When can I begin classes?

Courses for the BSIT-digital investigations degree program start approximately every five weeks. Your actual start date is based on several factors, including completing academic and financial documentation.

How many credits are required to graduate with a BSIT degree?

The Bachelor of Science in Information Technology degree with a concentration in Digital Investigations program consists of 180 credits. You may be eligible for transfer credit, which is evaluated on an individual basis. Not all credits are eligible to transfer. Please see the University Catalog for transfer credit policies.

Why should I pursue an information technology degree?

Private and public sector entities depend on information technology leaders to conceptualize, implement, and manage high quality, secure information systems to support their organizations. Earning a digital investigations concentration online can help inform you about the growing threat of web-based crime and help you to understand cybercrimes, discovery principles, as well as digital investigations. This degree program will focus on general and advanced topics that include data collection, media restoration, and digital forensics.

What does the concentration in digital investigations mean?

By studying key topics in digital investigations, you have an opportunity to acquire fundamental understanding of digital and network investigations. You will examine and utilize a variety of tools and techniques necessary to identify and document threats. Topics of study may include procedures, steganography, operating systems, tool validation plans, and open-source software.

Compare Related Areas of Study

Master of Science in Information Technology (MSIT): Concentration in IT Management Bachelor of Business Administration (BBA) Degree with a Specialization in Technology Management Bachelor of Science in Information Technology (BSIT) Degree with a Concentration in Information Assurance and Security

Compare up to three additional degrees

Next Steps

Take the next step. Classes Start January 10, 2024

Complete this form and an AIU Admissions Advisor will contact you and provide further assistance.

* Please correct the following errors:

By clicking the button below you agree to be contacted by AIU about education services (including through automated and/or pre-recorded means, e.g. dialing and text messaging) via telephone, mobile device (including SMS and MMS), and/or email, even if your telephone number or email address is on a corporate, state or the National Do Not Call Registry, and you agree to our Terms of Use and Privacy Policy. You understand that your consent is not required as a condition to purchase a good or service.

Classes Start January 10, 2024

Accrediation Image

Military affiliation includes active duty, veteran, spouse of military or veteran, or anyone eligible to receive military benefits.