Programs & Degrees

Skipped BreadcrumbHome > Programs & Degrees > Computer Forensics

Cybersecurity, Virtualization and Forensics

Loading the player ...

Delivery: A mix of daytime, evening and online courses
Start: Fall, Spring, or Summer; Full- or Part-Time

Cybersecurity, Virtualization and Forensics – Associate in Applied Science Degree – 60 credits
Intrusion Detection and Incident Handling – Certificate – 19 credits
Digital Forensics Analysis and Techniques – Certificate – 18 credits
Reverse Engineering Malware Analysis and Techniques – Certificate – 18 credits
Cybersecurity Analysis and Techniques – Certificate – 17 credits
IT Security and Audit Control – Certificate – 17 credits

Cloud Computing and Virtualization Security– Associate in Applied Science Degree – 60 credits
Cloud Security Virtualization Forensics – Certificate – 21 credits
Cloud Computing – Certificate – 19 credits
Virtualization and End User Computing – Certificate – 19 credits

About the Program


Century's Cybersecurity and Cloud computing program prepares students for careers in Cybersecurity, information assurance, computer incident, investigation, cyberspace ethics and computer law. Cybersecurity is the activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation. This program is designed to fill a critical and growing need for cybersecurity personnel in the public and private sector. Students completing this curriculum will be capable of investigating and defending computer crimes/attacks, properly seize and recover computer evidenceComputer evidence may also be relevant in human resources, employment proceedings, civil disputes and criminal cases. You could find yourself working in a broad spectrum of jobs. If you are interested in government and law enforcement, you could find employment with a local or state police department. You could also work in the federal government with FBI, CIA, or various military branches. If you’re interested in a corporate environment, you could find employment with a Fortune 500 company, working alongside IT professionals on company policy violations.

Plan of Study

Articulation Agreements


Articulation agreements provide students with educational plans that help them transfer into four-year colleges and universities.

Potential Job Titles


Computer Forensic Analyst
Cyber Investigator
Digital Forensic Examiner/Investigator
Forensic Consultant
Forensics Technician
Video Forensics Examiner
Advanced Threat Analyst
Anti Money Laundering (AML) Investigator
Bank Secrecy Act (BSA) Investigator
Computer Forensic Analyst
Cyber Forensics Scientist
Cyber Incident Responder
Cyber Security Intrusion Analyst
Cybercrime Forensic Analyst
Cyber Threat Analyst
Data Collection Engineer
Data Loss Prevention Security Analyst
Digital Forensic Analyst
eDiscovery Consultant
Financial Crimes Consultant
Forensic Computer Analyst
Forensic Consultant
Fraud Risk Analyst
Information Security Analyst
Information Security Officer
Information Systems Forensic Analyst - Intrusion Analyst
Intrusion Detection Analyst
Network Architect
Network Security Analyst
Penetration Tester
Penetration Test Analyst
Risk Management Consultant
Security Architect
Security Computer Investigator
Security Specialist
Security Systems Analyst


Salary Data


Cybersecurity Specialist Potential Salary

According to a 2010 national survey conducted by the U.S. Department of Labor, the median annual salary for the category that includes cybersecurity specialists was $75,660. Because salary potential may vary depending on location, education, experience and other factors, prospective students are encouraged to conduct independent research to determine actual earning potential.

http://www.indeed.com/salary?q1=Cyber+Security+Engineer&l1=55110
(seven county metro area - www.iseek.org)

Learning Outcomes


Cybersecurity, Virtualization and Forensics - AAS 60 Credits

  • Develop an understanding of cybersecurity tools, techniques and technologies.
  • Demonstrate an understanding of how traditional intelligence methods and procedures are applied to the cybersecurity domain.
  • Demonstrate critical thinking and information application related to the discipline of cybersecurity, to include intelligence, computer forensics and cyber operations.
  • Demonstrate understanding of the legal and technical aspects of a cybercrime investigation and the application of computer forensic tools.
  • Show how ethical issues impact decision making in the cybersecurity area.
  • Develop an understanding of different forms of malware.
  • Develop an understanding of risk assessment and management methods related to cybersecurity and national critical infrastructures.
  • Demonstrate an understanding of cyber defense and attack methods.

Intrusion Detection and Incident Handling- Certificate 19 Credits

  • Demonstrate troubleshooting strategies with a variety of security problems.
  • Install and configure web, database, file, and application servers.
  • Develop and implement effective security and disaster recovery systems and policies.
  • Develop and maintain technical documentation and procedures for Security management.
  • Demonstrate effective research, planning, and security management of software updates and fixes.
  • Apply accumulated knowledge and skills in an actual industry environment.
  • Demonstrate effectiveness in the use of computer forensic tolls, procedures, techniques, and hardware as well as maintain physical evidence.
  • Demonstrate effectiveness in configuring authentication schemes, such as NAT, content security and content vectoring, SYNDefender, and VPNs using industry standard firewalls.
  • Demonstrate effectiveness in the use and scan of a network with heterogeneous operating systems and identify security vulnerabilities.
  • Demonstrate knowledge of multiple areas within the liberal arts arena.
  • Demonstrate knowledge in design and configuration of Windows security.
  • Demonstrate effectiveness in tracking and monitoring as well as managing kicker attacks against Linux servers and how to prevent them.

Digital Forensics Analysis and Techniques - Certificate 18 Credits

  • Interpret and appropriately apply the laws and procedures associated with identifying, acquiring, examining and presenting digital evidence.
  • Create a method for gathering, assessing, and applying new and existing legislation and industry trends specific to the practice of digital forensics.
  • Employ fundamental computer theory in the context of computer forensics practices.
  • Adhere to the ethical standards of the profession and apply those standards to all aspects of the study and practice of digital forensics.
  • Using the scientific process, apply the principles of effective digital forensic investigation techniques.
  • Identify the culture of "white collar crime" and the methods used by white-collar criminals and employ this knowledge to guide economic crime investigations.
  • Evaluate the effectiveness of available digital forensic tools and use them in a way that optimizes the efficiency and quality of digital forensic investigation.
  • Explain the role of digital forensics in the field of information assurance and cyber security and recognize the opportunities to benefit from and support the goals of those fields.

Reverse Engineering Malware Analysis and Techniques - Certificate 18 Credits

  • Interpret and appropriately apply the laws and procedures associated with identifying, acquiring, examining and presenting digital evidence.
  • Create a method for gathering, assessing, and applying new and existing legislation and industry trends specific to the practice of digital forensics.
  • Employ fundamental computer theory in the context of computer forensics practices.
  • Adhere to the ethical standards of the profession and apply those standards to all aspects of the study and practice of digital forensics.
  • Using the scientific process, apply the principles of effective digital forensic investigation techniques.
  • Identify the culture of "white collar crime" and the methods used by white-collar criminals and employ this knowledge to guide economic crime investigations.
  • Evaluate the effectiveness of available digital forensic tools and use them in a way that optimizes the efficiency and quality of digital forensic investigation.
  • Explain the role of digital forensics in the field of information assurance and cyber security and recognize the opportunities to benefit from and support the goals of those fields.

Cybersecurity Analysis and Techniques- Certificate 17 Credits

  • Develop an understanding of cybersecurity tools, techniques and technologies.
  • Demonstrate an understanding of how traditional intelligence methods and procedures are applied to the cybersecurity domain.
  • Demonstrate critical thinking and information application related to the discipline of cybersecurity, to include intelligence, computer forensics and cyber operations.
  • Demonstrate understanding of the legal and technical aspects of a cybercrime investigation and the application of computer forensic tools.
  • Show how ethical issues impact decision making in the cybersecurity area.
  • Develop an understanding of different forms of malware.
  • Develop an understanding of risk assessment and management methods related to cybersecurity and national critical infrastructures.
  • Demonstrate an understanding of cyber defense and attack methods.

IT Security and Audit Control - Certificate 17 Credits

  • Perform a practical security audit in a real-world situation e.g. audit university computer lab.
  • Audit/test controls on data integrity in end-user applications e.g. databases/spreadsheets/websites.
  • Detection of network security attacks and configuration of protective mechanisms e.g. firewalls
  • Demonstrate practical experience of operation and application of an encryption technology eg. PGP.
  • Explain information systems threats, vulnerabilities, risks and controls.
  • Explain computer security implementation standards/technologies/methods.
  • Implement computer audit practice standards/technologies/methods.
  • Explain legal/regulatory/standards frameworks for security/audit operations in UK, USA, Europe.
  • Describe computer crime, police and forensic methods, and collection/presentation of legal evidence.
  • Discuss security management for systems development, systems maintenance, and systems compliance.

Cloud Computing and Virtualization Security - AAS 60 Credits

  • Demonstrate a thorough comprehension of the key principles of cloud computing and the security and privacy involved with this emerging technology.
  • Examine Service-Oriented Architecture (SOA) and convert logical designs into services that can be implemented in today's Cloud environments.
  • Implement a public cloud instance using a public cloud service provider.
  • Distinguish between cloud providers and third party managed service providers.
  • Assess, evaluate, and apply the necessary tools to analyze an organization’s assets and verify if the cloud security and privacy implications are justifiable in implementing Cloud Computing.
  • Employ the appropriate resources to model service specifications and service contracts to perform service orchestration.
  • Demonstrate effective decision making and management techniques to support the organization’s objective of growth while putting best practices into place.
  • Apply best practices for the next generation IT professional through continuous awareness for the environmental impact when developing and implementing IT systems and reap the business benefits of adopting a Green IT strategy.

Cloud Security Virtualization Forensics - Certificate 21 Credits

  • Demonstrate a thorough comprehension of the key principles of cloud computing and the security and privacy involved with this emerging technology.
  • Examine Service-Oriented Architecture (SOA) and convert logical designs into services that can be implemented in today's Cloud environments.
  • Security aspects of each cloud model
  • Develop a risk-management strategy for moving to the cloud.
  • Implement a public cloud instance using a public cloud service provider.
  • Apply RSA's trust-based security model to different layers in the infrastructure stack.
  • Distinguish between cloud providers and third party managed service providers.
  • Assess, evaluate, and apply the necessary tools to analyze an organization’s assets and verify if the cloud security and privacy implications are justifiable in implementing Cloud Computing.
  • Employ the appropriate resources to model service specifications and service contracts to perform service orchestration.
  • Demonstrate effective decision making and management techniques to support the organization’s objective of growth while putting best practices into place.
  • Apply best practices for the next generation IT professional through continuous awareness for the environmental impact when developing and implementing IT systems and reap the business benefits of adopting a Green IT strategy.

Cloud Computing - Certificate 19 Credits

  • Demonstrate a thorough comprehension of the key principles of cloud computing and the security and privacy involved with this emerging technology.
  • Examine Service-Oriented Architecture (SOA) and convert logical designs into services that can be implemented in today's Cloud environments.
  • Implement a public cloud instance using a public cloud service provider.
  • Distinguish between cloud providers and third party managed service providers.
  • Assess, evaluate, and apply the necessary tools to analyze an organization’s assets and verify if the cloud security and privacy implications are justifiable in implementing Cloud Computing.
  • Employ the appropriate resources to model service specifications and service contracts to perform service orchestration.
  • Demonstrate effective decision making and management techniques to support the organization’s objective of growth while putting best practices into place.

Virtualization and End User Computing- Certificate 19 Credits

  • Demonstrate a thorough comprehension of the key principles of cloud computing and the security and privacy involved with this emerging technology.
  • Analyze the technical needs of end-users.
  • Use appropriate server-side software to fulfill business requirements.
  • Assess various virtualization solutions.
  • Identify basic virtualization architectures.
  • Identify customer needs to evaluate network requirements.
  • Create virtual solutions for servers.
  • Install and configure virtual servers and clients.
  • Implement and manage virtual servers and data centers.
  • Use the cloud services for storage and virtualization.
  • Deploy applications through thin clients.
  • Design and secure fault tolerant enterprise networks.
  • Demonstrate effective decision making and management techniques to support the organization’s objective of growth while putting best practices into place.
  • Apply best practices for the next generation IT professional through continuous awareness for the environmental impact when developing and implementing IT systems and reap the business benefits of adopting a Green IT strategy.

Program Prerequisites


Program Prerequisites for ALL awards
Assessment score placement in MATH 0070, or completion of MATH 0030 with a grade of C or higher, assessment score placement in ENGL 1021, or completion of ENGL 0090 with a grade of C or higher, and assessment score placement in RDNG 1000, or completion of RDNG 0090 with a grade of C or higher.

Additional Prerequisites for IT Security and Audit Control Certificate
Completion of MCST 1013, MCST 2011, ITT 1031, ITT 2031 and ITT 2010 with a grade of C or higher OR MCP Client OS, MCP Server and CCNA OR Network+ industry certification OR Instructor consent.

Additional Prerequisites for Data Recovery and Video Forensics Certificate
Completion of CFIT 2070, CFIT 2080, CFIT 2081 with a grade of C or higher OR Instructor consent.

Gainful Employment Program Information


Related Programs


Criminal Justice
Law Enforcement

Contact Information


Admissions Office 651.773.1700 admissions@century.edu Room 2350 West
Counseling & Advising Office 651.779.3285 Ask Century Room 2410 West
Financial Aid Office 651.779.3305 finaid@century.edu Room 2320 West

Program Contact Information


Israel Aladejebi 651.773.1787 israel.Aladejebi@century.edu Room 1743 East