Cyber Investigation Technology CYIT.S.AAS
Associate of Applied Science - 61 Credit Hours
Division: Business and Public Services
Department: Computer Science and Information Technology
Effective as of Fall 2018
What is the program about?
The Cyber Investigation Technology degree will prepare students for careers in the areas of computer network protection, managing networks and operating systems, and IT criminal investigation, which includes evidence procedures and computer forensics. The degree incorporates preparation for industry-recognized certifications, articulated credit for Law Enforcement and Corrections entities, and transfer students for four-year degree transfer opportunities. This degree program contains one or more embedded certificates which will be automatically awarded when the certificate requirements are completed. If you do not want to receive the embedded certificate(s), please notify Registration and Student Records at email@example.com.
- Demonstrate the manner of evidence collection consistent with standard criminal justice chain of evidence procedures to maximize prosecutorial effectiveness while minimizing legal defense challenges and legal liabilities.
- Display professional oral and written communication skills and collaborate with a team to deliver and implement a project plan in the business and criminal justice environment to address cyber security problems.
- Diagnose and prescribe solutions to hardware, networks and operating systems problems.
- Develop programs, databases and business techniques to identify and/or resolve cyber crimes, including the development of plans for incident analysis and avoidance.
- Demonstrate creative and critical thinking skills in the analysis of digital crimes and cyber security issues, problem solving strategies, research, analysis, synthesis, evaluation, assessment, adaption and application of computer forensic techniques.
- Apply programming, database, operating systems and business skills to solve and troubleshoot business and information technology problems.
- Demonstrate the process to find and recover data artifacts present, deleted or hidden to preserve the verifiable integrity of digital evidence.
Job titles include but are not limited to: Intelligence Analyst, IT Specialist (Government Breakout Codes 2210), Systems Administrator, Network Engineer, Information System Security Manager, Cyber Security Incident Response Specialist and Private Investigator.
- View the Master Syllabus - View the Course Schedule
This information is for planning purposes only. Sinclair College will make every effort to offer curriculum listed above but reserves the right to change, add and cancel curriculum offerings for unforeseen circumstances.