抖M女仆

Image
Two military officials walking in a data center.

Cybercriminology - B.S.

Dive into the thrilling world of cybercriminology and become a mastermind in the fight against digital threats! In 抖M女仆's bachelor's degree, you'll unlock the secrets of cybercrime investigation, digital forensics and cyber law enforcement. Harness the power of technology to outsmart hackers, track down cyber criminals and safeguard the digital realm. With hands-on training, expert faculty and real-world simulations, you'll emerge ready to defend against the ever-evolving landscape of cyber threats.

Contact Us

Apply Now
Request Info
Schedule a Visit

Shape Your Future in Cybercriminology 


It has become crucial for businesses and individuals to understand their risks and vulnerabilities when it comes to securely storing and accessing digital data. Just as important, if not more important, is the need for companies to find ways to protect their information systems, data, and to understand the dynamics in the realm of cyber-threats. 

As a result, trained cybercrime experts are in high demand. Find out how to take advantage of this expanding job market at 抖M女仆,  where we prepare our students to take on the digital threats of the future as skilled cybercriminology professionals with powerful earning potential.

Program Information

Program Description

Full Description

The Bachelor of Science degree in Cybercriminology incorporates the understanding of computer systems and networks with criminal behavior and processes in identifying, preventing and investigating cyber-related threats and crimes. Students are involved in project-based research and other experiential learning opportunities in technology and the legal, ethical and criminology aspects of modern crime, making them well prepared for work in a myriad of professional positions ranging from security/intelligence analysts and investigators to network and security administrators.

Admissions

Admission Requirements

The university affirmatively strives to provide educational opportunities and access to students with varied backgrounds, those with special talents and adult students who graduated from high school three or more years ago.

First-Year Students on the Kent Campus: First-year admission policy on the Kent Campus is selective. Admission decisions are based upon cumulative grade point average, strength of high school college preparatory curriculum and grade trends. Students not admissible to the Kent Campus may be administratively referred to one of the seven regional campuses to begin their college coursework. For more information, visit the .

First-Year Students on the Regional Campuses: First-year admission to 抖M女仆’s campuses at Ashtabula, East Liverpool, Geauga, Salem, Stark, Trumbull and Tuscarawas, as well as the Twinsburg Academic Center, is open to anyone with a high school diploma or its equivalent. For more information on admissions, contact the Regional Campuses admissions offices.

International Students: All international students must provide proof of English language proficiency (unless they meet specific exceptions) by earning a minimum 525 TOEFL score (71 on the Internet-based version), minimum 75 MELAB score, minimum 6.0 IELTS score or minimum 48 PTE Academic score, or by completing the ELS level 112 Intensive Program. For more information, visit the admissions website for international students.

Transfer Students: Students who have attended any other educational institution after graduating from high school must apply as undergraduate transfer students. For more information, visit the admissions website for transfer students.

Former Students: Former 抖M女仆 students or graduates who have not attended another college or university since 抖M女仆 may complete the reenrollment or reinstatement form on the University Registrar’s website.

Admission policies for undergraduate students may be found in the University Catalog's .

Some programs may require that students meet certain requirements before progressing through the program. For programs with progression requirements, the information is shown on the program's Coursework tab.

Learning Outcomes

Program Learning Outcomes

Graduates of this program will be able to:

  1. Describe the scope of cyber threats and crimes.
  2. Apply criminological theories to the commission of computer-related crimes.
  3. Apply a solid foundational grounding in digital technologies to digital investigations to combat cybercrime or threats.
  4. Compare and contrast digital and traditional evidence as it relates to investigation, processing and use in prosecution.
  5. Define and apply policies that include privacy, regulatory, legal and ethical considerations as they relate to responding to and/or investigating cyber threats.
Coursework

Program Requirements

Major Requirements

Major Requirements (courses count in major GPA)
CRIM 12000INTRODUCTION TO JUSTICE STUDIES 3
CRIM 13000CRIME AND TECHNOLOGY 3
CRIM 33200CRIMINAL LAW 3
CRIM 34200CRIMINAL PROCEDURES AND EVIDENCE 3
CRIM 36702CRIMINOLOGY 3
CRIM 46800INTELLIGENCE AND NATIONAL SECURITY 3
CRIM 46801HOMELAND SECURITY 3
CRIM 46802TERRORISM AND COUNTERTERRORISM 3
CRIM 46803INFORMATION AND CYBER SECURITY 3
IT 11002VISUAL BASIC PROGRAMMING 3
IT 11005INTRODUCTION TO OPERATING SYSTEMS AND NETWORKING TECHNOLOGY 3
IT 11009COMPUTER ASSEMBLY AND CONFIGURATION 4
IT 13000APPLIED SECURITY ESSENTIALS 3
IT 21002NETWORK SETUP AND CONFIGURATION 3
IT 21005VISUAL BASIC DATABASE PROGRAMMING 4
IT 21100LOCAL AREA NETWORK TROUBLESHOOTING 3
IT 21110NETWORK ROUTING AND SWITCHING 3
IT 30000PYTHON PROGRAMMING IN INFORMATION TECHNOLOGY 3
IT 36320COMPUTER FORENSICS 3
IT 36321NETWORK FORENSICS 3
IT 36322SOCIAL MEDIA AND MOBILE DEVICE FORENSICS 3
or IT 46320 CLOUD FORENSICS
IT 36330NETWORK SECURITY FUNDAMENTALS 3
IT 36331ADVANCED ROUTING AND SWITCHING 3
IT 36355COMMAND LINE UTILITIES 3
IT 46331NETWORK SECURITY AND FIREWALLS 3
SOC 32210RESEARCHING SOCIETY (ELR) (WIC) 13
TAS 47999TECHNICAL AND APPLIED STUDIES CAPSTONE (ELR) (WIC) 13
Additional Requirements (courses do not count in major GPA)
SOC 12050INTRODUCTION TO SOCIOLOGY (DIVD) (KSS) 3
UC 10001FLASHES 101 1
6
23
9
3
6-7
6
Minimum Total Credit Hours:120
1

A minimum C grade must be earned to fulfill the writing-intensive requirement.

2

Students are strongly advised to take MATH 10041 or MATH 10051 to fulfill the Kent Core Mathematics and Critical Reasoning requirement.

Graduation Requirements

Minimum Major GPA Minimum Overall GPA
2.000 2.000
Roadmap

Roadmap

This roadmap is a recommended semester-by-semester plan of study for this major. However, courses designated as critical (!) must be completed in the semester listed to ensure a timely graduation.

Plan of Study Grid
Semester OneCredits
CRIM 12000 INTRODUCTION TO JUSTICE STUDIES 3
IT 11005 INTRODUCTION TO OPERATING SYSTEMS AND NETWORKING TECHNOLOGY 3
IT 13000 APPLIED SECURITY ESSENTIALS 3
SOC 12050 INTRODUCTION TO SOCIOLOGY (DIVD) (KSS) 3
UC 10001 FLASHES 101 1
Kent Core Requirement 3
 Credit Hours16
Semester Two
CRIM 13000 CRIME AND TECHNOLOGY 3
IT 11009 COMPUTER ASSEMBLY AND CONFIGURATION 4
Kent Core Requirement 3
Kent Core Requirement 3
Kent Core Requirement 3
 Credit Hours16
Semester Three
CRIM 33200 CRIMINAL LAW 3
IT 21002 NETWORK SETUP AND CONFIGURATION 3
Kent Core Requirement 3
Kent Core Requirement 3
Kent Core Requirement 3
 Credit Hours15
Semester Four
CRIM 34200 CRIMINAL PROCEDURES AND EVIDENCE 3
CRIM 36702 CRIMINOLOGY 3
IT 11002 VISUAL BASIC PROGRAMMING 3
IT 21110 NETWORK ROUTING AND SWITCHING 3
IT 36320 COMPUTER FORENSICS 3
 Credit Hours15
Semester Five
CRIM 46800 INTELLIGENCE AND NATIONAL SECURITY 3
IT 21005 VISUAL BASIC DATABASE PROGRAMMING 4
IT 21100 LOCAL AREA NETWORK TROUBLESHOOTING 3
IT 30000 PYTHON PROGRAMMING IN INFORMATION TECHNOLOGY 3
SOC 32210 RESEARCHING SOCIETY (ELR) (WIC) 3
 Credit Hours16
Semester Six
CRIM 46801 HOMELAND SECURITY 3
IT 36321 NETWORK FORENSICS 3
IT 36330 NETWORK SECURITY FUNDAMENTALS 3
IT 36331 ADVANCED ROUTING AND SWITCHING 3
IT 36355 COMMAND LINE UTILITIES 3
 Credit Hours15
Semester Seven
CRIM 46802 TERRORISM AND COUNTERTERRORISM 3
IT 36322
or IT 46320
SOCIAL MEDIA AND MOBILE DEVICE FORENSICS
or CLOUD FORENSICS
3
IT 46331 NETWORK SECURITY AND FIREWALLS 3
Kent Core Requirement 3
Kent Core Requirement 3
 Credit Hours15
Semester Eight
CRIM 46803 INFORMATION AND CYBER SECURITY 3
TAS 47999 TECHNICAL AND APPLIED STUDIES CAPSTONE (ELR) (WIC) 3
Kent Core Requirement 3
Kent Core Requirement 3
 Credit Hours12
 Minimum Total Credit Hours:120
Program Delivery
  • Delivery:
    • Fully online
    • Mostly online
  • Location:
    • Ashtabula Campus
    • East Liverpool Campus
    • Geauga Campus
    • Kent Campus
    • Salem Campus
    • Stark Campus
    • Trumbull Campus
    • Tuscarawas Campus
    • Twinsburg Academic Center

Examples of Possible Careers and Salaries

Computer and information systems managers

10.4%

much faster than the average

461,000

number of jobs

$151,150

potential earnings

Computer network support specialists

6.4%

faster than the average

195,100

number of jobs

$65,450

potential earnings

Database administrators and architects

9.7%

much faster than the average

132,500

number of jobs

$98,860

potential earnings

Detectives and criminal investigators

1.1%

slower than the average

113,500

number of jobs

$86,940

potential earnings

Information security analysts

31.2%

much faster than the average

131,000

number of jobs

$103,590

potential earnings

Network and computer systems administrators

4.3%

about as fast as the average

373,900

number of jobs

$84,810

potential earnings

Additional Careers
  • Computer forensic analysts
  • Cybercrime investigators
  • Digital forensic investigators
  • District attorney芒聙聶s office investigators
  • Forensic analysts
  • Incident managers
  • Law enforcement agency (local, state, federal)
  • Malware analysts
  • Penetration testers
  • Security architects
  • State department
Notice: Career Information Source
* Source of occupation titles and labor data comes from the U.S. Bureau of Labor Statistics' . Data comprises projected percent change in employment over the next 10 years; nation-wide employment numbers; and the yearly median wage at which half of the workers in the occupation earned more than that amount and half earned less.