Cyber/Computer Forensics and Counterterrorism.
A program focusing on the principles and techniques used to identify, search, seize and analyze digital media and to conduct cyber investigations against criminal and terrorist activity. Includes instruction in computer boot processes and drives, jumper setting, file access and reconstruction, hacking, network systems, cryptography, programming, investigative techniques, forensic imagery, web-based investigation methods, cyberterrorism, and applicable laws and administrative procedures.
Employment Projection
Employment projection data coming soon.
Related Careers
Information Security Analysts
15-1212
Computer Occupations, All Other
15-1299
Criminal Justice and Law Enforcement Teachers, Postsecondary
25-1111
Detectives and Criminal Investigators
33-3021
Private Detectives and Investigators
33-9021
Frequently Asked Questions
What careers can I pursue with this major?
Use the Related Careers section above to see roles commonly linked to this field of study. Data is based on CIP–SOC crosswalk and BLS occupational data.
Where does salary data come from?
Salary and employment data come from the U.S. Bureau of Labor Statistics (BLS) Occupational Employment and Wage Statistics (OEWS) and Employment Projections.
Linked Careers
5
Explore career paths commonly associated with this major.
Quick Facts
Get the Full Report
Download our guide on :Cyber/Computer Forensics and Counterterrorism. career outcomes.
Download PDFEmail Subscription
Stay updated with the latest salary trends in this field.