An online digital forensics degree focuses on the computer forensics tools used to analyze network attacks, digital threats, and cybersecurity breeches. In this hands-on program, you’ll use real world examples to:

  • Prepare for your CompTIA Network+ and ISC2 certification exams
  • Discuss the importance of computer forensics and the process of setting up a cybersecurity lab
  • Develop a cybersecurity investigation plan to address an organizational need
  • Summarize files systems, hard disks, and digital media processes in the context of computer forensics
  • Apply password identification tools in a controlled environment
  • Use cyber software to perform forensic tasks and TCP/IP packet analysis
  • Analyze, recognize, and investigate web attacks
  • Review router architecture and discuss different types of router attacks and investigation techniques
  • Analyze and investigate Denial of Service/Distributed Denial of Service attacks
  • Apply techniques and tools needed for penetration tests
  • Generate network threat testing techniques, including denial of service, password identification, application and database penetration, virus and Trojan detection, and log management penetration

This course utilizes official EC-Council authorized curriculum and labs (iLabs). These learning resources and supporting certification exams have been accepted by, and meet the standards of the following organizations. *More Info


Summer Classes Start:

July 1

Courses to Complete:


Cost Per Course:


Campuses Near You:



These learning resources and supporting certification exams have been accepted by, and meet the standards of the following organizations:


American National Standards Institute (ANSI) ISO 17024

EC-Council's Certified Ethical Hacker (C|EH) and Computer Hacking Forensics Investigator (C|HFI) certifications are ANSI/ ISO 17024 accredited.




EC-Council's Certified Ethical Hacker (C|EH) and Computer Hacking Forensics Investigator (CHFI) learning resources and certifications map to supporting job roles job roles, Knowledge-Skills-Abilities (KSA's), and Knowledge Units (KU's) within the NICE framework. For a full listing of the EC-Council - NICE framework mapping, please click here.



Committee on National Security Systems (CNSS)

Certified Ethical Hacker (C|EH) and Computer Hacking Forensics Investigator (CHFI) learning resources and certifications meet the training standards for information security professionals in the federal government.


Only the learning resources and exams utilized by Strayer University in the select courses are certified or accredited.  



  • CIS 332 - Network Server Administration I

    Prepare to install, configure, secure and maintain the Windows server environment in a lab­based setting. Topics include configuring and managing DHCP and DNS; routing and remote access; and file and print services.

  • SEC 340 - Computer Forensic Technology

    Get the knowledge and skills to identify, track and prosecute cyber criminals. Understand computer forensics; creating a secure lab; and the process for forensic investigation, including first responder response techniques, incident management, and reports used by computer forensic investigators. Cover a broad base of topics designed to detect attacks and collect evidence in a forensically sound manner. Take preparatory steps to identify evidence in computer related crime and abuse cases and track a hacker’s path through a client system.

  • SEC 435 - Network Penetration Testing

    Explore topics in advanced penetration testing and computer security analysis in a lab setting. Discover methodologies for conducting thorough information security analysis and advanced penetration testing techniques to effectively identify and mitigate risks to the security of an organization’s infrastructure. 


  • CIS 111 - Introduction to Relational Database Management Systems

    Get an introduction to the theory and applied concepts of database design, database management and information management. Focus on identifying organizational information requirements, express those requirements using conceptual data modeling techniques, verify the structural characteristics with normalization techniques and convert conceptual data models into physical database models.

  • CIS 175 - Introduction to Networking

    Discover the fundamentals of networking technology. Focus on networking protocols, topologies, hardware and operating systems. Topics include data communications, telecommunications, infrastructure security, inter/internetworking and the application of networking to multimedia, information storage and distribution.

  • CIS 210 - Systems Analysis and Development

    This course presents the processes, methods, techniques and tools that organizations use to effectively architect computer-based technologies. Topics include a fundamental review of project management and data design followed by the processes required to gather and articulate business requirements. Students will acquire skills to procure, evaluate, test and systematically build systems for integration into an organization.

  • CIS 273 - Web Design and Development

    This course presents students the design, implementation and testing of web-based applications including related software, databases, scripting techniques, interfaces and digital media. It also covers social, ethical and security issues arising from the web, e-commerce and social networking software applications.

  • CIS 312 - Computer Architecture

    Discover the concepts and essential skills necessary to administer operating systems, networks, software, file systems, file servers, web systems, database systems, system documentation, policies and procedures. Topics include the methods required to select, deploy, integrate and administer computing platforms or components that support an organizations information technology infrastructure. Explore the fundamentals of hardware and software, as well as how they integrate to form essential components of systems.

  • CIS 333 - Networking Security Fundamentals

    Study computer information system security principles, challenges, vulnerabilities and countermeasure strategies. Topics include definition of security terms, concepts, elements, and goals. Explore industry standards and practices that focus on the availability, integrity and confidentiality aspects of information systems security.

  • CIS 375 - Human Computer Interaction

    Explore user-centered methodologies in the development, evaluation and deployment of information technology applications and systems. Study evolving technologies and devices and learn to design interactive products that enhance the way people communicate, interact and work with computers. Topics include user and task analysis, human factors, ergonomics, accessibility standards and cognitive psychology.

  • MAT 200 - Precalculus

    Review algebraic techniques. Selected advanced topics include matrices and determinants as techniques for solving linear systems in three or more variables, elementary concepts of analytic geometry, and logarithms. Focus on business-related word problems.

  • CIS 498 - Information Technology Capstone

    Take a senior management approach to examine and solve real-world problems and projects. Apply project management techniques to create integrative information technology solutions that include databases, systems analysis, security, networking, computer infrastructure, human/computer interaction and web design.

  • CIS 255 - Operating Systems

    Students can take either CIS 329, CIS 337, OR CIS 255

    Covers the development and execution of structured shell programs including scripts, menus, I/O redirection, pipes, variables, and other UNIX and Windows commands. Operating systems administration techniques also are covered including electronic mail, editors, online help, and file and directory techniques.

  • CIS 337 - Internetworking Basics

    Students can take either CIS 329, CIS 337, OR CIS 255

    Get an introduction to LAN, WAN and WLAN concepts and connectivity in an internetworking environment. Use command-line interface commands to secure, configure and troubleshoot router and switch operating systems. Topics include an overview of networking devices that operate at the OSI or TCP/IP stack, IP addressing and subnetting, collision and broadcast domains.


Innovations in the digital space have changed the way law enforcement officials approach crime.  These same technological advancements, however, have also presented crime fighters with a unique challenge  — criminals who have seized upon the digital revolution for their own nefarious gain.

There is an increasing demand for digital forensic experts. You can help take down cyber criminals when you earn your online digital forensics bachelor’s degree from Strayer University.

Digital forensic analysts identify, track, and prosecute cyber criminals. Strayer’s digital forensics bachelor’s program gives you a chance to dive into the forensic investigation process 

while teaching you the skills required to detect criminal activity online and collect relevant digital evidence.

You’ll also explore the methods for identifying the security risks to an organization’s infrastructure and securing computer systems, as well as determine preventative measures that can be taken to deter hacking and data theft.

Cybercrime is one of the newest and most dynamic issues law enforcement is facing today. Earn your online digital forensics bachelor’s degree and join the fight against hackers and criminals.



Each Bachelor of Science in Information Technology concentration can provide you with skills you’ll be able to apply immediately. You may want to explore these other Bachelor of Science in Information Technology concentrations.

Bachelor of Science in Information Technology


U.S. Military Affiliation

Do you have transfer credits?

You consent to receive autodialed marketing calls or text messages from Strayer University and partner school, Capella University, at the phone number you provided. Consent is not required to purchase goods or services. You can always call us at 1.866.314.3547.


Submitting your information,
this may take a few seconds...