Computer Information Systems, Digital Forensics Technology Option, BS
Bachelor of Science in Computer Information Systems, Digital Forensics (244304BS)
- Dr. John Nicholas (firstname.lastname@example.org), 330-972-2563
- Dr. Scott Randby (email@example.com), 330-972-6094
- Mr. Stanley Smith (firstname.lastname@example.org), 330-972-6950
- CAST Advising, Polsky Building Room 203, 330-972-7220
The Computer Information Systems (CIS) offers associate and baccalaureate programs that introduce students to basic computing concepts while allowing them to develop the applied skills required the workforce. Courses start the student along the path for professional certifications. There are options, minors, and certificates available. CIS courses are taught in cutting edge computer labs so students can learn and practice skills. The CIS program offers high level training for the information technology professionals. Schedules offer a range of day and evening classes.
Department of Business and Information Technology Policy Notes
- Students must attain a “C” or better in each course in their major area (2440).
- The Department of Business and Information Technology requires a cumulative GPA of 2.0 GPA and a minimum of 15 earned credit hours for Inter- and Intra- College Transfer into all Associate and Bachelor’s degree programs.
- Prior to enrolling in classes for the B.S. degree you must contact an advisor in Polsky 301.
Graduates of the BS CIS – Digital Forensics Technology program are expected to qualify for such positions as law enforcement professionals, computer forensic specialists, data security analysts, systems security administrators, and network security administrators in government, business, information technology, and other industries.
Transfer to the College of Applied Science and Technology
To be admitted to the College of Applied Science and Technology, a student must have a GPA of 2.0. A student can complete the transfer process through an appointment with an Academic Advisor in the college in which they reside.
The following information has official approval of the Department of Business and Information Technology and The College of Applied Science and Technology, but is intended only as a supplemental guide. Official degree requirements are established at the time of transfer and admission to the degree-granting college. Students should refer to the Degree Progress Report (DPR) which is definitive for graduation requirements. Completion of this degree within the identified time frame below is contingent upon many factors, including but not limited to: class availability, total number of required credits, work schedule, finances, family, course drops/withdrawals, successfully passing courses, prerequisites, among others. The transfer process is completed through an appointment with your academic advisor.The College of Applied Science and Technology recommends that students take the General Education courses listed in this recommended sequence. Transfer students should consult their Advisor to identify courses that are equivalent.
|2030:152||Technical Mathematics II||2|
|2030:153||Technical Mathematics III||2|
|2420:104||Introduction to Business||3|
|2440:247||Hardware Support 1||3|
|3800:100||Introduction to Criminal Justice||3|
|2020:222||Technical Report Writing||3|
|2030:154||Technical Mathematics IV||3|
|2440:145||Introduction to Unix/Linux||3|
|3800:102||Principles of Criminal Law||3|
|3800:105||Introduction to Police Studies||3|
|Human Relations |
or Survey of Basic Economics
|2420:263||Professional Communications and Presentations||3|
|3800:104||Evidence & Criminal Legal Process||3|
|Natural Science Requirement with Lab||4|
|2040:242||American Urban Society||3|
|2040:243||Contemporary Global Issues||3|
|2235:281||Computer Forensic Methods||3|
|3800:298||Applied Ethics in Criminal Justice||3|
|Select one Elective:||3|
Computer Information Systems
|2235:381||Computer Forensic Methods II||3|
|2235:382||File System Analysis 1||3|
|2440:340||Network Forensics I 1||3|
|Humanities Requirement 3||3|
|2030:345||Technical Data Analysis||2|
|2220:480||Digital and Scientific Evidence||3|
|2440:306||Ethics & Law in Information Technology 2||3|
|2440:388||Advanced UNIX/Linux 2||3|
|2440:443||Network Forensics II 2||3|
|Natural Science Requirement||3|
|2040:241||Technology & Human Values||3|
|2440:430||Network Monitoring and Management 1||3|
|2440:441||Cyber Security 1||3|
|2440:442||Wireless Forensics 1||3|
|Arts Requirement 3||3|
|2040:256||Diversity in American Society||3|
|2440:440||Intrusion Detection 2||3|
|2440:450||Applied Data Mining 2||3|
|2440:451||Senior Programming Projects 2||3|
|Arts or Humanities Requirement 3||3|
Traditionally Fall Only (See Program Contact).
Traditionally Spring Only (See Program Contact).
All students pursuing a bachelor's degree at the University of Akron must complete the General Education requirements. For efficient completion of UA General Education requirements, it is recommended that students choose an Arts or Humanities course to fulfill the Global Diversity tag for CIS bachelor's programs.
Policy Alert: By the end of your first 48 credit hours attempted, you must have completed your required General Education English, Mathematics, and Communications (Speech) requirements.
- Students entering the Computer Information Systems programs (Cybersecurity, Digital Forensics, Networking, and Programming) must pass department placement exams or complete the following bridge course prior to enrolling in the program.
- Bridge Course: 2440:105 Introduction to Computers and Application Software