X

hi
Have a question?

Chat with a live agent now.

Need help?

XNo thanks

Computer Information Systems

Bachelor’s Degree Specialization in Computer Forensics

Develop your skills with a computer forensics degree specialization

Are you interested in learning how to protect companies from cyber criminals? Get started with a Bachelor’s in Computer Information Systems with a Specialization in Computer Forensics. This program will help you develop stronger deductive and inductive reasoning skills to formulate and test theories about how cyber crimes are committed, conduct digital investigations, collect relevant digital evidence, and prevent cyber attacks from happening.

In our artificial intelligence courses, you’ll also gain experience with AI-supported tools that can enhance your ability to detect patterns, analyze data, and support digital investigations.

You’ll be immersed in a core set of skills related to operating systems, programming, AI, hardware, connectivity, and security that you can leverage in today’s IoT economy.

Get to know our computer forensics degree specialization

As part of our Bachelor’s in Computer Information Systems, the Computer Forensics Specialization builds your understanding of computer forensics software applications, relevant laws, ethics, and how to recover lost data and unencrypt files in order to provide court-ready evidence.

As a forensics specialist, you’ll identify, track, and assist in the prosecution of cyber criminals and help solve cyber crimes. In some cases, you may even help law enforcement by uncovering lost data from cyber attacks and suspects’ devices.

Our program teaches you how to use computer forensic software applications and the laws and ethics that affect digital evidence. You’ll also explore how emerging AI tools can support digital investigations, automate parts of the evidence-gathering process, and assist in threat analysis.

Accreditation matters

Being accredited means we’ve met rigorous quality standards and are committed to giving you the education you deserve. Our accreditations and recognitions include:

  • The Computing Accreditation Commission of ABET (CAC of ABET): Our Bachelor of Science in Computer Information Systems is accredited by CAC of ABET, a global mark of quality that is respected by employers and professional associations within the field.

  • National Initiative for Cyber Security Careers and Studies (NICCS): Students in the Computer Information Systems bachelor's program with a Specialization in Cyber Security Programming should note that DeVry University’s cybersecurity curriculum is acknowledged and verified as an approved provider by the National Initiative for Cybersecurity Careers and Studies (NICCS). NICCS is an online training initiative and portal that follows the National Initiative for Cybersecurity Education framework and connects students, educators, and industry to cyber security resources and U.S. training providers. More information is available via niccs.cisa.gov and nist.gov/itl/applied-cybersecurity/nice.

  • The Higher Learning Commission (HLC): Institutionally, DeVry University is accredited by HLC, www.hlcommission.org. Our Keller Graduate School of Management is included in this accreditation.

Classes Start Every 8 Weeks

Investigate your future opportunities in tech.

Why DeVry?

Why choose computer forensics at DeVry?

Work with modern security tools and platforms

Gain hands-on practice with forensic analysis software, system logs, encryption concepts, incident response methods, and AI-supported tools that help accelerate evidence analysis and digital investigation workflows.

Certification exam reimbursement

Elements of our curriculum help prepare you to pursue industry certifications that can validate your knowledge to employers. We’ll even reimburse you up to $300 toward the cost of 1 qualifying exam attempt for certifications including:

  • Certified Information Systems Auditor (CISA)

  • CompTIA DataSys+

Other certifications may also be eligible for reimbursement. Speak to your Student Support Advisor for additional information.

Scholars program

Future Cyber Defenders Scholars Program

Take your ambition to the next level with a cyber security scholars program that helps you build your network, boost your skills, and pursue the career you want.

Minimum Completion Time1
2 years
8 months
OR
Normal Completion Time2
4 years

Accelerate on your schedule

Choose the schedule that best fits your goals and commitments. You can earn your bachelor's degree in as little as 2 years and 8 months.1

Or follow a normal schedule and complete your program in 4 years.2

1Minimum completion time does not include breaks and assumes 3 semesters of year-round, full-time enrollment in 12-19 credit hours a semester per 12-month period.
2Normal completion time includes breaks and assumes 2 semesters of enrollment in 12-19 credit hours per semester per 12-month period.

Knowledge & skills

What you’ll learn

Our computer forensics degree specialization covers the following:

Digital crime evidence and procedure

Study basic legal concepts and evidentiary procedures for investigating criminal activity involving computers and computer-based systems. Explore practical application of the law and legal procedures in the digital age.

Digital forensics

Apply basic forensic techniques used to investigate illegal and unethical activity within a PC or local area network (LAN) environment and resolve related issues.

AI-supported investigation skills

Expand your forensic toolkit with AI-enabled capabilities, including Python automation and AI-assisted coding, no-code/low-code machine learning tools, and prompt engineering techniques that can help streamline digital investigations.

Information systems security planning and auditing

Understand the risk factor analysis that must be performed in order to design a flexible and comprehensive security plan.

Computer ethics

Explore the nature and social impact of computer technology, as well as the corresponding formulation and justification of governmental and organizational policies for ethical uses of such technology.

Complex problem-solving

Apply critical and analytical thinking to identify complex problems, evaluate options, and implement solutions.

Structured analysis and design

Explore the systems analysis and design process using information systems methodologies and techniques to analyze business activities and solve problems. Learn how to identify, define, and document business problems, and then develop information system models to solve them.

Embedded programs

Embedded programs — demonstrate skills at every step

You can earn 2 additional credentials while earning your Computer Information Systems Degree with a Specialization in Computer Forensics. All courses in our Undergraduate Certificate in Programming Essentials program Associate in Information Technology and Networking are embedded in this program.3 That means you can earn a certificate and an associate degree on the way to your bachelor's.

Careers

Career opportunities in computer forensics

When you earn our computer forensics degree specialization, you can consider careers including:

  • Computer digital forensic investigator4,5

    Computer digital forensic investigators use a combination of technology and detective-like skills to uncover evidence of criminal activity in computers. They are experts at data recovery and work with law enforcement agencies to locate and extract evidence in a way that allows it to be presented in a court of law.

  • Computer systems analysts

    Analyze science, engineering, business, and other data processing problems to develop and implement solutions to complex applications problems, system administration issues, or network concerns. Perform systems management and integration functions, improve existing computer systems, and review computer system capabilities, workflow, and schedule limitations. Computer systems analysts may also analyze or recommend commercially available software.

  • Digital forensics analyst

    Conduct investigations on computer-based crimes, establishing documentary or physical evidence, such as digital media and logs associated with cyber intrusion incidents. Analyze digital evidence and investigate computer security incidents to derive information in support of system and network vulnerability mitigation. Preserve and present computer-related evidence in support of criminal, fraud, counterintelligence, or law enforcement investigations.

  • Information security analysts

    Monitor an organization's networks for security breaches and investigate when one occurs. Use and maintain software, such as firewalls and data encryption programs, to protect sensitive information, and check for vulnerabilities in computer and network systems.

Learn more about
Careers in digital forensics

4Applicants for jobs in the justice administration field may be subject to pre-employment screenings such as, but not limited to, criminal background checks, drug and/or alcohol testing, physical and/or psychological examinations, and credit checks. Unsatisfactory screening results may disqualify an applicant for a position in the justice administration field. Additional government-required training programs may be necessary to obtain employment in this field.
5Employment in this occupation may require years of relevant experience.

Frequently asked questions

Should I specialize in computer forensics?

A computer forensics specialization can be an excellent choice for those who are analytically inclined and interested in law enforcement. We offer our Computer Forensics  Specialization as part of our Bachelor’s in Computer Information Systems. This exciting profession enables you to help stop cyber crime by catching criminals and recovering important data in the process. A bachelor's degree with a specialization in this subject can help you take the first steps towards a career focused on computer forensics.

What jobs can you pursue with a computer forensics specialization?

Among other career opportunities, graduates with our computer forensics specialization may consider careers such as computer digital forensic investigator4, 5 and computer programmer.

4Applicants for jobs in the justice administration field may be subject to pre-employment screenings such as, but not limited to, criminal background checks, drug and/or alcohol testing, physical and/or psychological examinations, and credit checks. Unsatisfactory screening results may disqualify an applicant for a position in the justice administration field. Additional government-required training programs may be necessary to obtain employment in this field.
5Employment in this occupation may require years of relevant experience.

What is computer forensics?

Computer forensics is the practice of recovering data from a device, often for the purpose of uncovering evidence of criminal activity. The practice itself is reactionary, meaning that it only takes place after an incident has occurred and is not concerned with preventing the incident itself.

Those working in computer forensics typically either assist with an investigation or help recover lost data. In the first instance, a computer forensics specialist is given access to a suspect's device, such as a laptop, desktop, or smartphone. They use their programming, hardware, and software skills to locate important data. In a law enforcement case, they work to uncover data that is of value to the prosecution and can be presented in a court of law. To do this, data must be recovered in a very particular manner that does not violate the suspect's rights.

Academic Catalog
2025-2026 academic catalog
Program guide

1Minimum completion time does not include breaks and assumes 3 semesters of year-round, full-time enrollment in 12-19 credit hours a semester per 12-month period.

2Normal completion time includes breaks and assumes 2 semesters of enrollment in 12-19 credit hours per semester per 12-month period.

3Future programmatic changes could impact the ability to earn additional credentials en route to an eligible degree program. Refer to the academic catalog for details.

4Applicants for jobs in the justice administration field may be subject to pre-employment screenings such as, but not limited to, criminal background checks, drug and/or alcohol testing, physical and/or psychological examinations, and credit checks. Unsatisfactory screening results may disqualify an applicant for a position in the justice administration field. Additional government-required training programs may be necessary to obtain employment in this field..

5Employment in this occupation may require years of relevant experience.