Skip to Main Content Skip to Footer Toggle Navigation Menu

Cybersecurity and Digital Forensics Certificate

Certificate in

Cybersecurity and Digital Forensics

Recent data breaches at large corporations and government offices have created an urgent need for skilled and technologically savvy individuals in the cybersecurity field. Knowledge and training that demonstrates a theoretical and practical understanding of computer systems and cybersecurity is an attractive skill set for employers in large corporations and small businesses, as well as government and law enforcement.

Visit Online and Continuing Education

As a cybersecurity and digital forensics student at Linfield

you might take:

Fundamentals of Information Systems Technology

Broad overview of computer science. Topics include basic concepts in hardware, operating systems and networks, algorithmic problem solving, introduction to the object-oriented paradigm and an overview of the social context of computing. (COMP 101)

Systems Administration and Networking Concepts

Installation, administration and maintenance of various modern operating systems widely used in academic, industrial and research environments. Communications concepts, network architectures, data communication software and hardware. Local Area Networks and Wide Area Networks, network protocol suites. Internetworking and routing, network management and distributed information systems. (COMP 252)

Digital Forensics

Comprehensive understanding of digital forensics and investigation tools and techniques in acquisition, recovery, documentation and analysis of information contained within and created with computer systems and computing devices. Digital evidence methods and standards, techniques and standards for the preservation of data, application forensics, web forensics, network forensics, mobile device forensics and information security audit. (COMP 301)

Studying cybersecurity and digital forensics at Linfield

Learning Outcomes

  • Identify the appropriate defense mechanism(s) and its limitations given a network threat

    expand for image context information
  • Identify the different categories of network threats and attacks

    expand for image context information
  • Isolate threats that can and cannot be protected against using secure communication channels

    expand for image context information
  • Summarize defenses against network censorship and diagram a network for security

    expand for image context information
  • Define the architecture for public and private key cryptography and how public key infrastructure (pki) supports network security

    expand for image context information

Request More Information

Have questions about studying in Linfield's Online and Continuing Education program? Reach out! We'd love to connect with you.

Deanna Fairchild
Deanna Fairchild
Assistant Director of Admission for Online and Continuing Education