Skip to content

Computer Forensics – AAS Degree

Programs

Computer Forensics

Associate in Applied Science

This degree is for students who want to work in a computer forensics environment with electronic devices that may hold evidence that could be used in a court of law. Students will be qualified for careers in computer forensics in federal, state, and local agencies as well as law enforcement organizations, and in the private sector. There is a predicted rise in the need for well-qualified security professionals and this degree will support students to gain the knowledge needed to prepare for CompTIA certifications as well as an Associate in Applied Science. Courses in this degree include security awareness, operating systems, criminal behavior, managing network environments, and introduction to cybercrimes.

Students who are planning to transfer and pursue a baccalaureate degree should, when given a choice, enroll in the general education course that is IAI GECC-approved and articulated with participating Illinois institutions. Please refer to the Transfer Planning webpage for more information. https://www.jalc.edu/academic-advisement/transfer-planning/

What You Can Do

Information Security Analysts plan and carry out security measures to protect an organization’s computer networks and systems. Students will be able to monitor their organization’s networks for security breaches and investigate when they occur, use and maintain software such as firewalls, and data encryption programs, and research the latest information technology (IT) security trends.

Jobs

  • Information Security Analyst

Earning Potential

Example: Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, Automotive Body and Glass Repairers, at https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm

Modes of Instruction
Learn more about the modes of instruction offered at John A. Logan College.

Program Details

CIS 2012

FIRST YEAR – FALL SEMESTER

ORI 100College 1011
CIS 208Security Awareness3
CIS 230Operating Systems3
CRJ 103Introduction to Criminal Justice3
CRJ 105Criminal Behavior3
MAT 120Elementary Statistics OR MAT 119 3
16

FIRST YEAR – SPRING SEMESTER

CIS 200Network Essentials3
CIS 171Intro to Scripting4
CIS 206Managing Network Environment I3
OFT 207Computer Applications for Business3
CIS 209Introduction to Cybercrimes3
ENG 101English Composition I OR ENG 113 Professional Technical Writing3
19

FIRST YEAR – SUMMER SEMESTER

PHL 121Introduction to Logic3
ELECTIVEIAI Social & Behavioral Science Elective3
6

SECOND YEAR – FALL SEMESTER

CIS 216Cloud Technology3
CIS 219Ethical Hacking3
CRJ 209Criminal Law3
ELT 214Fundamentals of Computing Hardware3
CIS 229Digital Forensics3
15

SECOND YEAR – SPRING SEMESTER

CIS 213Penetration Testing3
CIS 231VPNs and Firewalls3
CRJ 205Investigation Techniques3
ELT 218Intro to Network Technologies3
COM 115Speech OR COM 116 Speech Interpersonal Communication3
15

Total Hours for Degree71

The Computer Forensics Program is a minimum of 71credit hours. Please use our Tuition and Fees page to calculate your approximate cost.

*Students will be responsible for additional classroom materials and tools.

Official John A. Logan Bookstore Apparel, Merchandise & Gifts

John A Logan College is accredited through the Higher Learning Commission. For more information on programs with specialized accreditations please visit Programs with Specialized Accreditations – John A. Logan College (jalc.edu).

John A Logan offers a seamless transfer to the next step in your educational journey for many of our programs. Our academic programs prepare you for what you will need to transfer to a four-year college or university. When you have selected the college where you would like to transfer, it is important to review their specific admission and course requirements. John A Logan College has many articulation agreements with various colleges.

Transfer Planning – John A. Logan College (jalc.edu)

  1. Design and implement a wired and wireless network
  2. Secure devices within wired and wireless networks
  3. Understanding and complying with applicable federal, state, and local statues
  4. Use scripting languages for system management and automation
  5. Managing and maintaining current Operating Systems

Computer Forensics Faculty Contact

Roger Jeter

Assistant Professor of Computer Information Systems

Roger Jeter

Email: roger.jeter@jalc.edu
Phone: (618) 985-2828 Ext. 8179
Office: B75A