About This Program
Dive into the thrilling world of cybercriminology and become a mastermind in the fight against digital threats! In Kent State's bachelor's degree, you'll unlock the secrets of cybercrime investigation, digital forensics and cyber law enforcement. Harness the power of technology to outsmart hackers, track down cyber criminals and safeguard the digital realm. With hands-on training, expert faculty and real-world simulations, you'll emerge ready to defend against the ever-evolving landscape of cyber threats. Read more...
Contact Information
Program Delivery
- Delivery:
- Fully online
- Mostly online
- Location:
- Ashtabula Campus
- East Liverpool Campus
- Geauga Campus
- Kent Campus
- Salem Campus
- Stark Campus
- Trumbull Campus
- Tuscarawas Campus
- Twinsburg Academic Center
Examples of Possible Careers and Salaries*
Computer and information systems managers
- 10.4% much faster than the average
- 461,000 number of jobs
- $151,150 potential earnings
Computer network support specialists
- 6.4% faster than the average
- 195,100 number of jobs
- $65,450 potential earnings
Database administrators and architects
- 9.7% much faster than the average
- 132,500 number of jobs
- $98,860 potential earnings
Detectives and criminal investigators
- 1.1% slower than the average
- 113,500 number of jobs
- $86,940 potential earnings
Information security analysts
- 31.2% much faster than the average
- 131,000 number of jobs
- $103,590 potential earnings
Network and computer systems administrators
- 4.3% about as fast as the average
- 373,900 number of jobs
- $84,810 potential earnings
Additional Careers
- Computer forensic analysts
- Cybercrime investigators
- Digital forensic investigators
- District attorney’s office investigators
- Forensic analysts
- Incident managers
- Law enforcement agency (local, state, federal)
- Malware analysts
- Penetration testers
- Security architects
- State department
* Source of occupation titles and labor data comes from the U.S. Bureau of Labor Statistics' Occupational Outlook Handbook. Data comprises projected percent change in employment over the next 10 years; nation-wide employment numbers; and the yearly median wage at which half of the workers in the occupation earned more than that amount and half earned less.
Admission Requirements
The university affirmatively strives to provide educational opportunities and access to students with varied backgrounds, those with special talents and adult students who graduated from high school three or more years ago.
First-Year Students on the Kent Campus: First-year admission policy on the Kent Campus is selective. Admission decisions are based upon cumulative grade point average, strength of high school college preparatory curriculum and grade trends. Students not admissible to the Kent Campus may be administratively referred to one of the seven regional campuses to begin their college coursework. For more information, visit the admissions website for first-year students.
First-Year Students on the Regional Campuses: First-year admission to Kent State’s campuses at Ashtabula, East Liverpool, Geauga, Salem, Stark, Trumbull and Tuscarawas, as well as the Twinsburg Academic Center, is open to anyone with a high school diploma or its equivalent. For more information on admissions, contact the Regional Campuses admissions offices.
International Students: All international students must provide proof of English language proficiency (unless they meet specific exceptions) by earning a minimum 525 TOEFL score (71 on the Internet-based version), minimum 75 MELAB score, minimum 6.0 IELTS score or minimum 48 PTE Academic score, or by completing the ELS level 112 Intensive Program. For more information, visit the admissions website for international students.
Transfer Students: Students who have attended any other educational institution after graduating from high school must apply as undergraduate transfer students. For more information, visit the admissions website for transfer students.
Former Students: Former Kent State students or graduates who have not attended another college or university since Kent State may complete the reenrollment or reinstatement form on the University Registrar’s website.
Admission policies for undergraduate students may be found in the University Catalog's Academic Policies.
Some programs may require that students meet certain requirements before progressing through the program. For programs with progression requirements, the information is shown on the program's Coursework tab.
Roadmap
This roadmap is a recommended semester-by-semester plan of study for this major. However, courses designated as critical (!) must be completed in the semester listed to ensure a timely graduation.
Plan of Study Grid Semester One |
CRIM 12000 | INTRODUCTION TO JUSTICE STUDIES | 3 |
IT 11005 | INTRODUCTION TO OPERATING SYSTEMS AND NETWORKING TECHNOLOGY | 3 |
IT 13000 | APPLIED SECURITY ESSENTIALS | 3 |
SOC 12050 | INTRODUCTION TO SOCIOLOGY (DIVD) (KSS) | 3 |
UC 10001 | FLASHES 101 | 1 |
Kent Core Requirement | 3 |
| Credit Hours | 16 |
Semester Two |
CRIM 13000 | CRIME AND TECHNOLOGY | 3 |
IT 11009 | COMPUTER ASSEMBLY AND CONFIGURATION | 4 |
Kent Core Requirement | 3 |
Kent Core Requirement | 3 |
Kent Core Requirement | 3 |
| Credit Hours | 16 |
Semester Three |
CRIM 33200 | CRIMINAL LAW | 3 |
IT 21002 | NETWORK SETUP AND CONFIGURATION | 3 |
Kent Core Requirement | 3 |
Kent Core Requirement | 3 |
Kent Core Requirement | 3 |
| Credit Hours | 15 |
Semester Four |
CRIM 34200 | CRIMINAL PROCEDURES AND EVIDENCE | 3 |
CRIM 36702 | CRIMINOLOGY | 3 |
IT 11002 | VISUAL BASIC PROGRAMMING | 3 |
IT 21110 | NETWORK ROUTING AND SWITCHING | 3 |
IT 36320 | COMPUTER FORENSICS | 3 |
| Credit Hours | 15 |
Semester Five |
CRIM 46800 | INTELLIGENCE AND NATIONAL SECURITY | 3 |
IT 21005 | VISUAL BASIC DATABASE PROGRAMMING | 4 |
IT 21100 | LOCAL AREA NETWORK TROUBLESHOOTING | 3 |
IT 30000 | PYTHON PROGRAMMING IN INFORMATION TECHNOLOGY | 3 |
SOC 32210 | RESEARCHING SOCIETY (ELR) (WIC) | 3 |
| Credit Hours | 16 |
Semester Six |
CRIM 46801 | HOMELAND SECURITY | 3 |
IT 36321 | NETWORK FORENSICS | 3 |
IT 36330 | NETWORK SECURITY FUNDAMENTALS | 3 |
IT 36331 | ADVANCED ROUTING AND SWITCHING | 3 |
IT 36355 | COMMAND LINE UTILITIES | 3 |
| Credit Hours | 15 |
Semester Seven |
CRIM 46802 | TERRORISM AND COUNTERTERRORISM | 3 |
IT 36322
| SOCIAL MEDIA AND MOBILE DEVICE FORENSICS
or CLOUD FORENSICS | 3 |
IT 46331 | NETWORK SECURITY AND FIREWALLS | 3 |
Kent Core Requirement | 3 |
Kent Core Requirement | 3 |
| Credit Hours | 15 |
Semester Eight |
CRIM 46803 | INFORMATION AND CYBER SECURITY | 3 |
TAS 47999 | TECHNICAL AND APPLIED STUDIES CAPSTONE (ELR) (WIC) | 3 |
Kent Core Requirement | 3 |
Kent Core Requirement | 3 |
| Credit Hours | 12 |
| Minimum Total Credit Hours: | 120 |
University Requirements
All students in a bachelor's degree program at Kent State University must complete the following university requirements for graduation.
NOTE: University requirements may be fulfilled in this program by specific course requirements. Please see Program Requirements for details.
Program Learning Outcomes
Graduates of this program will be able to:
- Describe the scope of cyber threats and crimes.
- Apply criminological theories to the commission of computer-related crimes.
- Apply a solid foundational grounding in digital technologies to digital investigations to combat cybercrime or threats.
- Compare and contrast digital and traditional evidence as it relates to investigation, processing and use in prosecution.
- Define and apply policies that include privacy, regulatory, legal and ethical considerations as they relate to responding to and/or investigating cyber threats.
Full Description
The Bachelor of Science degree in Cybercriminology incorporates the understanding of computer systems and networks with criminal behavior and processes in identifying, preventing and investigating cyber-related threats and crimes. Students are involved in project-based research and other experiential learning opportunities in technology and the legal, ethical and criminology aspects of modern crime, making them well prepared for work in a myriad of professional positions ranging from security/intelligence analysts and investigators to network and security administrators.