5XÉçÇø

Cybercriminology - B.S.

Dive into the thrilling world of cybercriminology and become a mastermind in the fight against digital threats! In Kent State's bachelor's degree, you'll unlock the secrets of cybercrime investigation, digital forensics and cyber law enforcement. Harness the power of technology to outsmart hackers, track down cyber criminals and safeguard the digital realm. With hands-on training, expert faculty and real-world simulations, you'll emerge ready to defend against the ever-evolving landscape of cyber threats.

Contact Us

Apply Now
Request Info
Schedule a Visit

Program Information for Cybercriminology - B.S.

Program Description

Full Description

The Bachelor of Science degree in Cybercriminology incorporates the understanding of computer systems and networks with criminal behavior and processes in identifying, preventing and investigating cyber-related threats and crimes. Students are involved in project-based research and other experiential learning opportunities in technology and the legal, ethical and criminology aspects of modern crime, making them well prepared for work in a myriad of professional positions ranging from security/intelligence analysts and investigators to network and security administrators.

Admissions for Cybercriminology - B.S.

Admission Requirements

The university affirmatively strives to provide educational opportunities and access to students with varied backgrounds, those with special talents and adult students who graduated from high school three or more years ago.

First-Year Students on the Kent Campus: First-year admission policy on the Kent Campus is selective. Admission decisions are based upon cumulative grade point average, strength of high school college preparatory curriculum and grade trends. Students not admissible to the Kent Campus may be administratively referred to one of the seven regional campuses to begin their college coursework. For more information, visit the .

First-Year Students on the Regional Campuses: First-year admission to Kent State’s campuses at Ashtabula, East Liverpool, Geauga, Salem, Stark, Trumbull and Tuscarawas, as well as the Twinsburg Academic Center, is open to anyone with a high school diploma or its equivalent. For more information on admissions, contact the Regional Campuses admissions offices.

International Students: All international students must provide proof of English language proficiency (unless they meet specific exceptions) by earning a minimum 525 TOEFL score (71 on the Internet-based version), minimum 75 MELAB score, minimum 6.0 IELTS score or minimum 48 PTE Academic score, or by completing the ELS level 112 Intensive Program. For more information, visit the admissions website for international students.

Transfer Students: Students who have attended any other educational institution after graduating from high school must apply as undergraduate transfer students. For more information, visit the admissions website for transfer students.

Former Students: Former Kent State students or graduates who have not attended another college or university since Kent State may complete the reenrollment or reinstatement form on the University Registrar’s website.

Admission policies for undergraduate students may be found in the University Catalog's .

Some programs may require that students meet certain requirements before progressing through the program. For programs with progression requirements, the information is shown on the program's Coursework tab.

Learning Outcomes

Program Learning Outcomes

Graduates of this program will be able to:

  1. Describe the scope of cyber threats and crimes.
  2. Apply criminological theories to the commission of computer-related crimes.
  3. Apply a solid foundational grounding in digital technologies to digital investigations to combat cybercrime or threats.
  4. Compare and contrast digital and traditional evidence as it relates to investigation, processing and use in prosecution.
  5. Define and apply policies that include privacy, regulatory, legal and ethical considerations as they relate to responding to and/or investigating cyber threats.
Coursework

Program Requirements

Major Requirements

Major Requirements (courses count in major GPA)
CRIM 12000INTRODUCTION TO JUSTICE STUDIES 3
CRIM 13000CRIME AND TECHNOLOGY 3
CRIM 33200CRIMINAL LAW 3
CRIM 34200CRIMINAL PROCEDURES AND EVIDENCE 3
CRIM 36702CRIMINOLOGY 3
CRIM 46800INTELLIGENCE AND NATIONAL SECURITY 3
CRIM 46801HOMELAND SECURITY 3
CRIM 46802TERRORISM AND COUNTERTERRORISM 3
CRIM 46803INFORMATION AND CYBER SECURITY 3
IT 11002VISUAL BASIC PROGRAMMING 3
IT 11005INTRODUCTION TO OPERATING SYSTEMS AND NETWORKING TECHNOLOGY 3
IT 11009COMPUTER ASSEMBLY AND CONFIGURATION 4
IT 13000APPLIED SECURITY ESSENTIALS 3
IT 21002NETWORK SETUP AND CONFIGURATION 3
IT 21005VISUAL BASIC DATABASE PROGRAMMING 4
IT 21100LOCAL AREA NETWORK TROUBLESHOOTING 3
IT 21110NETWORK ROUTING AND SWITCHING 3
IT 30000PYTHON PROGRAMMING IN INFORMATION TECHNOLOGY 3
IT 36320COMPUTER FORENSICS 3
IT 36321NETWORK FORENSICS 3
IT 36322SOCIAL MEDIA AND MOBILE DEVICE FORENSICS 3
or IT 46320 CLOUD FORENSICS
IT 36330NETWORK SECURITY FUNDAMENTALS 3
IT 36331ADVANCED ROUTING AND SWITCHING 3
IT 36355COMMAND LINE UTILITIES 3
IT 46331NETWORK SECURITY AND FIREWALLS 3
SOC 32210RESEARCHING SOCIETY (ELR) (WIC) 13
TAS 47999TECHNICAL AND APPLIED STUDIES CAPSTONE (ELR) (WIC) 13
Additional Requirements (courses do not count in major GPA)
SOC 12050INTRODUCTION TO SOCIOLOGY (DIVD) (KSS) 3
UC 10001FLASHES 101 1
6
23
9
3
6-7
6
Minimum Total Credit Hours:120
1

A minimum C grade must be earned to fulfill the writing-intensive requirement.

2

Students are strongly advised to take MATH 10041 or MATH 10051 to fulfill the Kent Core Mathematics and Critical Reasoning requirement.

Graduation Requirements

Minimum Major GPA Minimum Overall GPA
2.000 2.000
Roadmap

Roadmap

This roadmap is a recommended semester-by-semester plan of study for this major. However, courses designated as critical (!) must be completed in the semester listed to ensure a timely graduation.

Plan of Study Grid
Semester OneCredits
CRIM 12000 INTRODUCTION TO JUSTICE STUDIES 3
IT 11005 INTRODUCTION TO OPERATING SYSTEMS AND NETWORKING TECHNOLOGY 3
IT 13000 APPLIED SECURITY ESSENTIALS 3
SOC 12050 INTRODUCTION TO SOCIOLOGY (DIVD) (KSS) 3
UC 10001 FLASHES 101 1
Kent Core Requirement 3
 Credit Hours16
Semester Two
CRIM 13000 CRIME AND TECHNOLOGY 3
IT 11009 COMPUTER ASSEMBLY AND CONFIGURATION 4
Kent Core Requirement 3
Kent Core Requirement 3
Kent Core Requirement 3
 Credit Hours16
Semester Three
CRIM 33200 CRIMINAL LAW 3
IT 21002 NETWORK SETUP AND CONFIGURATION 3
Kent Core Requirement 3
Kent Core Requirement 3
Kent Core Requirement 3
 Credit Hours15
Semester Four
CRIM 34200 CRIMINAL PROCEDURES AND EVIDENCE 3
CRIM 36702 CRIMINOLOGY 3
IT 11002 VISUAL BASIC PROGRAMMING 3
IT 21110 NETWORK ROUTING AND SWITCHING 3
IT 36320 COMPUTER FORENSICS 3
 Credit Hours15
Semester Five
CRIM 46800 INTELLIGENCE AND NATIONAL SECURITY 3
IT 21005 VISUAL BASIC DATABASE PROGRAMMING 4
IT 21100 LOCAL AREA NETWORK TROUBLESHOOTING 3
IT 30000 PYTHON PROGRAMMING IN INFORMATION TECHNOLOGY 3
SOC 32210 RESEARCHING SOCIETY (ELR) (WIC) 3
 Credit Hours16
Semester Six
CRIM 46801 HOMELAND SECURITY 3
IT 36321 NETWORK FORENSICS 3
IT 36330 NETWORK SECURITY FUNDAMENTALS 3
IT 36331 ADVANCED ROUTING AND SWITCHING 3
IT 36355 COMMAND LINE UTILITIES 3
 Credit Hours15
Semester Seven
CRIM 46802 TERRORISM AND COUNTERTERRORISM 3
IT 36322
or IT 46320
SOCIAL MEDIA AND MOBILE DEVICE FORENSICS
or CLOUD FORENSICS
3
IT 46331 NETWORK SECURITY AND FIREWALLS 3
Kent Core Requirement 3
Kent Core Requirement 3
 Credit Hours15
Semester Eight
CRIM 46803 INFORMATION AND CYBER SECURITY 3
TAS 47999 TECHNICAL AND APPLIED STUDIES CAPSTONE (ELR) (WIC) 3
Kent Core Requirement 3
Kent Core Requirement 3
 Credit Hours12
 Minimum Total Credit Hours:120
Program Delivery
  • Delivery:
    • Fully online
    • Mostly online
  • Location:
    • Ashtabula Campus
    • East Liverpool Campus
    • Geauga Campus
    • Kent Campus
    • Salem Campus
    • Stark Campus
    • Trumbull Campus
    • Tuscarawas Campus
    • Twinsburg Academic Center

Examples of Possible Careers and Salaries for Cybercriminology - B.S.

Computer and information systems managers

10.4%

much faster than the average

461,000

number of jobs

$151,150

potential earnings

Computer network support specialists

6.4%

faster than the average

195,100

number of jobs

$65,450

potential earnings

Database administrators and architects

9.7%

much faster than the average

132,500

number of jobs

$98,860

potential earnings

Detectives and criminal investigators

1.1%

slower than the average

113,500

number of jobs

$86,940

potential earnings

Information security analysts

31.2%

much faster than the average

131,000

number of jobs

$103,590

potential earnings

Network and computer systems administrators

4.3%

about as fast as the average

373,900

number of jobs

$84,810

potential earnings

Additional Careers
  • Computer forensic analysts
  • Cybercrime investigators
  • Digital forensic investigators
  • District attorney’s office investigators
  • Forensic analysts
  • Incident managers
  • Law enforcement agency (local, state, federal)
  • Malware analysts
  • Penetration testers
  • Security architects
  • State department
Notice: Career Information Source
* Source of occupation titles and labor data comes from the U.S. Bureau of Labor Statistics' . Data comprises projected percent change in employment over the next 10 years; nation-wide employment numbers; and the yearly median wage at which half of the workers in the occupation earned more than that amount and half earned less.

Lerner Research Institute

The Cleveland Clinic Lerner Institute is located in Cleveland, Ohio. The Cleveland Clinic is a multinational research and hospital system that is home to over 240 labs that focus on basic, translational, and clinical research and is consistently ranked as one of the best hospital in the world by Newsweek.

 

5XÉçÇø

5XÉçÇø is located in Kent, Ohio and is the highest-ranked public university in northern Ohio. It is ranked the safest big college campus in Ohio & 25th in the country with over 25,000 students. Kent State is one of only five institutions in Ohio to be recognized as an R1 top-tier research university by the Carnegie Classification.

 

Cybersecurity - A.A.B.

Launch your career in cybersecurity with Kent State's program. Gain the skills needed to protect against cyber threats and secure networks in today's digital world.

Contact Us

Apply Now
Request Info
Schedule a Visit

Program Information for Cybersecurity - A.A.B.

Program Description

Full Description

The Associate of Applied Business degree in Cybersecurity provides students with an applied approach to information security concepts. With an ever-growing threat to sensitive and critical data in the field of information technology, understanding the impact of security issues on businesses and individuals is critical. The degree program gives students the tools they need to address current security issues including risk identification, security testing and monitoring, and enterprise risk management. Because the degree is built upon a solid knowledgebase, additional topics include networking, hardware and operating systems, Cisco networking technologies, cyber defense methods, cyber ethics, incident management and security policies.

Admissions for Cybersecurity - A.A.B.

Admission Requirements

The university affirmatively strives to provide educational opportunities and access to students with varied backgrounds, those with special talents and adult students who graduated from high school three or more years ago.

Kent State campuses at Ashtabula, East Liverpool, Geauga, Salem, Stark, Trumbull and Tuscarawas, and the Twinsburg Academic Center, have open enrollment admission for students who hold a high school diploma, GED or equivalent.

Some programs may require that students meet certain requirements before progressing through the program. For programs with progression requirements, the information is shown on the Coursework tab.

For more information on admissions, contact the Regional Campuses admissions offices.

Learning Outcomes

Program Learning Outcomes

Graduates of this program will be able to:

  1. Demonstrate core competency in cybersecurity-related topics.
  2. Describe the scope of the information security field and its impact on information technology.
  3. Identify and analyze security risks to determine potential impacts.
  4. Demonstrate ability to develop plans to mitigate security risks.
  5. Identify professional, legal and ethical behavior.
Coursework

Program Requirements

Major Requirements

Major Requirements (courses count in major GPA)
IT 11004SURVEY OF INFORMATION TECHNOLOGY 3
IT 11005INTRODUCTION TO OPERATING SYSTEMS AND NETWORKING TECHNOLOGY 3
IT 11009COMPUTER ASSEMBLY AND CONFIGURATION 4
IT 13000APPLIED SECURITY ESSENTIALS 3
IT 21002NETWORK SETUP AND CONFIGURATION 3
IT 21007CYBER ETHICS IN INFORMATION TECHNOLOGY 3
IT 21110NETWORK ROUTING AND SWITCHING 3
IT 21200ETHICAL HACKING 3
IT 21300INTRODUCTION TO SECURITY INCIDENT MANAGEMENT 3
IT 22000SURVEY OF IT CYBERSECURITY 3
IT 23000INTRODUCTION TO OPERATING SYSTEM SECURITY 3
IT 24000DEVELOPING AND IMPLEMENTING SECURITY POLICIES 3
Additional Requirements (courses do not count in major GPA)
UC 10001FLASHES 101 1
3
3
3
3
3
Information Technology (IT) Electives7
Minimum Total Credit Hours:60

Graduation Requirements

Minimum Major GPA Minimum Overall GPA
2.000 2.000
Roadmap

Roadmap

This roadmap is a recommended semester-by-semester plan of study for this major. However, courses designated as critical (!) must be completed in the semester listed to ensure a timely graduation.

Plan of Study Grid
Semester OneCredits
IT 11004 SURVEY OF INFORMATION TECHNOLOGY 3
IT 11005 INTRODUCTION TO OPERATING SYSTEMS AND NETWORKING TECHNOLOGY 3
UC 10001 FLASHES 101 1
Information Technology (IT) Elective 3
Kent Core Requirement 3
Kent Core Requirement 3
 Credit Hours16
Semester Two
IT 11009 COMPUTER ASSEMBLY AND CONFIGURATION 4
IT 13000 APPLIED SECURITY ESSENTIALS 3
IT 21002 NETWORK SETUP AND CONFIGURATION 3
Kent Core Requirement 3
 Credit Hours13
Semester Three
IT 21007 CYBER ETHICS IN INFORMATION TECHNOLOGY 3
IT 21110 NETWORK ROUTING AND SWITCHING 3
IT 21200 ETHICAL HACKING 3
IT 21300 INTRODUCTION TO SECURITY INCIDENT MANAGEMENT 3
Kent Core Requirement 3
 Credit Hours15
Semester Four
IT 22000 SURVEY OF IT CYBERSECURITY 3
IT 23000 INTRODUCTION TO OPERATING SYSTEM SECURITY 3
IT 24000 DEVELOPING AND IMPLEMENTING SECURITY POLICIES 3
Information Technology (IT) Elective 4
Kent Core Requirement 3
 Credit Hours16
 Minimum Total Credit Hours:60
Program Delivery
  • Delivery:
    • ​Fully online

Gennie Neuman Lambert (left) and Jenica Jenik (right) show students about theatre design, technology and production.

 In a world where creativity knows no boundaries, the vibrant halls of the College of the Arts make a canvas for artists of all abilities. Nearly 1,100 guests gathered at the Arts Without Limits 2024 event on Oct. 9 as the air buzzed with inspiration and new perspectives on artistic career paths.Though many artistically minded students may believe that they must sacrifice comfort for creativity, the Arts Without Limits event is designed to showcase the endless possibilities of future creative careers. Many partners such as the John S. and Marlene J. Brinzo Center for Entrepreneurship, Ken...

Panoramic view of Prague from a rooftop perspective
Return to Search Results

Theatre & Social Change / Medievalism in Czechia

Program Contact Information

Subscribe to