header partial here
/TF
Technology Forensics
bs

Home | Advancing Technology Degrees | Technology Forensics

Technology Forensics Degree

A technology forensics specialist is an information technology professional who supports the military, corporate, law enforcement and legal communities in the investigation and analysis of digital data.

Students in the Technology Forensics degree program will learn methods to obtain and document digital information, determine how information was compromised, trace attribution of malicious code and reverse engineer data to develop mitigations and countermeasures.

UAT's Technology Forensics degree will prepare students to anticipate new and emerging technologies so they can be successful within the rapidly evolving digital forensics environment and the increasingly complex threat landscape.

Graduates from the Technology Forensics program will have both the technical skills for recovering evidence and the presentation skills to provide both detailed technical and summary data to interested parties. Above all, this program will focus on learning the highly technical and cutting-edge technologies affecting IT systems today and tomorrow.

1
2
3

Request Info

Provide your information below and an Admissions Advisor will contact you shortly to answer your questions about UAT and your advancing technology degree program of interest.

 
 
Next
Previous
 
Next
University of Advancing Technology (UAT) is pleased to provide you with additional information about the college and its programs. By hitting submit, you give us permission to use either direct-dialed, autodialed and/or pre-recorded telemarketing to call or text you at the phone number you provided. Please note that such consent is not required to attend UAT.
Previous
 
Submit
View full size

TECHNOLOGY FORENSICS DEGREE OBJECTIVES

  • Articulate the complexities of network and application infrastructure and apply critical thinking skills to how they affect technology forensics investigations and incident response procedures.
  • Identify and apply, in a forensics context, the various topologies, standards, technologies and protocols employed in computer systems, including file system formats and their attributes.
  • Evaluate, select and deploy computer forensic measures for the response, mitigation and analysis of a security incident pertaining to digital artifacts and how information was compromised.
  • Analyze and evaluate the current investigative and legal aspects of information and computer forensics, including electronic discovery, depositions, litigation and corporate personnel processes.
  • Evaluate and execute the strategies, methodologies, techniques, and state-of-the-art forensics tools for the preservation of digital evidence on computer systems, network systems and other electronic devices.
  • Create tracking processes to follow the trail of electronic evidence through digital systems, including documentation, formal reporting and presentation.

Meet our skilled faculty

Educating the next wave of innovators, our faculty leverage their experiences to mentor students to lead innovations and solve challenges in advancing technology.

EXPLORE OUR DEGREES
Synchronic Learning: superior graduates, mentored education, flexible Syncflex learning.

WHY UAT?

UAT’s Synchronic Learning model provides an education framework that prepares superior graduates to become tomorrow’s innovators. This model embodies UAT’s methodologies, curricula and community dedicated to fostering an environment of innovation that promotes demonstrated mastery and job readiness.

How does UAT prepare superior graduates? Students are required to participate in projects that solve real problems. UAT requires students to innovate and create a working proof of concept that’s never been done before. Students complete internships, community projects and apprenticeship experiences to cultivate their ability to succeed in the workplace.

LEARN MORE

WANT TO EARN THIS DEGREE ONLINE?

FROM THE UAT TECH BLOG

FOLLOW US!

Forecasting the Future with Alexander AI

SIP Title: Alexander AIStudent Names: • Chris[...]

What is Kali Linux?

Kali Linux, formerly Backtrack Linux, is a Debian-based and open-source operating system distribution with the intention of making penetration test and auditing tools[...]

Running Your Own Email Server

What is MIAB? Running your own email service provider sounds like a daunting task[...]


Commencement Ceremony


Filing the Arizona STEM Pipeline

UAT Accreditation and Recognition

nsa

Network Security curriculum certified by the US National Security Agency's Information Assurance Courseware Evaluation program

cae