Skip navigation
A student looks at his computer screen: Pursue your B.S. in Cyber and Digital Forensics degree online at Regent University, Virginia Beach.

B.S. in Cyber & Digital Forensics

Defend. Protect. Secure.

Are you ready to take on criminals in the digital world? Regent’s Bachelor of Science in Cyber & Digital Forensics will prepare you to work in the highly advanced world of cyber defense. Taught from a Christian perspective, the program offers coursework in cybersecurity, digital forensics, and criminal justice to equip you with the skills to combat cyberattacks and cybercrimes.

Online
120
June 19, 2023
Download PDF

DEVELOP YOUR SKILLS

Examine, collect, preserve, and analyze digital “fingerprints” to assist legal proceedings and cybersecurity personnel.

BUILD ON A STRONG FOUNDATION

Anchor your knowledge and skill on Christian principles and values.

LEARN FROM THE BEST

Be mentored by faculty in Virginia Beach who hold the highest degrees in their field.

ALIGN YOURSELF WITH EXCELLENCE

Regent has been ranked among Top National Universities by the U.S. News & World Report for four years (2019, 2020, 2022 and 2023). Our programs have also ranked as the #1 Best Online Bachelor's Programs in Virginia 11 years in a row (2013-2023). We have also been recognized as a Military Friendly Top 10 School by Military Friendly®, 2022-23, and among the Top 10 Best for Vets Colleges: Online & Nontraditional by Military Times, 2020. Experience the Regent difference through the Bachelor of Science in Cyber & Digital Forensics degree program.

On completing the B.S. in Cyber & Digital Forensics program, you can:

  • Analyze cyber and digital forensics theories, principles, and practices
  • Utilize tools for detecting and reconstructing the infection event and timeline
  • Recommend solutions to real-world problems

Career Opportunities:

  • Computer Systems Analyst
  • Networks & Systems Engineer
  • Information Security Analyst
  • Digital Forensics Specialist
  • Cyber Risk Manager
  • Network Applications Supervisor
  • Intelligence Investigator
$104Thousand
Estimated mean annual wage for information security analysts U.S. Bureau of Labor Statistics, 2020
Discusses principles and practices of criminal investigation including crime scene conduct and procedures, collection and preservation of evidence, interview and interrogation techniques, development of leads, and the use of surveillance techniques. Addresses ethical issues related to the criminal case investigation.
Discusses criminal evidence rules in the United States. Emphasis to the exclusionary rule and the distinction between real and testimonial evidence. Trial procedures, examination of witnesses, real/physical evidence, circumstantial evidence, the hearsay rule, the opinion evidence rule, and judicial notice. Discusses ethical considerations related to seized and submitted evidence.
Examination and analysis of methods, key technical concepts, and tools for conducting successful digital forensic examinations in all three major operating systems encountered in a real world analysis. Prerequisite: ISYS 222.
Methods and tools for detecting and analyzing malware and reconstructing the infection event and timeline. Prerequisites: CYBR 320, ISYS 222, and ISYS 331.
Procedures for conducting mobile forensic investigations to include identification, preservation, examination, analysis, and report of mobile device data. Prerequisites: CYBR 340 and ISYS 222.
This capstone course builds on all forensic tools and concepts covered in the Cyber and Digital Forensics program. In this course the student will examine and utilize investigative techniques to address cybercrimes associated with computing environments to include the Internet. Prerequisites: CRJU 280, CRJU 335, CYBR 430, and ISYS 222.
Computer systems, networks, databases, intellectual property, computer security, artificial intelligence, legal and ethical considerations, codes of conduct, privacy, computer crimes, and the future of computing and the Internet and their relationship to the business world.
Introduces programming fundamentals. Use of algorithms and computer logic to translate data into information through structured design, coding, testing, and program debugging, writing programs in high-level, object-oriented language.
Recovery of evidence from any media or digital device that can store or transmit data. Best practices and current techniques for capturing and analyzing digital evidence to support a criminal or civil complaint in court.
Introduction to relational database management systems through the study of the tools and techniques of database analysis and design. Attention to data modeling, designing relational databases, normalization, and relationships, using modern database applications to create tables, queries, forms and reports. Prerequisite: ISYS 214.
Students gain in-depth knowledge of networking and telecommunications fundamentals including LANs, MANs, WANs, intranets, the Internet, and the WWW. Attention to data communication and telecommunication concepts, models, standards, and protocols in the context of installation, configuration, systems integration, and management of infrastructure technologies. Prerequisites: ISYS 204 and Sophomore standing.
Business and government are facing a rapidly expanding need for information assurance professionals. Information protection program design, internetworking and application security, the development of information security safeguards and information security auditing, disaster recovery, policy development, identity management, and effective threat assessment. Prerequisites: ISYS 204 and Sophomore standing.
Securing the systems that run our computers is the key to ensuring that our essential information remains safe and available. This course provides the essentials for understanding the threats to systems security, the methods to counter these threats, and some practical work in systems security. A computer system with appropriate software is required. Prerequisite: ISYS 331.
Information security must be a significant part of any business plan today, and managers in this field must remain aware of the principles and methodology of managing information security. Provides an in-depth view of the management of information security for government, corporations, and other institutions. Prerequisite: ISYS 331.
Global and local networks provide capabilities that have become essential in the success of the world economy for businesses and individuals. Defending these systems against attacks through the use of worms, viruses, and other criminal acts is imperative. Provides a solid foundation in the fundamentals of network security and some hands-on experience in the installation and utilization of firewalls and intrusion detection systems. Prerequisite: ISYS 331.
Introductory study of basic descriptive and inferential statistics with an emphasis on real world applications and the use of current technology. Topics include sampling, random variables, probability distributions, measures of central tendency and variation, and testing of hypotheses. Cannot be applied to the mathematics major.

Step 1: Apply to Regent University

Step 2: Submit Your Unofficial Transcripts

  • Email your unofficial high school or college transcripts to apply@regent.edu using the subject line: Unofficial Transcripts.
  • Upon conditional acceptance, Regent University will attempt to obtain your official transcripts from your U.S. degree-granting institution.
  • International transcripts must be evaluated by a NACES-approved company.

Step 3: Submit Your Government-Issued ID if Applicable

  • All online students and graduate level on-campus students are required to email a photo of your government-issued ID to apply@regent.edu using the subject line: Government ID.
  • Please note that all items submitted as part of the application process become the property of Regent University and cannot be returned.

Step 4: Submit Your FAFSA

  • Complete your Free Application for Federal Student Aid (FAFSA) at studentaid.gov Regent’s school code is 030913.
DegreeTuition Block Rate Per SemesterCredit Hours Per SemesterTuition Rate Per Year
Students taking on-campus classes
(fall & spring semesters)
$9,492.5012 - 18$18,985
DegreeTuition Cost Per Credit HourAverage Credit Hours Per SemesterAverage Tuition Per Semester
Students taking on-campus classes
(fall & spring semesters)
$630Under 12$7,560
Students taking on-campus classes
(fall & spring semesters)
$630Over 18$11,340
Students taking on-campus classes
(summer semester)
$630N/A$1,890+

Student Fees Per Semester

University Services Fee (On-Campus Students)$850

Housing Fees »

DegreeTuition Cost Per Credit HourAverage Credit Hours Per SemesterAverage Tuition Per Semester
Part-Time Students (3-11 Credit Hours Per Semester)$4506$2,700
Full-Time Students (12+ Credit Hours Per Semester)$39512$4,740

Student Fees Per Semester

University Services Fee (Online Students)$700

Military Admissions & Aid »

DegreeTuition Block Rate Per SemesterCredit Hours Per SemesterTuition Block Rate Per Semester
Students taking on-campus classes
(fall & spring semesters)
$9,04012 - 18$9,040
DegreeTuition Cost Per Credit HourAverage Credit Hours Per SemesterAverage Tuition Per Semester
Students taking on-campus classes
(fall & spring semesters)
$603Under 12$7,236
Students taking on-campus classes
(fall & spring semesters)
$603Over 18$10,854
Students taking on-campus classes
(summer semester)
$603N/A$1,809+

Student Fees Per Semester

University Services Fee (On-Campus Students)$800 (Fall & Spring)
$650 (Summer)

Housing Fees »

DegreeTuition Cost Per Credit HourAverage Credit Hours Per SemesterAverage Tuition Per Semester
Part-Time Students (3-11 Credit Hours Per Semester)$4506$2,700
Full-Time Students (12+ Credit Hours Per Semester)$39512$4,740

Student Fees Per Semester

University Services Fee (Online Students)$650

Military Admissions & Aid »

Cyber & Digital Forensics Program Learning Outcomes

  1. Analyze cyber and digital forensics theories, principles, and practices.
  2. Apply professional, ethical, and responsible behaviors to tangible technological situations.
  3. Develop ethical, innovative and practical solutions, from a global perspective based on the evaluation of cyber and digital forensic strategies and protocols.
  4. Recommend solutions to real-world problems based on digital forensic application and data-driven assessments.
  5. Apply knowledge of course content within a Biblical worldview.

“Greatness is deposited into the hearts of every student through this university. It's a greatness to serve with excellence, humility, and a commitment to respond both in heart and mind to the work ahead.”

Lauren Dennis, B.S. in Biophysical Sciences, 2020 Student Research Assistant, Children's Hospital of Pittsburgh

“When I think about Regent, I think about the wonderful people I met here that have supported and loved me with the love of Christ; they helped me make college a home away from my home in Guatemala.”

Elisa Sosa, B.A. in Animation, 2019 Photographer

“I have loved every minute of the Honor’s program. One thing that has continually surprised me has been the willingness of faculty members to take you under their wing and help you improve your skills.”

Luke Isbell, B.A. in International Studies, 2020 Full-time student; professional photographer

“Making the switch from community college to Regent was a flawless process and the best decision ever. I’m so proud I have ‘Regent graduate’ connected to my story.”

Hanna Bishop, B.A., 2015 Christian Ministry