Program Overview

  • Duration

    1 Year (Self-Paced) Program

    Can be done in 6 months

  • Total Courses

    14-18

  • Total Credit Hours

    84-140

The Cyber Crime program at Hudson Bay University is at the forefront of the battle against cyber threats and digital crime. Students delve into the world of cybersecurity, digital forensics, and cybercrime investigation. The curriculum covers cyberattack prevention, evidence collection from digital devices, and cyber law. Graduates are well-prepared to combat cybercrime in law enforcement agencies, government organizations, and private cybersecurity firms.

FOUNDATIONS OF CRIMINAL LAW AND JUSTICE SYSTEMS:

The College of Criminal Justice begins with a comprehensive exploration of criminal law and justice systems. Students acquire a deep understanding of legal principles, criminology, and law enforcement practices. This foundational knowledge equips them with the skills necessary to navigate the complex world of criminal justice.


PRACTICAL EXPERIENCE AND COMMUNITY ENGAGEMENT:

Beyond the classroom, our College of Criminal Justice places a strong emphasis on practical experience and community engagement. Students have opportunities to intern with law enforcement agencies, participate in mock trials, and engage with local communities. These experiences not only enhance their practical skills but also provide valuable insights into the criminal justice field.


GLOBAL CRIMINAL JUSTICE ISSUES AND CROSS-BORDER COLLABORATIONS:

The College of Criminal Justice at Hudson Bay University is committed to addressing global criminal justice issues and fostering cross-border collaborations. Our curriculum explores international perspectives on crime and justice and encourages students to engage in collaborative research and initiatives with organizations worldwide. This global perspective equips students to tackle complex challenges in the realm of criminal justice.

Crime Management focuses on strategies for managing and reducing crime. Students study crime prevention, intervention, and community-based approaches to crime control.


Learn about sociology, emphasizing the study of sociological principles, social structures, and human behavior in society. Analyze sociological perspectives, research methods, and sociological analysis.


Current Issues In Criminal Justice addresses current challenges and trends in the criminal justice system. Students study contemporary issues in law enforcement, courts, and corrections.


Criminal Procedures covers legal processes in criminal cases. Students study search and seizure, due process, and the rights of the accused in the criminal justice system.


Investigation provides an understanding of criminal investigation techniques. Students learn about crime scene analysis, evidence collection, and investigative procedures.


Comparative Criminal Justice Systems explores the differences and similarities between criminal justice systems worldwide. Students study legal traditions, policing, and corrections in various countries.


Gain an introduction to laws and legal systems, exploring their role in society, the development of legal principles, and their impact on individuals and institutions. Study the historical development of legal systems, legal principles, and the role of law in society.


Laws And Criminal Procedures delves into the legal framework of the criminal justice system. Students study criminal laws, court procedures, and legal principles relevant to criminal justice.

Students explore data recovery techniques, learning how to retrieve lost or damaged data from digital storage devices. This course covers data restoration processes and tools.


This course delves into network defense strategies, teaching students how to safeguard computer networks from cyber threats and attacks. Topics include security protocols and intrusion detection.


Students learn about computer crime investigation, including digital evidence collection, analysis, and the legal aspects of cybercrime investigations.


This course delves into the legal and ethical aspects of technology-related crimes, covering cybercrime laws, regulations, and ethical considerations in the high-tech industry.


In this course, students receive an introduction to the field of cybercrime, studying the types of cybercrimes, their impact, and strategies for prevention and investigation.


Students explore the principles and techniques of cryptography, including encryption methods and their applications in information security.

Cost of Attendance

Tuition Fee Breakdown Cost
ASSOCIATE TO BACHELOR'S DEGREE (ABCJ) $18,480
Medical Insurance $0.00
Personal Expenses $0.00
Study Materials $0.00
Food Cost $0.00
Total Tuition Fee $18,480
WHERE AFFORDABILITY

Meets Opportunity

At Hudson Bay University, we believe in where affordability meets opportunity. Our commitment to accessible education ensures that quality learning doesn't come with a hefty price tag. We open the doors to knowledge, offering students the chance to thrive without the burden of overwhelming tuition fees, empowering them for a brighter future.

Our Eligibility Criteria

Explore HBU’s Eligibility Criteria for Students Worldwide

Eligibility Criteria

High School Diploma, GED or equiv. International Education

Credit Hours

84-140

Course Duration

1 Year (Self-Paced) Program

Courses Offered

14-18

Introduction To Criminology (CJ-125)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Criminology And The Sociological Perspective  
     Public Opinion, The News Media And The Crime Problem  
     The Measurement And Patterning Of Criminal Behavior  
     Victims And Victimization  
  In Section 2 of this course you will cover these topics:
     Explaining Crime: Emphasis On The Individual  
     Sociological Theories: Emphasis On Social Structure
     Sociological Theories: Emphasis On Social Process
     Sociological Theories: Critical Perspectives
  In Section 3 of this course you will cover these topics:
     Violent Crime: Homicide, Assault, And Robbery
     Violence Against Women And Children
     Property Crimes
  In Section 4 of this course you will cover these topics:
     White-Collar And Organized Crime  
     Political Crime
     Consensual Crime  
  In Section 5 of this course you will cover these topics:
     Policing: Dilemmas Of Crime Control In A Democratic Society
     Prosecution And Punishment  
     Conclusion: How Can We Reduce Crime?  

Sociology (SS-126)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     The Sociological Perspective
     Sociological Investigation
     Culture
     Society
     Socialization
  In Section 2 of this course you will cover these topics:
     Social Interaction In Everyday Life
     Groups And Organizations
     Sexuality And Society
     Deviance
     Social Stratification
  In Section 3 of this course you will cover these topics:
     Social Class In The United States
     Global Stratification
     Gender Stratification
     Race And Ethnicity
     Aging And The Elderly
  In Section 4 of this course you will cover these topics:
     The Economy And Work
     Politics And Government
     Families
     Religion
     Education
  In Section 5 of this course you will cover these topics:
     Health And Medicine
     Population, Urbanization, And Environment
     Collective Behavior And Social Movements
     Social Change: Traditional, Modern, And Postmodern Societies

Corrections (CJ-448)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     The History Of Crime And Corrections  
     Sentencing And The Correctional Process  
     Jails  
     Probation And Intermediate Sanctions  
  In Section 2 of this course you will cover these topics:
     Prison Systems  
     Parole And Prisoner Reentry  
     The Clients Of Adult Correctional Agencies  
  In Section 3 of this course you will cover these topics:
     The Juvenile Correctional System  
     Special Offenders  
     The Management Of Prisons  
  In Section 4 of this course you will cover these topics:
     Prison Life For Inmates  
     The World Of Prison Staff  
     Custody And Treatment  
  In Section 5 of this course you will cover these topics:
     Legal Issues And The Death Penalty  
     Issues In Corrections  
     Questions Regarding The Future Of Corrections  

Issues In Criminal Justice (CJ-493)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Introduction To White-Collar Crime
     Crimes Against Consumers  
     Unsafe Products  
  In Section 2 of this course you will cover these topics:
     Environmental Crime  
     Institutional Corruption: Mass Media And Religion  
     Securities Fraud  
  In Section 3 of this course you will cover these topics:
     Corporate Fraud  
     Fiduciary Fraud  
     Crimes By The Government  
  In Section 4 of this course you will cover these topics:
     Corruption Of Public Officials
     Medical Crime  
  In Section 5 of this course you will cover these topics:
     Computer Crime  
     Conclusions  

Criminal Procedures (CJ-519)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Criminal Procedures In Perspective
     Fundamental Concepts Of Law  
     The Exclusionary Rule  
  In Section 2 of this course you will cover these topics:
     Police-Citizen Contacts: Consensual Encounters And Detentions  
     Laws And Procedures Of Arrest  
     Miranda: Its Meaning And Application  
  In Section 3 of this course you will cover these topics:
     Booking And Jail Custody Procedures  
     The Adversary System: Roles Of The Prosecution And Defense  
     The Court Structure And Pretrial Procedures  
  In Section 4 of this course you will cover these topics:
     Trial Procedures  
     Defense Strategies And Trial Outcomes  
  In Section 5 of this course you will cover these topics:
     Sentencing Procedures And Alternatives  
     Post-Sentencing Procedures  

Investigation (CJ-585)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Criminal Investigation: An Overview  
     The Preliminary Investigation      
     Field Notes, Documenting, Reporting The Crime Scene  
     Search And Seizure  
     Identification Of Criminal Suspects  
  In Section 2 of this course you will cover these topics:
     The Criminal Intelligence Function  
     Undercover And Surveillance Operations  
     Making An Arrest    
     Interviews And Interrogation                      
  In Section 3 of this course you will cover these topics:
     Development And Management Of Informants  
     Wrongful Death      
     Robbery                              
     Assault And Related Offenses  
  In Section 4 of this course you will cover these topics:
     Sex Offenses    
     Child Abuse And Neglect  
     Burglary  
     Larceny-Theft  
  In Section 5 of this course you will cover these topics:
     Motor Vehicle Theft   
     Arson And Bombings  
     Drug Offenses  
     Preparation For Court  

Introduction to laws (LLS-642)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     The Paralegal Profession
     Ethics, Regulation And Professional Responsibility
     The Paralegal Workplace
  In Section 2 of this course you will cover these topics:
     Technology And The Paralegal
     Sources Of American Law
  In Section 3 of this course you will cover these topics:
     The Court System And Alternative Dispute Resolution
     Civil Litigation
  In Section 4 of this course you will cover these topics:
     Administrative Law
     Interviewing And Investigation Skills
  In Section 5 of this course you will cover these topics:
     Traditional, Computer And Internet Legal Research
     Legal Writing And Critical Legal Thinking

Comparative Criminal Justice Systems (CJ-720)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     An International Perspective  
     Crime, Transnational Crime And Justice  
  In Section 2 of this course you will cover these topics:
     An American Perspective On Criminal Law  
     Legal Traditions  
  In Section 3 of this course you will cover these topics:
     Substantive Law And Procedural Law In The Four Legal Traditions  
     An International Perspective On Policing  
  In Section 4 of this course you will cover these topics:
     An International Perspective On Courts  
     An International Perspective On Corrections  
  In Section 5 of this course you will cover these topics:
     An International Perspective On Juvenile Justice  
     Japan: Examples Of Effectiveness And Borrowing  

Data Recovery Techniques (CYC-050)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Introduction To Disaster Recovery
     Preparing To Develop The Disaster Recovery Plan
  In Section 2 of this course you will cover these topics:
     Assessing Impact And Risks In The Enterprise
     Prioritizing Systems And Functions For Recovery
  In Section 3 of this course you will cover these topics:
     Identifying Data Storage And Recovery Sites
     Developing Plans And Procedures, And Relationships
  In Section 4 of this course you will cover these topics:
     Developing Procedures For Special Circumstances
     Testing The Disaster Recovery Plan
  In Section 5 of this course you will cover these topics:
     Continued Assessment Of Needs, Threats, And Solutions

Network Defense (CYC-090)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Introduction To Network Security
     Types Of Attacks
     Fundamentals Of Firewalls
  In Section 2 of this course you will cover these topics:
     Firewall Practical Applications
     Intrusion Detection Systems
     Encryption
  In Section 3 of this course you will cover these topics:
     Virtual Private Networks
     Operating System Hardening
     Defending Against Virus Attacks
  In Section 4 of this course you will cover these topics:
     Defending Against Trojan Horses And Spyware
     Security Policies
     Assessing A System
  In Section 5 of this course you will cover these topics:
     Security Standards
     Computer-Based Espionage And Terrorism

Computer Crime Investigation (CYC-091)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Introduction
     Computer Terminology And History
     History Of Crime And Computer Crime  
  In Section 2 of this course you will cover these topics:
     Computers As Targets    
     Avenues For Prosecution And Government Efforts    
     Applying The First Amendment To Computer-Related Crime  
  In Section 3 of this course you will cover these topics:
     The Fourth Amendment    
     Computer Forensic Terminology And Computer Investigations  
     Developing Computer Forensic Science Capabilities  
  In Section 4 of this course you will cover these topics:
     Computer Investigations: Pre-Search Activities  
     On-Scene Activities    
  In Section 5 of this course you will cover these topics:
     Data Analysis
     Conclusions And Future Issues

Technology Crimes & Law (CYC-335)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Intranet
     Extranets
     Internet Usage
     Legacy Systems Integration
  In Section 2 of this course you will cover these topics:
     Electronic Commerce Strategy
     Electronic Commerce Tools
     Getting Started Managing Your Web Site
     Site Maintenance
  In Section 3 of this course you will cover these topics:
     Site Traffic
     Growth, Revision, And Migration
     Getting Started On The Web
     Advanced Features And Accessibility
  In Section 4 of this course you will cover these topics:
     Copyright Law Basics
     Steering Clear Of Copyright Infringement
     Other Important Laws
     System Operator Liability For Copyright Infringement By Users
  In Section 5 of this course you will cover these topics:
     Web Development Agreements
     Linking, Framing, Caching, And Meta Tags
     Web Site Terms Of Use And Clickwraps
     Domain Names

Ethics & High Technology (CYC-364)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Introduction: Why Computer Ethics?
     Philosophical Ethics
  In Section 2 of this course you will cover these topics:
     Professional Ethics
     Ethics And The Internet I: Ethics Online
  In Section 3 of this course you will cover these topics:
     Privacy
  In Section 4 of this course you will cover these topics:
     Property Rights In Computer Software
  In Section 5 of this course you will cover these topics:
     Accountability And Computer And Information Technology
     Ethics And The Internet Ii: Social Implications And Social Values

Introduction To Cyber Crime (CYC-671)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Why Study Information Security? At The End Of This Topic Student Will Be Able To: Understand Importance Of Information Security Understand Enterprise Information Security Architecture Topics Understand Positioning Understand Goals Understand Methodology Understand High-Level Security Architecture Framework Understand Relationship To Other It Disciplines
     Information Security Principles Of Success At The End Of This Topic Student Will Be Able To Understand: Key Concepts Confidentiality Integrity Availability Authenticity Non-Repudiation Risk Management Controls Administrative Logical Physical Security Classification For Information Access Control Cryptography Defense In Depth
     Certification Programs And The Common Body Of Knowledge At The End Of This Topic Student Will Be Able To Understand: Introduction To Certification Types Of Certifications In Accountancy British Qualified Accountants: American Qualified Accountants Personal Finance Public Finance In Aviation In Computer Technology In Economic Development In Health Sector In Language Teaching In Legal Affairs In Logistics Transport In Project Management In Security Other Applications Computer Technologies Cbk Development Structure And Content
  In Section 2 of this course you will cover these topics:
     Security Management At The End Of This Topic Student Will Be Able To: Understand Three Primary Rules Are Defined For Rbac: Understand Role-Based Access Control Understand Two Methods Are Commonly Used For Applying Mandatory Access Control: Understand Mandatory Access Control Understand Discretionary Access Control Understand Access Control Techniques Understand Accountability Understand Authorization Understand Identification And Authentication (Ia) Understand Computer Security Understand Access Control System Topologies Understand Security Risks Understand Types Of Readers Understand Access Control Door Wiring Understand Access Control System Components Understand Credential Understandaccess Control System Operation
     Security Architecture And Models At The End Of This Topic Student Will Be Able To:  Ea Framework Topics History Overview Graham-Denning Model
     Business Continuity Planning And Disaster Recovery Planning At The End Of This Topic Student Will Be Able To Understand: Maintenance Testing And Organizational Acceptance Implementation Solution Design Analysis Introduction Introduction To Disaster Recovery Classification Of Disasters Security Holes Strategies Control Majors In Recovery Plan General Steps To Follow While Creating Bcp/Drp
  In Section 3 of this course you will cover these topics:
     Law, Investigations, And Ethics At The End Of This Topic Student Will Be Able To Understand: Background Legal Enactments Examples Information Technology Lawyer Enforcement Agencies
     Physical Security Control At The End Of This Topic Student Will Be Able To: Understand Elements And Design
     Operations Security At The End Of This Topic Student Will Be Able To Understand: Identification Of Critical Information. Analysis Of Threats. Analysis Of Vulnerabilities. Assessment Of Risk. Application Of Appropriate Opsec Measures.
  In Section 4 of this course you will cover these topics:
     Access Control Systems And Methodology At The End Of This Topic Student Will Be Able To Understand: Identification And Authentication (Ia) Authorization Accountability Access Control Techniques Discretionary Access Control Mandatory Access Control Two Methods Are Commonly Used For Applying Mandatory Access Control: Role Based Access Control Three Primary Rules Are Defined For Rbac:
     Cryptography At The End Of This Topic Student Will Be Able To Understand: Terminology History Of Cryptography And Cryptanalysis Modern Cryptography Legal Issues Involving Cryptography
     Telecommunications, Network, And Internet Security At The End Of This Topic Student Will Be Able To Understand: Comparison With Information Security Network Security Concepts Security Management Small Homes Medium Businesses Large Businesses School Large Government Details Of Routers Anti-Virus Anti-Spyware Browser Choice Buffer Overflow Attacks Telecommunications Security
  In Section 5 of this course you will cover these topics:
     Application Development Security At The End Of This Topic Student Will Be Able To: Determine The Importance Of Security Considerations As A Part Of The System Development Life Cycle (Sdlc). Outline An Accelerated History Of The Sdlc And Its Purpose. Analyze The Structure And Roles Of The Sdlc Task Force Committee Subgroups. Categorize Application Development Issues Related To Infosec. Apply Their Understanding Of These Issues To The Distributed Software Environment (I.E., The Client/Server Implementation). Distinguish Among Several Major Types Of Malicious Software (Malware). Outline The Types And Uses Of Antivirus Software.
     Securing The Future At The End Of This Topic Student Will Be Able To: Establish Plans For Continuous Monitoring And Compliance Enforcement. Discuss The Future Of Information Technology (It) Software Security Developments And The Outlook For Infosec Professionals. Discuss The Issues That Drive The Growth Of The Industry, Technology, And Regulations.