Program Overview

  • Duration

    6 Months (Self-Paced) Program

    Can be done in 6 months

  • Total Courses

    05

  • Total Credit Hours

    30

The Cyber Crime program at Hudson Bay University is at the forefront of the battle against cyber threats and digital crime. Students delve into the world of cybersecurity, digital forensics, and cybercrime investigation. The curriculum covers cyberattack prevention, evidence collection from digital devices, and cyber law. Graduates are well-prepared to combat cybercrime in law enforcement agencies, government organizations, and private cybersecurity firms.

FOUNDATIONS OF CRIMINAL LAW AND JUSTICE SYSTEMS:

The College of Criminal Justice begins with a comprehensive exploration of criminal law and justice systems. Students acquire a deep understanding of legal principles, criminology, and law enforcement practices. This foundational knowledge equips them with the skills necessary to navigate the complex world of criminal justice.


PRACTICAL EXPERIENCE AND COMMUNITY ENGAGEMENT:

Beyond the classroom, our College of Criminal Justice places a strong emphasis on practical experience and community engagement. Students have opportunities to intern with law enforcement agencies, participate in mock trials, and engage with local communities. These experiences not only enhance their practical skills but also provide valuable insights into the criminal justice field.


GLOBAL CRIMINAL JUSTICE ISSUES AND CROSS-BORDER COLLABORATIONS:

The College of Criminal Justice at Hudson Bay University is committed to addressing global criminal justice issues and fostering cross-border collaborations. Our curriculum explores international perspectives on crime and justice and encourages students to engage in collaborative research and initiatives with organizations worldwide. This global perspective equips students to tackle complex challenges in the realm of criminal justice.

Students explore data recovery techniques, learning how to retrieve lost or damaged data from digital storage devices. This course covers data restoration processes and tools.


This course delves into network defense strategies, teaching students how to safeguard computer networks from cyber threats and attacks. Topics include security protocols and intrusion detection.


Students learn about computer crime investigation, including digital evidence collection, analysis, and the legal aspects of cybercrime investigations.


This course delves into the legal and ethical aspects of technology-related crimes, covering cybercrime laws, regulations, and ethical considerations in the high-tech industry.


In this course, students receive an introduction to the field of cybercrime, studying the types of cybercrimes, their impact, and strategies for prevention and investigation.

Cost of Attendance

Tuition Fee Breakdown Cost
GRADUATE DIPLOMA IN CRIMINAL JUSTICE $6,450
Medical Insurance $0.00
Personal Expenses $0.00
Study Materials $0.00
Food Cost $0.00
Total Tuition Fee $6,450
WHERE AFFORDABILITY

Meets Opportunity

At Hudson Bay University, we believe in where affordability meets opportunity. Our commitment to accessible education ensures that quality learning doesn't come with a hefty price tag. We open the doors to knowledge, offering students the chance to thrive without the burden of overwhelming tuition fees, empowering them for a brighter future.

Our Eligibility Criteria

Explore HBU’s Eligibility Criteria for Students Worldwide

Eligibility Criteria

Bachelor's degree, or equiv. International Education

Credit Hours

30

Course Duration

6 Months (Self-Paced) Program

Courses Offered

05

Data Recovery Techniques (CYC-050)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Introduction To Disaster Recovery
     Preparing To Develop The Disaster Recovery Plan
  In Section 2 of this course you will cover these topics:
     Assessing Impact And Risks In The Enterprise
     Prioritizing Systems And Functions For Recovery
  In Section 3 of this course you will cover these topics:
     Identifying Data Storage And Recovery Sites
     Developing Plans And Procedures, And Relationships
  In Section 4 of this course you will cover these topics:
     Developing Procedures For Special Circumstances
     Testing The Disaster Recovery Plan
  In Section 5 of this course you will cover these topics:
     Continued Assessment Of Needs, Threats, And Solutions

Network Defense (CYC-090)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Introduction To Network Security
     Types Of Attacks
     Fundamentals Of Firewalls
  In Section 2 of this course you will cover these topics:
     Firewall Practical Applications
     Intrusion Detection Systems
     Encryption
  In Section 3 of this course you will cover these topics:
     Virtual Private Networks
     Operating System Hardening
     Defending Against Virus Attacks
  In Section 4 of this course you will cover these topics:
     Defending Against Trojan Horses And Spyware
     Security Policies
     Assessing A System
  In Section 5 of this course you will cover these topics:
     Security Standards
     Computer-Based Espionage And Terrorism

Computer Crime Investigation (CYC-091)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Introduction
     Computer Terminology And History
     History Of Crime And Computer Crime  
  In Section 2 of this course you will cover these topics:
     Computers As Targets    
     Avenues For Prosecution And Government Efforts    
     Applying The First Amendment To Computer-Related Crime  
  In Section 3 of this course you will cover these topics:
     The Fourth Amendment    
     Computer Forensic Terminology And Computer Investigations  
     Developing Computer Forensic Science Capabilities  
  In Section 4 of this course you will cover these topics:
     Computer Investigations: Pre-Search Activities  
     On-Scene Activities    
  In Section 5 of this course you will cover these topics:
     Data Analysis
     Conclusions And Future Issues

Technology Crimes & Law (CYC-335)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Intranet
     Extranets
     Internet Usage
     Legacy Systems Integration
  In Section 2 of this course you will cover these topics:
     Electronic Commerce Strategy
     Electronic Commerce Tools
     Getting Started Managing Your Web Site
     Site Maintenance
  In Section 3 of this course you will cover these topics:
     Site Traffic
     Growth, Revision, And Migration
     Getting Started On The Web
     Advanced Features And Accessibility
  In Section 4 of this course you will cover these topics:
     Copyright Law Basics
     Steering Clear Of Copyright Infringement
     Other Important Laws
     System Operator Liability For Copyright Infringement By Users
  In Section 5 of this course you will cover these topics:
     Web Development Agreements
     Linking, Framing, Caching, And Meta Tags
     Web Site Terms Of Use And Clickwraps
     Domain Names

Ethics & High Technology (CYC-364)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Introduction: Why Computer Ethics?
     Philosophical Ethics
  In Section 2 of this course you will cover these topics:
     Professional Ethics
     Ethics And The Internet I: Ethics Online
  In Section 3 of this course you will cover these topics:
     Privacy
  In Section 4 of this course you will cover these topics:
     Property Rights In Computer Software
  In Section 5 of this course you will cover these topics:
     Accountability And Computer And Information Technology
     Ethics And The Internet Ii: Social Implications And Social Values