Jan 19, 2022
Forensic Science technicians aid criminal investigations by collecting and analyzing evidence. Many technicians specialize in either crime scene investigation or laboratory analysis. Most forensic science technicians spend some time writing reports.
This offering is available in the following modes:
Face-to-face, Fully online
With this award, you may seek jobs such as:
Forensic Science Technicians
Related Degrees and Certificates:
Information Assurance & Cyber Security A.A.S.
CompTIA Security+ Certification Preparation Occupational Skills Award
♦ — This symbol indicates the offering is also available fully online.
Total Credit Hours Required: 22
A course may be used only once to fulfill degree requirements.
The student is encouraged to carefully examine requirements at the transfer institution. Requirements vary from institution to institution and can change from one year to the next.
# Offered at other Alamo Colleges
Program CIP: 11.0901
Major Code: CFOR
Gainful Employment Information
The U.S. Department of Education requires colleges to disclose information for any financial aid eligible program that “prepares students for gainful employment in a recognized occupation.”
In accordance with these requirements we are providing the following information:
1. Standard Occupational Classification (SOC) codes
2. On-time graduation rates
3. Cost of the program to include books and fees
4. Placement rate for students completing the program
5. Median loan debt incurred by students who have completed the program
The information provided s the best available and represents data for one year.
More specific information about occupations can be found at the O*NET Resource Center.
Gainful Employment Information for Computer Forensics Certificate
*** denotes Milestone course(s).
A milestone course is a course that is critical for success in this program.
Additional Program Information
Designed for information technology specialists, systems analysts and network administrators, this program is especially beneficial for individuals within law enforcement, private corporations or public agencies who are asked to search for and identify hidden digital data, or to analyze employee computer usage, stored or copied files, e-mail and Internet history.
Program content includes laws governing the collection of digital evidence, documentation of findings for corporate or organizational use, procedures for presentation and acceptance of digital data as evidence in legal proceedings, and a variety of software programs and tools used to identify, replicate and analyze digital data without corrupting it.