Program applications are accepted January 12 through April 10, 2015.
The world of information security and digital forensics is an exciting career possibility—and, at CWI, you have an opportunity to join the front line combating hackers who are compromising computers around the world. The goal of this program is to prepare security professionals to protect an organization’s data by taking preemptive measures against malicious attacks and to perform forensic investigation if security is breached.
All students accepted into the program must submit to a criminal background check at their own expense.
The College of Western Idaho (CWI) provides an Information Security and Digital Forensics program that will ready you with advanced, market-relevant skills that employers recognize and respect as well as opportunities to connect with a global community of industry professionals
Why This Program
Computers around the world are systematically victimized by rampant hacking. This hacking is not only widespread, but it is being executed so flawlessly that the attackers compromise a system, steal everything of value, and completely erase their tracks within 20 minutes. This program will prepare technicians to protect an organization’s data by taking preemptive measures against malicious attacks.
What You Will Learn to Do
- Install and configure computer hardware and software
- Install, configure, troubleshoot, and maintain local and wide-area computer network systems
- Use data communication protocols
- Solve software application problems
- Troubleshoot hardware problems
- Set up, print from, program, and back-up computers
- Work within a TCP/IP environment
- Communicate well with customers
- Write a resume, search for a job, and interview effectively
- Further skills will be learned in the area of specialization
Requirements and Costs
Degrees and Certificates
Associate of Applied Science in Information Security and Digital Forensics
Advanced Technical Certificate in Information Security and Digital Forensics
Program Specific Dates
Program applications are accepted January 12 through April 10, 2015. .
Notification of Placement is due June 1, 2014.
In order to be registered for the Fall 2014 semester, all accepted IT students must provide the Letter of Intent by June 16, 2014.
Important Dates for Credit Programs
|Fall 2014||Spring 2015||Summer 2015|
|Registration Open||April 14||November 10||April 13|
|Financial Aid Priority Date||July 14||December 1||May 11|
|Admission Deadline||August 8||December 22||May 15|
|Tuition and Fees Due||August 22||January 9||May 29|
|Last Day to Register||August 22||January 9||May 29|
|Classes Begin||August 25||January 12||June 1*|
|*Some classes begin before this date. See class schedule for more information.|
Skills, Traits, and Prep Classes
- CISA requirements
- General computer skills
- Ability to learn
- Basic understanding of how computers work is helpful
- Good communication and writing skills are helpful
- Ability to troubleshoot complex problems is helpful
Navigating your way through college can be confusing, especially if you try to go it alone. CWI One Stop Student Services offers advising assistance, to help in deciding which courses you need to take to complete your educational goals. Visit Advising for more information or contact One Stop Student Services to schedule an appointment.
Admission into the Information Security and Digital Forensics program requires a separate application process and is competitive.
Financial Aid Available
Did you know that as a student in this program you may be eligible for financial aid? Through grants, scholarships, and loans, more than 60 percent of first-time, full-time CWI students receive some form of financial assistance. To learn more about financial aid options and whether you may be eligible, visit Financial Aid.
Tuition and Fees
Tuition for a full-time CWI student averages half the cost of a state university and a third of the cost of a private college. Tuition and fees vary based on program and residence. Visit Tuition and Fees for more information.
- Information Security Analysts
- Database Administrators
- Network and Computer Systems Administrators
- Telecommunications Engineering Specialists
- Computer Network Support Specialists