• Program Overview

    In West Field University's Criminal Justice department, we venture into the realm of justice and order with the precision of a detective's magnifying glass. Our seasoned faculty members foster an environment where students can unravel the intricacies of the law. They guide the development of knowledge, skills, and the critical analysis needed to excel in the ever-evolving world of criminal justice.

  • FOUNDATIONS OF CRIMINAL LAW AND JUSTICE SYSTEMS:

    Our journey starts with the foundation of justice. Just as the cornerstone of a legal case is built with precision, our program establishes a robust grounding in fundamental criminal justice principles. This ensures students gain a comprehensive understanding of the intricate workings within the field of law and its operations.

  • PRACTICAL EXPERIENCE AND COMMUNITY ENGAGEMENT:

    West Field University's Criminal Justice department is the stage for professional growth and legal connections to flourish. Our students immerse themselves in a world filled with opportunities, from legal symposiums and justice conferences to thought-provoking discussions with guest experts. We extend the boundaries of their legal exploration, painting a vivid picture of professional development and a network of legal advocates.

Students explore data recovery techniques, learning how to retrieve lost or damaged data from digital storage devices. This course covers data restoration processes and tools.


This course delves into network defense strategies, teaching students how to safeguard computer networks from cyber threats and attacks. Topics include security protocols and intrusion detection.


Students learn about computer crime investigation, including digital evidence collection, analysis, and the legal aspects of cybercrime investigations.

Cost Of Attendance

Tuition Fee Breakdown Cost
UNDERGRADUATE CERTIFICATE IN CRIMINAL JUSTICE $2,340
Medical Insurance $0.00
Personal Expenses $0.00
Study Materials $0.00
Food Cost $0.00
Total Tuition Fee $2,340
WHERE AFFORDABILITY

Meets Opportunity

At West Field University, we embrace the intersection of affordability and opportunity. Our dedication to accessible education guarantees that exceptional learning is not coupled with exorbitant costs. We create pathways to knowledge, granting students the opportunity to flourish without the weight of excessive tuition expenses, empowering them for a brighter future.

Our Eligibility Criteria

Explore WFU’s Eligibility Criteria for Students Worldwide

Eligibility Criteria

High school diploma, GED or equiv. International Education

Credit Hours

18

Course Duration

2 Months (Self-Paced) Program

Courses Offered

03

Data Recovery Techniques (CYC-050)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Introduction To Disaster Recovery
     Preparing To Develop The Disaster Recovery Plan
  In Section 2 of this course you will cover these topics:
     Assessing Impact And Risks In The Enterprise
     Prioritizing Systems And Functions For Recovery
  In Section 3 of this course you will cover these topics:
     Identifying Data Storage And Recovery Sites
     Developing Plans And Procedures, And Relationships
  In Section 4 of this course you will cover these topics:
     Developing Procedures For Special Circumstances
     Testing The Disaster Recovery Plan
  In Section 5 of this course you will cover these topics:
     Continued Assessment Of Needs, Threats, And Solutions

Network Defense (CYC-090)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Introduction To Network Security
     Types Of Attacks
     Fundamentals Of Firewalls
  In Section 2 of this course you will cover these topics:
     Firewall Practical Applications
     Intrusion Detection Systems
     Encryption
  In Section 3 of this course you will cover these topics:
     Virtual Private Networks
     Operating System Hardening
     Defending Against Virus Attacks
  In Section 4 of this course you will cover these topics:
     Defending Against Trojan Horses And Spyware
     Security Policies
     Assessing A System
  In Section 5 of this course you will cover these topics:
     Security Standards
     Computer-Based Espionage And Terrorism

Computer Crime Investigation (CYC-091)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Introduction
     Computer Terminology And History
     History Of Crime And Computer Crime  
  In Section 2 of this course you will cover these topics:
     Computers As Targets    
     Avenues For Prosecution And Government Efforts    
     Applying The First Amendment To Computer-Related Crime  
  In Section 3 of this course you will cover these topics:
     The Fourth Amendment    
     Computer Forensic Terminology And Computer Investigations  
     Developing Computer Forensic Science Capabilities  
  In Section 4 of this course you will cover these topics:
     Computer Investigations: Pre-Search Activities  
     On-Scene Activities    
  In Section 5 of this course you will cover these topics:
     Data Analysis
     Conclusions And Future Issues