Your browser does not support JavaScript! or JavaScript is currently disabled.

Degree Outcomes Digital Forensics

Master of Science in Information Assurance and Cybersecurity

What You'll Learn

At Capella, we give you the tools, knowledge and support to help you measure and maximize your degree outcomes.

Learning You Can See

In addition to grades and ongoing feedback from your instructors, you will be able to visualize your progress in each of your courses.

Use this one-of-a-kind tool to know where you stand after each assignment and see where you might need extra help in your courses.

Competency Map Example

Your Degree Outcomes

This degree is aligned with external professional standards to help you obtain the relevant expertise to advance your career. Becoming proficient in these outcomes will allow you to meet the demands of your field.

By the successful completion of your degree program, you will have gained the skills and knowledge to:\

Program Outcomes

  • Explain foundational information assurance and security concepts.
  • Develop solutions for current issues in the information security industry.
  • Demonstrate use of tools appropriate for the information security professional.
  • Plan strategies appropriate for an independent contractor within a specialized area of information security.
  • Integrate general information security and specialized security functions within small and mid-sized businesses as well as large and global organizations.
  • Communicate effectively with technology stakeholders.

Specialization Outcomes

  • Analyze common data structures and data formats for storing data in a computer system
  • Apply basic procedures such as probing, measuring, and data collection to identify functionality and to affect modifications in the prevention of unauthorized Malware and reverse engineering, which threaten information security
  • Apply a common reverse engineering software tool to the safe static and dynamic analysis of software (or Malware) of unknown origin for the purposes of recovering the original implementation and/or understanding the software functionality
  • Analyze methods for the acquisition and analysis of mobile devices in digital forensics investigations
  • Analyze what can and cannot be retrieved from various operating systems in digital forensic investigations, employing “best practice” methodologies used in host/ network digital forensics
  • Analyze methods and approaches for forensic analysis on specified media
  • Analyze the methods used in digital forensics network investigations


View full learning and career outcomes report for this program at

Ready for the next step?

Learning online doesn't mean going it alone. Help is here. From faculty, coaches, advisors, and more. Plus a supportive community of students who are as passionate about their careers as you are about yours.