Here's how it works
certificate program consists of courses
designed to take you step-by-step
toward understanding all the essential
elements of the code. Your first
course will be sent to you as soon
as your enrollment has been accepted.
Other courses will follow as you
complete your exams, so that you
will always have study materials
to work with.
As you know this is an online academic program. This means you will need high-speed internet access to begin your program. In addition, you will need access to a Microsoft® Windows® based computer running Windows 7® or later or an Apple® Mac® computer running OS X® or later, and an email account to participate in and complete your program.
Note: Graduates of this program also earn 21 college credits toward an A.S. degree in Criminal Justice at Penn Foster College.
This outline covers all the courses required for your study-at-home certificate program. You complete the following courses in the order indicated:
Program Goal and Outcomes
Program Goal: The Business Security Certificate program aims to improve students' security knowledge for a current position or improve the level of protection of an enterprise by understanding the essentials of business security.
Upon completion of the program, students will be able to:
- Discuss the purpose of the functions of the various parts of the criminal justice system at the local, state and federal level and individuals' involvement as citizens and as actors, and how that involvement affects the system
- Discuss the history and development of the private security field to the present day, the liability and the relationship between public and private security, prevention, loss control, investigation and trends in security and security systems
- Recognize issues involving private security systems, zones of protection, the theoretical area between private and public security, risk management, loss control, principles of crime prevention involving a threat environment, and issues relating to legal aspects of private security.
- Explain the basics of substantive criminal law, which establishes and define principles, rights, and limitations, and the penal laws that govern society
- Discuss issues involving information, security, privacy of information, the broadening range of additional criminal threats, cybercrime, systems
abuse, the hacker culture, and prevention
- Demonstrate understanding of the distinctions between crimes of violence and property-based crimes, what constitutes white collar crime, how white collar criminal activity often causes more damage to society than do crimes of violence, the laws involved in prosecuting white collar crimes as well how to detect and to gather evidence of white collar crimes
- Demonstrate understanding of the issues involved in security management across disciplines and around the world including industrial security in light of business concerns, the legal aspects of security management and prevention, the specific security applications and the investigational intelligence gathering used to assess security systems
CJS101 Introduction to Criminal Justice
Examines the purpose and functions of the criminal justice system, with attention paid to the police, courts, and corrections on the local, state, and federal levels; explains the limitations of a system initially designed to respond to the needs of Colonial America; the course focuses on one’s involvement in the criminal justice system, as citizens and as actors, and how that involvement affects the system.
CJS135 Introduction to Private Security
Examines the history and development of private security; reviews the state of private security today, including but not limited to liability and the relationship between public and private security; focuses on issues regarding prevention and loss control; looks at investigation and prosecution; discusses trends in security, including the contemporary development of security systems and approaches toward security in light of recent events.
CJS245 Security and Loss Prevention
Begins with a review of issues involving private security systems and then looks at zones of protection, that theoretical area between private and public security issues; discusses issues involving risk management and loss control, considers principles of crime prevention involving a threat environment; considers issues relating to legal aspects of private security.
CJS125 Criminal Law
The history of criminal law, from the common law (and the principles of applying case law) to its contemporary form; looks at crimes and their underlying elements, teaching what a prosecutor needs to show to secure a conviction; the traditional form of criminal law as well as strict liability and victimless crimes; discusses range of criminal offenses, such as inchoate and property-based crimes, to crimes of violence and administrative crimes, and of the excuses, justifications, and defenses to prosecution of such activities.
CJS255 Computer-Based Crime
Begins with a review of issues involving information, security, and the privacy of information; and proceeds to examine a broadening range of additional criminal threats, based upon actual cases; includes a consideration of cybercrime, systems abuse, and the hacker culture; looks to issues of prevention and information security, with an emphasis on the need to take immediate steps against this likely criminal activity.
CJS225 White Collar Crime
Presents the distinctions between crimes of violence and property-based crimes; specifies what constitutes white collar crime, explores how criminal activity often causes more damage to society than do crimes of violence; looks at the laws involved in prosecuting such crimes as well as considers how to detect and to gather evidence of such crimes; also looks at corporate crime and political crime.
CJS265 Security Management
Examines the range of issues involved in security management, across disciplines and around the world; includes a consideration of industrial security in light of business concerns; examines the context for security and legal aspects of security management and prevention; presents specific security applications and the investigational intelligence gathering used to assess security systems.
Online Library and Librarian
Students in Penn Foster Career School have access to an online library for use during their studies. Students can use this library to do the required research in the courses they complete or can use it for general reference and links to valuable resources. The library contains helpful research assistance, articles, databases, books, and Web links. A librarian is available to answer questions on general research-related topics via email and to assist students in research activities during their studies with Penn Foster Career School International.
We reserve the right to change program content and materials when it becomes necessary.
A High School Diploma or GED is required to enroll in this program.
Microsoft and Windows are trademarks of Microsoft Corporation registered in the United States of America and/or other jurisdictions.
Pentium is a trademark of Intel Corporation and its subsidiaries registered in the United States of America and/or other jurisdictions.
If you wish to receive credit for previous course work, contact the school you attended and ask that your official transcripts be forwarded to Penn Foster Career School for evaluation. All previous college work must have been completed with a grade of "C" or better, and as much as 75% of the required credits may be transferred. We will also credit your tuition for all the courses that are acceptable.