Criminal Justice Technology Certificates

  • Utilizes banking systems to investigate and research all transaction information to ensure Banking Secrecy Act (BSA) and Anti-Money Laundering (AML) laws and regulations.  Responsible for compiling and distributing a monthly report that details the banking networks’ BSA/AML errors for the previous month and year-to-date.  Responsible for providing and making updates to internal policy and procedures as well as annual updates to the Bank operations manual.

    The typical job is found under: Bank Secrecy Act Analyst, Risk Analyst, Financial Crime Prevention Onboarding Analyst, Analyst-Fraud & Breach, AML Surveillance Monitoring Analyst, and Financial Investigative Analyst

  • Individuals seeking a career in criminal justice understand that additional credentials are required to enter into the field.  A broad introduction to the role of police, the structure and function of the courts; the legal profession, legal education, prison life and other correctional facilities including the study of social reform.  This certificate is taught by knowledgeable faculty members with years of real-world, hands-on experience.

  • Performs responsible technical work in developing and validating the police database.  Conducts analysis of incident data, assists in the preparation of special reports, works in conjunction with all local, state, and national law enforcement agencies on wanted and missing persons, stolen or recovered property, and criminal history information.  Operates and enters files into the N.C.I.C. and D.C.I. computer systems and may be required to prepare clear, comprehensive reports from information obtained directly from offices or citizens.

  • The typical job requirements for Homeland Security in North Carolina is more oriented towards Intelligence Analysis, Security Management, and Critical Incidents.  This certificate would prepare students to perform extensive security audits for private corporations and for local and state government, identifying weaknesses in their overall security.  Emphasis placed on risk analysis studies that examine the methods, procedures, and systems for security gaps and vulnerabilities.