-
All
-
Online
-
Filters
Computer forensics courses
- Course
- Online
- Intermediate
- Different dates available
- 40h - 1 Year
... courses, this package helps students learn the tricks used by cybercriminals to access corporate systems and how they can be stopped. Students will also master the science of forensic investigations, helping to gather the necessary evidence to prosecute hackers in the event of an attempted or successful network breach... Learn about: Access Control, Web Browsing, Web Development...
- Bachelor's degree
- Londonandanother venue.
- Gillingham
- September
- 3 Years
... Brigade, the Metropolitan and Kent Police Services as well as Counter Terrorism, UKDVI and the Natural History Museum. We're ranked first in London for student satisfaction, and this degree is accredited by the Chartered Society of Forensic Sciences, and you'll receive free membership throughout... Learn about: Foundations of Criminology, IT Law, Professional Skills...
- Course
- Distance Learning
- Intermediate
- Different dates available
- 200h - 12 Months
...In this Distance Learning Forensic Science Diploma we will examine the fascinating subject of Forensic Science, which can be simply defined as the application of science to the law. In criminal cases forensic scientists are often involved in the search for, and examination of, physical traces... Learn about: Forensic Pathology, Database training, Forensic science...
-
The course was easy to follow and the help was always available. Amazing experience, can’t wait to start my next one.
← | →
-
Great course. The advantage of this platform is that you are able to learn at your own pace and leisure. I would recommend this centre to everybody.
← | →
-
Knowledge is the best gift you can give to yourself. The courses are really amazing and the staff members are very supportive. I really benefited a lot and increased my employability a lot. Thank you!
← | →
- Vocational qualification
- Online
- Different dates available
.... • Introduction to Computer Forensics. • Different types of attacks and system security threats and how they can be blocked. • The use of encryption to protect data... Learn about: Business Studies, Computer Forensics, Network Training...
.... • Introduction to Computer Forensics. • Different types of attacks and system security threats and how they can be blocked. • The use of encryption to protect data... Learn about: Business Studies, Computer Forensics, Network Training...
-
The course was easy to follow and the help was always available. Amazing experience, can’t wait to start my next one.
← | → see all
-
Great course. The advantage of this platform is that you are able to learn at your own pace and leisure. I would recommend this centre to everybody.
← | → see all
-
Knowledge is the best gift you can give to yourself. The courses are really amazing and the staff members are very supportive. I really benefited a lot and increased my employability a lot. Thank you!
← | → see all
- Course
- Online
- Intermediate
- Different dates available
...This certification for Cyber Security Analyst assesses the candidate as per the company’s need for cyber security and forensics. The certification tests the candidates on various areas in cybercrime, IT Act 2000, cyberoffenses, wireless devices cybercrime, phishing, keyloggers, backdoors, SQL... Learn about: Password Cracking, Social Media, Computer Forensics...
- Vocational qualification
- Online
- Different dates available
.... • Introduction to Computer Forensics. • Different types of attacks and system security threats and how they can be blocked. • The use of encryption to protect data... Learn about: Network Training, Physical security, Security Management...
- Vocational qualification
- Online
- Different dates available
.... • Introduction to Computer Forensics. • Different types of attacks and system security threats and how they can be blocked. • The use of encryption to protect data... Learn about: Security Management, Security Awareness, Computer Forensics...
- Vocational qualification
- Online
- Different dates available
.... • Introduction to Computer Forensics. • Different types of attacks and system security threats and how they can be blocked. • The use of encryption to protect data... Learn about: Network Training, Security Awareness, Computer Forensics...
- Postgraduate
- Online
- Different dates available
- 1 Year
... in a cybercrime certificate program might only complete courses in the subject, those enrolled in degree programs might take additional coursework in criminal justice, computer science, emergency management, government and terrorism. Common courses in cybercrime studies include those in digital crime and computer... Learn about: How To, World Law, World Studies...
- Course
- Online
- Intermediate
- Different dates available
- 12 Months
...completed in the order listed below. 1. Cyber Security Awareness and Prevention (NO EXAM) 2. Data Security Compliance (NO EXAM) 3. Cloud Computing Security Knowledge (CCSK)... Learn about: IT Security, Computer Security, CYBER SECURITY...
- Master
- Online
- Different dates available
... Computer Science Training and Development Education Organizational Leadership Human Resources Management Sales and Marketing Business Administration... Learn about: Computer Security, Wealth Management, Forensic Auditing...
- Master
- Online
- Different dates available
... Systems and Network Forensics Secure Networking Theoretical Computer Science for IT Security 3rd Semester Seminar: Standards and Frameworks Project: Current... Learn about: Artificial Intelligence...
- HNC
- Online
- Different dates available
- 2 Years
... the principles of mechanics, materials and energy to design as well as manufacture machines and devices of all kinds. Subjects studied under this degree are Manufacturing processes, Mechanical vibrations, Mechatronics, Heat and Mass Transfer, Tool Engineering and Design, Design of machine elements, Computer... Learn about: IT Engineering, Gynecological Sonography I, Forensic Medicine...
- Training
- Online
- Different dates available
...Computer and network systems across the globe are systematically being attacked by rampant hacking. Hacking is now a wide spread practice, leaving companies at all levels vulnerable. In order to stop hackers from completing their goals, you must first think like a hacker. As the old moniker... Learn about: Certified Ethical Hacker, Cisco IP, Network security...
- Master
- Online
- Different dates available
... skills concerning the security of computer systems. The student can choose between three variables within the study plan, depending on his/her interests in the workplace. These are: security of networks and systems; security of services and applications; management and audit of computer security... Learn about: Research orientation, Legislation and regulation, Security management systems...
- Bachelor's degree
- Online
- Different dates available
- 36 Months
... as a security consultant, ethical hacker or in-house cyber security manager. Learn all about data forensics and cloud computing and protection, and explore the thrilling world of cyber threat intelligence. The possibilities you’ll have after graduating are varied, as your skills will be needed in almost... Learn about: CYBER SECURITY, Artificial Intelligence...
- Master
- Online
- Different dates available
- 2 Years
...5 Synthesis of Nano powders using High Energy ball mills 6 Characterization of Nano powders SR NO SEMESTER III 1 Nanotechnology applications and Devices... Learn about: Food Nutrition, Various types of mental disorder, GCSE Physics...
- Course
- Online
- Intermediate
- Different dates available
- 45h - 1 Year
... computer issues, network connectivity, user settings, resource access for domain and non-domain members and applications. Learn how to configure... Learn about: Operating System, Windows Forensics, Windows Server 2012...
- Course
- Online
- Different dates available
... universal course player, you can learn from your computer, tablet as well as mobile devices. Keep up with your training on the go! Workbooks Each course comes... Learn about: Information Systems, IT Certification, IT Career...
- Course
- Distance Learning
- Advanced
- November
- 330h
... 4 - Computer Forensics This Unit covers the following key topics: The Role of Forensics within Organisations Policy and Procedure Development Evidence... Learn about: IT Security, Cyber Crime, Penetration Testing...