-
All
-
Online
-
Filters
Computer forensics courses
- Bachelor's degree
- Bristol
... this, digital forensics is providing a wealth of material for law enforcement for the police and businesses. This has led the UK government to highlight an urgent need for skilled graduates in this area. Why study our course? The BSc(Hons) Forensic Computing and Security will help you develop computer... Learn about: Learning Teaching, Computer Security, Network Training...
- Bachelor's degree
- Blended
- 3 Years
... at Malta Life Sciences Park for their practical sessions to gain hands on experience in Crime Scene Investigation, Forensic Biology and Chemistry, Fingerprint, Blood Splatter and Ballistics Analysis, among them. The students are also exposed to a range of pressing issues in the field of forensics... Learn about: Bachelor degree, Laboratory Practice, Documents Examination...
- Course
- Online
- Intermediate
- Different dates available
- 40h - 1 Year
... courses, this package helps students learn the tricks used by cybercriminals to access corporate systems and how they can be stopped. Students will also master the science of forensic investigations, helping to gather the necessary evidence to prosecute hackers in the event of an attempted or successful network breach... Learn about: Network Training, Web Programming, Web Development...
- Bachelor's degree
- Londonandanother venue.
- Gillingham
- September
- 3 Years
... Brigade, the Metropolitan and Kent Police Services as well as Counter Terrorism, UKDVI and the Natural History Museum. We're ranked first in London for student satisfaction, and this degree is accredited by the Chartered Society of Forensic Sciences, and you'll receive free membership throughout... Learn about: Fundamentals of Biology, Practical and Academic Skills, Biology and Physiology...
- Course
- Distance Learning
- Intermediate
- Different dates available
- 200h - 12 Months
...In this Distance Learning Forensic Science Diploma we will examine the fascinating subject of Forensic Science, which can be simply defined as the application of science to the law. In criminal cases forensic scientists are often involved in the search for, and examination of, physical traces... Learn about: Forensic Pathology, Database training, Forensic Biology...
-
The course was easy to follow and the help was always available. Amazing experience, can’t wait to start my next one.
← | →
-
Great course. The advantage of this platform is that you are able to learn at your own pace and leisure. I would recommend this centre to everybody.
← | →
-
Knowledge is the best gift you can give to yourself. The courses are really amazing and the staff members are very supportive. I really benefited a lot and increased my employability a lot. Thank you!
← | →
- Vocational qualification
- Online
- Different dates available
.... • Introduction to Computer Forensics. • Different types of attacks and system security threats and how they can be blocked. • The use of encryption to protect data... Learn about: Physical security, Business Studies, Security Awareness...
.... • Introduction to Computer Forensics. • Different types of attacks and system security threats and how they can be blocked. • The use of encryption to protect data... Learn about: Physical security, Business Studies, Security Awareness...
-
The course was easy to follow and the help was always available. Amazing experience, can’t wait to start my next one.
← | → see all
-
Great course. The advantage of this platform is that you are able to learn at your own pace and leisure. I would recommend this centre to everybody.
← | → see all
-
Knowledge is the best gift you can give to yourself. The courses are really amazing and the staff members are very supportive. I really benefited a lot and increased my employability a lot. Thank you!
← | → see all
- Course
- Online
- Intermediate
- Different dates available
...This certification for Cyber Security Analyst assesses the candidate as per the company’s need for cyber security and forensics. The certification tests the candidates on various areas in cybercrime, IT Act 2000, cyberoffenses, wireless devices cybercrime, phishing, keyloggers, backdoors, SQL... Learn about: Social Media, Computer Forensics, Wireless Networks...
- Vocational qualification
- Online
- Different dates available
.... • Introduction to Computer Forensics. • Different types of attacks and system security threats and how they can be blocked. • The use of encryption to protect data... Learn about: Business Studies, Data security, Computer Forensics...
- Vocational qualification
- Online
- Different dates available
.... • Introduction to Computer Forensics. • Different types of attacks and system security threats and how they can be blocked. • The use of encryption to protect data... Learn about: Computer Forensics, Security Awareness, Data security...
- Vocational qualification
- Online
- Different dates available
.... • Introduction to Computer Forensics. • Different types of attacks and system security threats and how they can be blocked. • The use of encryption to protect data... Learn about: Business Studies, Physical security, Network Training...
- Postgraduate
- Online
- Different dates available
- 1 Year
...Cybercrime courses are often part of undergraduate and graduate certificate and degree programs, like forensic science, information technology, cybercrime technology or homeland security. Degree programs are offered at the associate's, bachelor's and master's degree levels. While students... Learn about: IT Law, Information Systems, How To...
- Course
- Online
- Intermediate
- Different dates available
- 12 Months
...completed in the order listed below. 1. Cyber Security Awareness and Prevention (NO EXAM) 2. Data Security Compliance (NO EXAM) 3. Cloud Computing Security Knowledge (CCSK)... Learn about: IT Management, IT risk, Computer forensic incidents...
- Master
- Online
- Different dates available
... Information Systems Finance Financial Analysis Wealth Management Financial Portfolio Management Accountancy Forensic Accountancy Forensic Investigation Forensic... Learn about: Wealth Management, Financial Analysis, CYBER SECURITY...
- Master
- Online
- Different dates available
... Systems and Network Forensics Secure Networking Theoretical Computer Science for IT Security 3rd Semester Seminar: Standards and Frameworks Project: Current... Learn about: Artificial Intelligence...
- HNC
- Online
- Different dates available
- 2 Years
... the principles of mechanics, materials and energy to design as well as manufacture machines and devices of all kinds. Subjects studied under this degree are Manufacturing processes, Mechanical vibrations, Mechatronics, Heat and Mass Transfer, Tool Engineering and Design, Design of machine elements, Computer... Learn about: Acoustic Physics I, Computer Repair, IT Engineering...
- Training
- Online
- Different dates available
...Computer and network systems across the globe are systematically being attacked by rampant hacking. Hacking is now a wide spread practice, leaving companies at all levels vulnerable. In order to stop hackers from completing their goals, you must first think like a hacker. As the old moniker... Learn about: Computer Hacking, Ethical Hacker, IT Security...
- Master
- Online
- Different dates available
... skills concerning the security of computer systems. The student can choose between three variables within the study plan, depending on his/her interests in the workplace. These are: security of networks and systems; security of services and applications; management and audit of computer security... Learn about: Forensic analysis, Database security, Digital identity...
- Bachelor's degree
- Online
- Different dates available
- 36 Months
... as a security consultant, ethical hacker or in-house cyber security manager. Learn all about data forensics and cloud computing and protection, and explore the thrilling world of cyber threat intelligence. The possibilities you’ll have after graduating are varied, as your skills will be needed in almost... Learn about: CYBER SECURITY, Artificial Intelligence...
- Master
- Online
- Different dates available
- 2 Years
...5 Synthesis of Nano powders using High Energy ball mills 6 Characterization of Nano powders SR NO SEMESTER III 1 Nanotechnology applications and Devices... Learn about: Food Production, Computer Sciences, Engineering Mathematics...
- Course
- Online
- Intermediate
- Different dates available
- 45h - 1 Year
... computer issues, network connectivity, user settings, resource access for domain and non-domain members and applications. Learn how to configure... Learn about: Windows Server 2012, Windows Server, Windows Forensics...