Graduate Course Certificate in Criminal Justice in Cyber Crime

Eligibility Details

Bachelor's degree, or equiv. International Education

Credit Hours

6 total credit hours

Total Courses

01 courses

Program Duration

3 Months (Self-Paced) Program

Program Fee

$1,560

COURSES OFFERED

A graduate course certificate from CIBT is recognised by a variety of international accrediting bodies, and the decree it carries will open the door to a series of work prospects that will eventually advance your career.

  • Courses Code

  • Courses Name

  • Credit Hours

  • CYC-156

  • Security Policies (CYC-156)

  • 6 Credits Credits

  • View

  • CYC-219

  • Advanced Data Recovery Techniques (CYC-219)

  • 6 Credits Credits

  • View

  • CYC-693

  • Cryptography (CYC-693)

  • 6 Credits Credits

  • View

  • CYC-749

  • Forensics Investigation (CYC-749)

  • 6 Credits Credits

  • View

  • CYC-772

  • Cyber Crime (CYC-772)

  • 6 Credits Credits

  • View

Security Policies (CYC-156)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     The History Of Private Security
     Identifying The Essentials
     Short Security Scenarios
  In Section 2 of this course you will cover these topics:
     A Prevention System Overview: Structuring Your Security Objective
     Physical Security And Asset Protection
     Information And Computer Security
  In Section 3 of this course you will cover these topics:
     Personnel And Security Management
     Integration As The Centerpiece: Meeting Your Overall Security Objectives
     When Your Security Company Gets The Call, Will You Be Ready
  In Section 4 of this course you will cover these topics:
     Public And Private Police Interactions
     Legal Liability Issues
     Preparing An Emergency Response
  In Section 5 of this course you will cover these topics:
     Securing The Future: Drafting A Future For Public Safety
     A Return To Previous Settings

Advanced Data Recovery Techniques (CYC-219)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Introduction To Disaster Recovery
     Preparing To Develop The Disaster Recovery Plan
  In Section 2 of this course you will cover these topics:
     Assessing Impact And Risks In The Enterprise
     Prioritizing Systems And Functions For Recovery
  In Section 3 of this course you will cover these topics:
     Identifying Data Storage And Recovery Sites
     Developing Plans And Procedures, And Relationships
  In Section 4 of this course you will cover these topics:
     Developing Procedures For Special Circumstances
     Testing The Disaster Recovery Plan
  In Section 5 of this course you will cover these topics:
     Continued Assessment Of Needs, Threats, And Solutions

Cryptography (CYC-693)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Introduction
     Encryption Basics
     Link Encryption
  In Section 2 of this course you will cover these topics:
     Managing Secret Keys
     Security At The Ip Layer
     Virtual Private Networks
  In Section 3 of this course you will cover these topics:
     Remote Access With Ipsec
     Ipsec And Firewalls
  In Section 4 of this course you will cover these topics:
     Public Key Crypto And Ssl
     World Wide Web Transaction Security
  In Section 5 of this course you will cover these topics:
     Secured Electronic Mail
     Public Key Certificates

Forensics Investigation (CYC-749)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Forensic Evidence And Crime Investigation
     Computer Forensics And Digital Detective Work
     Tools, Environments, Equipment, And Certifications
  In Section 2 of this course you will cover these topics:
     Policies And Procedures
     Data, Pda, And Cell Phone Forensics
     Operating Systems And Data Transmission Basics For Digital Investigations
  In Section 3 of this course you will cover these topics:
     Investigating Windows, Linux, And Graphics Files
     E-Mail And Webmail Forensics
     Internet And Network Forensics And Intrusion Detection
  In Section 4 of this course you will cover these topics:
     Tracking Down Those Who Intend To Do Harm On A Large Scale
     Fraud And Forensic Accounting Investigation
  In Section 5 of this course you will cover these topics:
     Federal Rules And Criminal Codes
     Ethical And Professional Responsibility In Testimony

Cyber Crime (CYC-772)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Introduction To Cyber Crime And Security
     Networks And The Internet
     Assessing A Target System
  In Section 2 of this course you will cover these topics:
     Denial Of Service Attacks
     Malware
     Basics Of Assessing And Securing A System
  In Section 3 of this course you will cover these topics:
     Encryption
     Internet Fraud And Cyber Crime
  In Section 4 of this course you will cover these topics:
     Industrial Espionage
     Cyber Terrorism And Information Warfare
  In Section 5 of this course you will cover these topics:
     Cyber Detective
     Security Hardware And Software
WHO WE ARE

Knowledge will bring you the opportunity to make a difference.

California Institute of Business and Technology of Business and Technology is one of the greatest online colleges in the United States and a global pioneer in online education. CIBT, renowned for its inexpensive online degree programs and accessibility, enables working professionals and individuals to continue their education at their own speed and in their own time.

Discover More

Get Substantial Career Growth With Our Accredited Degree Programs.

About Us