Learn Cyber Forensics in Columbus, Ohio

Training courses, certificates, diplomas or degree programs of Cyber Forensics for students in Columbus, OH


Total 23 training courses and degree programs available.

Network Forensics

Course Format: Online / Virtual Classroom / Webinar
School/Trainer: Regis University

Examines forensic analysis of networks utilizing unique and sophisticated sets of tools, techniques and legal policies. Covers established concepts, methodology and tools to enhance performance of network forensics.

Digital Forensics

Course Format: Online / Virtual Classroom / Webinar
School/Trainer: DeVry University Online
  V

The Justice Administration degree program with a specialization in Digital Forensics may include these career-focused courses:
•Digital Forensics I with Lab - This course introduces the study of forensics by outlining integrative aspects of the discipline with those of other sciences. Coursework focuses on applying basic forensic techniques used to investigate illegal and unethical activity within a PC or local area network (LAN) environment and then resolving related issues.
•Digital Forensics II with Lab - Building on forensic computer techniques introduced in CCSI-410, this course focuses on advanced investigative techniques to track leads over local and wide area networks, including international computer crime.
•Architecture and Operating Systems with Lab - Students in this course learn operating system concepts by examining various operating systems such as Windows, UNIX, and Linux, and study typical desktop system hardware, architecture, and configuration.
•Connectivity with Lab - This course covers fundamentals of data communication and computer networking, including the Open Systems Interconnection (OSI) model. Network architecture and configurations... [Read More]

Network Security and Forensics

Course Format: Online / Virtual Classroom / Webinar
School/Trainer: Fountainhead College of Technology
  V

The Bachelor of Applied Science in Network Security & Forensics program is a comprehensive baccalaureate degree program in the field of Information Technology that provides 66 semester credit hours of instruction to complement any accredited post-secondary computer-centric associate’s degree. Prospective students who have a non-computer-centric associate’s degree or higher degrees, who wish to enroll in this program, must be able to demonstrate proficiency in computer repair and operation, and in network configuration and administration. This can be demonstrated by acquiring certifications, or by special examination, at the discretion of the College. Day and evening classes meet 20 hours per week for four semesters (60 weeks), assuming the entrance criteria have been met.

Network Security & Forensics students benefit by Fountainhead College’s designation as a National Center of Academic Excellence in Information Assurance Education (CAEIAE) by the National Security Agency (NSA) and the Department of Homeland Security (DHS). This prestigious designation recognizes Fountainhead’s NSF bachelor’s degree program as one of the best in the nation. This technology degree p... [Read More]

Digital Forensics Technology

Course Format: Online / Virtual Classroom / Webinar
School/Trainer: Strayer University
  V

The Digital Forensics Technology concentration is a skills-based curriculum designed to prepare students for the forensic examination of digital evidence and devices. Students are presented with the applied knowledge, skills, and practice necessary to identify and create a digital forensic investigation, examination and response. The Digital Forensics Technology concentration is likewise aligned to the program outcomes of ethics, technical acumen, technical analysis, technical communication, technology competence and technology utilization. NSA/CNSS certified security curriculum (NSTISSI No. 4011, 4013)

Graduates may be interested in pursuing roles with similar responsibilities as: Information Technology Specialist, Data Security Administrator, Information Security Analyst, Information Security Officer, Computer Specialist, Information Security Specialist, Information Systems Security Analyst, Computer Security Specialist, Information Security Manager, and Information Technology Security Analyst

Cybersecurity Technology

Course Format: Online / Virtual Classroom / Webinar
School/Trainer: Strayer University
  V

The Cybersecurity Technology concentration is a skills-based curriculum designed to prepare students for tactical roles in the design and protection of data assets. Students are presented with the skills and practices to defend digital assets, systems and information from cybercrime attacks that include viruses, botnets, worms and Trojans. The Cybersecurity Technology concentration is likewise aligned to the program outcomes of ethics, technical acumen, technical analysis, technical communication, technology competence and technology utilization. NSA/CNSS certified security curriculum (NSTISSI No. 4011, 4013)

Graduates may be interested in pursuing roles with similar responsibilities as: Information Technology Specialist, Data Security Administrator, Information Security Analyst, Information Security Officer, Computer Specialist, Information Security Specialist, Information Systems Security Analyst, Computer Security Specialist, Information Security Manager, Information Technology Security Analyst.

Digital Forensics Technologies and Techniques

Course Format: Online / Virtual Classroom / Webinar
School/Trainer: Johns Hopkins University, Whiting School of Engineering
  V

Digital forensics focuses on the acquisition, identification, attribution, and analysis of digital evidence of an event occurring in a computer or network. This course provides a broader scientific understanding of the technologies and techniques used to perform digital forensics. In particular, various signature extraction techniques, detection, classification, and retrieval of forensically interesting patterns will be introduced. This will be complemented by studying fundamental concepts of data processing technologies like compression, watermarking, steganography, cryptography, and multiresolution analysis. Emerging standards along with issues driving the changing nature of this topic will be explored. Anti-forensic techniques that are used to counter forensic analysis will also be covered. Students will be exposed to relevant theory, programming practice, case studies, and contemporary literature on the subject.

Cybersecurity (Master Degree)

Course Format: Online / Virtual Classroom / Webinar
School/Trainer: Stevens Institute of Technology
  V

Security is one of the most important concerns in information technology today, and security experts are in high demand. Become an expert in computer and network security. This 10-course, online, instructor-led Master’s degree helps you respond to the increasingly serious demands posed by private-sector and government computers and networks. Acquire basic knowledge of programming languages, computer architecture, operating systems, data structures, and algorithms. Learn how to react to immediate and long-range security attacks. These ten courses cover fundamentals, mathematical foundations, cryptography, and essential models, protocols, and techniques for cybersecurity. Discover the principal ingredients for authenticity, confidentiality, message integrity, and non-repudiation. Introduces security protocols, various attacks and defenses against them. Emphasizes information security phases of inspection, protection, detection, reaction, and reflection.

Cybersecurity (Certificate)

Course Format: Online / Virtual Classroom / Webinar
School/Trainer: Stevens Institute of Technology
  V

You want to obtain a deep technical background in cybersecurity, particularly in the cryptographic foundations of the tools that the security specialist will need to use. You know that cryptographic tools require a deep understanding of their properties to be deployed properly, rather than simply treated as black boxes. You will obtain a background in algorithm design and implementation, and discrete mathematics for cryptography, prior to learning about the most popular cryptographic algorithms and protocols. You will also learn about both the technical and the social aspects of privacy, where legislation is still grappling with how to resolve individuals’ privacy rights with the immense benefits to be gained from vast on-line information resources, and where technical solutions can inform the legal and social debate

Computer/Cyber Crime

Course Format: Online / Virtual Classroom / Webinar
School/Trainer: Confederation College - Centre for Continuing Education
  V

Computer Crime encompasses a broad range of illegal activity. This course will introduce the student to the more common criminal offences in which a computer or network is the tool, target or place of crime. Students will gain an understanding of the creation, movement and storage of digital information technology infrastructuree, the methodology used to obtain digital evidence and the legal requirements involved in the search and seizure of such evidence. The course will deal with the various methods utilized in the tracing of email and website postings as well as the search and seizure of the evidence in the preparation for the criminal prosecution. On completion of the course the student will know how to recognize common computer crimes and locate the source of digital evidence. The student will also gain an understanding of the search and seizure requirements during the course of a criminal investigation involving computer crime.

Cyber Forensics, Cyber Crimes, Security and Law

Course Format: Online / Virtual Classroom / Webinar
School/Trainer: IFS INDIA FORENSIC EDUCATION DEPT
  V

We provide a wide range of forensic and security courses like-
(Short Term Courses, Certificate Courses, Diploma Courses, Certifications, Trainings and Internships)

Forensic Sciences
Questioned Documents and Handwriting
Cyber Forensics, Cyber Crimes, Cyber Security and Cyber Law (Integrated Course)
Crime Scene Investigation
DNA Fingerprinting
Forensic Psychology
Criminology & Indian Laws
Private Investigator (Detective)
Wildlife Forensics
Forensic Accounting and Fraud Examiner
Forensic Photography
Forensic Graphology
Forensic Hypnosis
Fingerprint Verification
Web Designing and Web Security
and many other...

CYBER FORENSICS, CYBER CRIME AND CYBER SECURITY

Course Format: Online / Virtual Classroom / Webinar
School/Trainer: IFS INDIA
  V

IFS INDIA’,s Education Department engaged in offering Online Courses and Forensic Services such as Forensic Training and Certification and Standardization services. Our Online Courses are a simple and cost-effective learning solution, we’,re here to help you launch or enhance your creative career. Students can participate in courses from virtually anywhere and any time around the world, IFS INDIA Education Department is devoted to high-quality online education, You can establish meaningful interaction with instructors and students via the Internet, Chat and E-Mails without leaving your home. IFS Course materials include resources with a variety of media types like- Word Documents, Power Point Presentations, Photos, Audio Files, Video Documentaries, PDF Files (e-Books), Software’,s, and Flash Shows. We also provides Free job placement assistance worldwide. This courses are designed to provide you with crucial information that will allow you to become Qualified Expert in relative area of Forensic Science. The online delivery system works well for busy, practicing professionals, forensic scientists, experts, lawyers, students etc... Our courses can be studied in ... [Read More]

Pages: 1 2 3


Find more about Cyber Forensics training courses, certificates, diplomas and degrees:





Tips:
Our combined search function does not only provide you with the training courses and students, but also talent resumes and jobs, or shared apartments nearby for rent.
United States  United Kingdom  Canada  Australia



Forensic
Cyber Forensics
- Online/E-learning -
Cyber Forensics
Training Course Catalogs
Ask for Training
Add Courses