Learn Cyber Forensics in Columbus, Ohio

Training courses, certificates, diplomas or degree programs of Cyber Forensics for students in Columbus, OH


Total 28 training courses and degree programs available.

Network Forensics

Course Format: Online / Virtual Classroom / Webinar
School/Trainer: Lewis University

This course presents hands-on techniques for conducting analysis of Network Intrusions and Cybercrime in an organization. This course discusses log file analysis, gathering evidence from all networked devices, and router forensics. It also covers principles and practice related to examination of internal and external cyber attacks, cybercrimes, e-mail crimes and violations, corporate espionage, copyright and trademark violations.

Mobile Device Forensics

Course Format: Online / Virtual Classroom / Webinar
School/Trainer: Lewis University
  V

This course presents hands-on techniques for recovering evidence, data and corporate assets from mobile devices such as Iphones, windows mobile phones, Android phones, Ipads, Tablet PCs and Ipods. The course discusses forensics acquisition, analysis and reporting of evidence retrieved from mobile devices. Students will learn how to recover passwords, deleted voicemails, photos, and text messages, geotagged metadata from camera phones and data from various apps that run on mobile devices.

Cyber Forensics

Course Format: Online / Virtual Classroom / Webinar
School/Trainer: IIT School of Applied Technology
  V

This course will address methods to properly conduct a computer and/or network forensics investigation including digital evidence collection and evaluation and legal issues involved in network forensics. Technical issues in acquiring court-admissible chans-of evidence using various forensic tools that reconstruct criminally liable actions at the physical and logical levels are also addressed. Technical topics covered include detailed analysis of hard disks, files systems (including FAT, NTFS and EXT) and removable storage media, mechanisms for hiding and detecting hidden information, and the hands-on use of powerful forensic analysis tools.

Upon completion of this course, participants should be able to perform cyber forensic analysis.



Course Outline:

Introduction to network and computer forensics

Forensic tools and tool systems

Data acquisition and image creation

EnCase and AccessData forensic tools and crime forensic analysis

SleuthKit, hard disks, volumes and partitions

Master Boot Record (MBR) partitions and FAT file system

NTFS file system and GPT partition... [Read More]

Mobile Device Forensics

Course Format: Online / Virtual Classroom / Webinar
School/Trainer: IIT School of Applied Technology
  V

This course will address methods for recovering digital data or evidence and conducting forensic analysis of mobile devices such as smart phones and tablets. Various devices will be compared including iPhone, Android, and Blackberry. A brief review of Linux and related forensic tools. ANAND technology and mobile file systems will be discussed. Students will learn how to unlock and root mobile devices and recover data from actual mobile devices.

Expected Outcomes:

•Produce a forensic report that includes the steps in the collection, handling, and preservation of digital evidence from mobile devices.
•Construct a forensic acquisition plan for mobile devices that will account for various scenarios and the limitations of cell phone technology.
•Validate data obtained from the forensic acquisition of mobile devices with current tools.
•Analyze data retrieved from mobile devices with current tools.
•Assess the differences between cellular network architectures and identify their impact on forensic data.
•Analyze data provided from network service providers and cross-reference the results with data obtained from mobile devices.
Read More]

Cyber Forensics and Security (Master Degree)

Course Format: Online / Virtual Classroom / Webinar
School/Trainer: IIT School of Applied Technology
  V

Master of Cyber Forensics and Security - This unique and highly sought after degree program combines technology, management and legal issues of cyber forensics and security. Legal courses are offered by IIT Chicago-Kent College of Law.

Creation and management of cyber security, computer forensics, security and protection of computers, networks, and information

Master of Cyber Forensics and Security

Core Courses (15 hours)

Required Courses
ITMS 538 Cyber Forensics
ITMS 543 Vulnerability Analysis and Control
ITMS 548 Cyber Security Technologies
ITMS 578 Cyber Security Management
LAW 273 Evidence

Elective Courses (15 hours)

Select at least twelve hours from the following:
ITMS 518 Coding Security
ITMS 528 Database Security
ITMS 539 Steganography
ITMS 549 Cyber Security Technologies: Projects and Advanced Methods
ITMS 555 Mobile Device Forensics
ITMS 558 Operating System Forensics
ITMS 579 Topics in Information Security
ITMS 588 Incident Response, Disaster Recovery, and Business ContinuityITMM 585 Legal and Ethical Issues in Informati... [Read More]

Network Forensics

Course Format: Online / Virtual Classroom / Webinar
School/Trainer: Regis University

Examines forensic analysis of networks utilizing unique and sophisticated sets of tools, techniques and legal policies. Covers established concepts, methodology and tools to enhance performance of network forensics.

Digital Forensics

Course Format: Online / Virtual Classroom / Webinar
School/Trainer: DeVry University Online
  V

The Justice Administration degree program with a specialization in Digital Forensics may include these career-focused courses:
•Digital Forensics I with Lab - This course introduces the study of forensics by outlining integrative aspects of the discipline with those of other sciences. Coursework focuses on applying basic forensic techniques used to investigate illegal and unethical activity within a PC or local area network (LAN) environment and then resolving related issues.
•Digital Forensics II with Lab - Building on forensic computer techniques introduced in CCSI-410, this course focuses on advanced investigative techniques to track leads over local and wide area networks, including international computer crime.
•Architecture and Operating Systems with Lab - Students in this course learn operating system concepts by examining various operating systems such as Windows, UNIX, and Linux, and study typical desktop system hardware, architecture, and configuration.
•Connectivity with Lab - This course covers fundamentals of data communication and computer networking, including the Open Systems Interconnection (OSI) model. Network architecture and configurations... [Read More]

Network Security and Forensics

Course Format: Online / Virtual Classroom / Webinar
School/Trainer: Fountainhead College of Technology
  V

The Bachelor of Applied Science in Network Security & Forensics program is a comprehensive baccalaureate degree program in the field of Information Technology that provides 66 semester credit hours of instruction to complement any accredited post-secondary computer-centric associate’s degree. Prospective students who have a non-computer-centric associate’s degree or higher degrees, who wish to enroll in this program, must be able to demonstrate proficiency in computer repair and operation, and in network configuration and administration. This can be demonstrated by acquiring certifications, or by special examination, at the discretion of the College. Day and evening classes meet 20 hours per week for four semesters (60 weeks), assuming the entrance criteria have been met.

Network Security & Forensics students benefit by Fountainhead College’s designation as a National Center of Academic Excellence in Information Assurance Education (CAEIAE) by the National Security Agency (NSA) and the Department of Homeland Security (DHS). This prestigious designation recognizes Fountainhead’s NSF bachelor’s degree program as one of the best in the nation. This technology degree p... [Read More]

Digital Forensics Technology

Course Format: Online / Virtual Classroom / Webinar
School/Trainer: Strayer University
  V

The Digital Forensics Technology concentration is a skills-based curriculum designed to prepare students for the forensic examination of digital evidence and devices. Students are presented with the applied knowledge, skills, and practice necessary to identify and create a digital forensic investigation, examination and response. The Digital Forensics Technology concentration is likewise aligned to the program outcomes of ethics, technical acumen, technical analysis, technical communication, technology competence and technology utilization. NSA/CNSS certified security curriculum (NSTISSI No. 4011, 4013)

Graduates may be interested in pursuing roles with similar responsibilities as: Information Technology Specialist, Data Security Administrator, Information Security Analyst, Information Security Officer, Computer Specialist, Information Security Specialist, Information Systems Security Analyst, Computer Security Specialist, Information Security Manager, and Information Technology Security Analyst

Cybersecurity Technology

Course Format: Online / Virtual Classroom / Webinar
School/Trainer: Strayer University
  V

The Cybersecurity Technology concentration is a skills-based curriculum designed to prepare students for tactical roles in the design and protection of data assets. Students are presented with the skills and practices to defend digital assets, systems and information from cybercrime attacks that include viruses, botnets, worms and Trojans. The Cybersecurity Technology concentration is likewise aligned to the program outcomes of ethics, technical acumen, technical analysis, technical communication, technology competence and technology utilization. NSA/CNSS certified security curriculum (NSTISSI No. 4011, 4013)

Graduates may be interested in pursuing roles with similar responsibilities as: Information Technology Specialist, Data Security Administrator, Information Security Analyst, Information Security Officer, Computer Specialist, Information Security Specialist, Information Systems Security Analyst, Computer Security Specialist, Information Security Manager, Information Technology Security Analyst.

Digital Forensics Technologies and Techniques

Course Format: Online / Virtual Classroom / Webinar
School/Trainer: Johns Hopkins University, Whiting School of Engineering
  V

Digital forensics focuses on the acquisition, identification, attribution, and analysis of digital evidence of an event occurring in a computer or network. This course provides a broader scientific understanding of the technologies and techniques used to perform digital forensics. In particular, various signature extraction techniques, detection, classification, and retrieval of forensically interesting patterns will be introduced. This will be complemented by studying fundamental concepts of data processing technologies like compression, watermarking, steganography, cryptography, and multiresolution analysis. Emerging standards along with issues driving the changing nature of this topic will be explored. Anti-forensic techniques that are used to counter forensic analysis will also be covered. Students will be exposed to relevant theory, programming practice, case studies, and contemporary literature on the subject.

Pages: 1 2 3


Find more about Cyber Forensics training courses, certificates, diplomas and degrees:





Facts:
This website holds more than 300,000 training course records worldwide, with hundreds of new postings daily. All services in this website are free!
United States  United Kingdom  Canada  Australia



Forensic
Cyber Forensics
- Online/E-learning -
Cyber Forensics
Ask for Training
Add Courses