Michigan Imperial University
Michigan Imperial University

Eligibility Criteria for Graduate Course Certificate

01

of undergraduates get scholarships

Eligibility Criteria

Bachelor's degree, or equiv. International Education

$1,560

(depend on traveling registrations)

6

Credit Hours

3 Months (Self-Paced) Program Years

Duration ( Self- Paced )

Courses offered in Graduate Course Certificate in Cyber Crime

<<<<<<< HEAD

Expand your knowledge and enhance your professional skills with a Graduate Course Certificate From MIU. Our programs offer focused training in specific areas of study, giving you the opportunity to develop expertise in your field and stay ahead of the curve. With flexible course options and knowledgeable faculty, a Graduate Course Certificate From MIU is the perfect way to boost your career prospects and achieve your professional goals.

=======

Expand your knowledge and enhance your professional skills with a Graduate Course Certificate from MIU. Our programs offer focused training in specific areas of study, giving you the opportunity to develop expertise in your field and stay ahead of the curve. With flexible course options and knowledgeable faculty, a Graduate Course Certificate from MIU. is the perfect way to boost your career prospects and achieve your professional goals.

>>>>>>> Update
  • Courses Code

  • Courses Name

  • Credit Hours

  • CYC-156

  • Security Policies (CYC-156)

  • 6 Credits Credits

  • View

  • CYC-219

  • Advanced Data Recovery Techniques (CYC-219)

  • 6 Credits Credits

  • View

  • CYC-693

  • Cryptography (CYC-693)

  • 6 Credits Credits

  • View

  • CYC-749

  • Forensics Investigation (CYC-749)

  • 6 Credits Credits

  • View

  • CYC-772

  • Cyber Crime (CYC-772)

  • 6 Credits Credits

  • View

Michigan Imperial University Welcomes Students from all
Corners of the Globe to its Doors

At Michigan Imperial University, we believe in making education accessible to everyone, regardless of location or background. Our online programs are designed to be flexible and accessible to students from all around the world.Our virtual classrooms allow students from different countries and time zones to come together and learn from each other, creating a truly global learning experience. Our online platform also makes it easy for students to access course materials and communicate with their professors and peers, no matter where they are located.

EXPLORE MORE

Security Policies (CYC-156)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     The History Of Private Security
     Identifying The Essentials
     Short Security Scenarios
  In Section 2 of this course you will cover these topics:
     A Prevention System Overview: Structuring Your Security Objective
     Physical Security And Asset Protection
     Information And Computer Security
  In Section 3 of this course you will cover these topics:
     Personnel And Security Management
     Integration As The Centerpiece: Meeting Your Overall Security Objectives
     When Your Security Company Gets The Call, Will You Be Ready
  In Section 4 of this course you will cover these topics:
     Public And Private Police Interactions
     Legal Liability Issues
     Preparing An Emergency Response
  In Section 5 of this course you will cover these topics:
     Securing The Future: Drafting A Future For Public Safety
     A Return To Previous Settings

Advanced Data Recovery Techniques (CYC-219)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Introduction To Disaster Recovery
     Preparing To Develop The Disaster Recovery Plan
  In Section 2 of this course you will cover these topics:
     Assessing Impact And Risks In The Enterprise
     Prioritizing Systems And Functions For Recovery
  In Section 3 of this course you will cover these topics:
     Identifying Data Storage And Recovery Sites
     Developing Plans And Procedures, And Relationships
  In Section 4 of this course you will cover these topics:
     Developing Procedures For Special Circumstances
     Testing The Disaster Recovery Plan
  In Section 5 of this course you will cover these topics:
     Continued Assessment Of Needs, Threats, And Solutions

Cryptography (CYC-693)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Introduction
     Encryption Basics
     Link Encryption
  In Section 2 of this course you will cover these topics:
     Managing Secret Keys
     Security At The Ip Layer
     Virtual Private Networks
  In Section 3 of this course you will cover these topics:
     Remote Access With Ipsec
     Ipsec And Firewalls
  In Section 4 of this course you will cover these topics:
     Public Key Crypto And Ssl
     World Wide Web Transaction Security
  In Section 5 of this course you will cover these topics:
     Secured Electronic Mail
     Public Key Certificates

Forensics Investigation (CYC-749)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Forensic Evidence And Crime Investigation
     Computer Forensics And Digital Detective Work
     Tools, Environments, Equipment, And Certifications
  In Section 2 of this course you will cover these topics:
     Policies And Procedures
     Data, Pda, And Cell Phone Forensics
     Operating Systems And Data Transmission Basics For Digital Investigations
  In Section 3 of this course you will cover these topics:
     Investigating Windows, Linux, And Graphics Files
     E-Mail And Webmail Forensics
     Internet And Network Forensics And Intrusion Detection
  In Section 4 of this course you will cover these topics:
     Tracking Down Those Who Intend To Do Harm On A Large Scale
     Fraud And Forensic Accounting Investigation
  In Section 5 of this course you will cover these topics:
     Federal Rules And Criminal Codes
     Ethical And Professional Responsibility In Testimony

Cyber Crime (CYC-772)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Introduction To Cyber Crime And Security
     Networks And The Internet
     Assessing A Target System
  In Section 2 of this course you will cover these topics:
     Denial Of Service Attacks
     Malware
     Basics Of Assessing And Securing A System
  In Section 3 of this course you will cover these topics:
     Encryption
     Internet Fraud And Cyber Crime
  In Section 4 of this course you will cover these topics:
     Industrial Espionage
     Cyber Terrorism And Information Warfare
  In Section 5 of this course you will cover these topics:
     Cyber Detective
     Security Hardware And Software

ON THE WORLD STAGE

Michigan Imperial University Makes a Strong Showing in Global Rankings, Securing a Place in the Top 100 Universities Worldwide.

40

in the Times Higher Education World University Rankings

80

in the QS World University Rankings

50

in the US News & World Report's National University Rankings

*TOP