Michigan Imperial University
Michigan Imperial University

Eligibility Criteria for UnderGraduate Certificate

03

of undergraduates get scholarships

Eligibility Criteria

High school diploma, GED or equiv. International Education

$2,340

(depend on traveling registrations)

18

Credit Hours

2 Months (Self-Paced) Program Years

Duration ( Self- Paced )

Courses offered in UnderGraduate Certificate in Cyber Crime

<<<<<<< HEAD

Gain a competitive edge in your field with an UnderGraduate Certificate from MIU. Our programs provide practical training and specialized knowledge, allowing you to build the skills and credentials needed for success. Whether you are just starting your career or looking to explore a new area of interest, an undergraduate certificate From MIU is the perfect way to enhance your knowledge and advance your professional prospects.

=======

Gain a competitive edge in your field with an Undergraduate Certificate from MIU. Our programs provide practical training and specialized knowledge, allowing you to build the skills and credentials needed for success. Whether you are just starting your career or looking to explore a new area of interest, an undergraduate certificate from MIU is the perfect way to enhance your knowledge and advance your professional prospects.

>>>>>>> Update
  • Courses Code

  • Courses Name

  • Credit Hours

  • CYC-050

  • Data Recovery Techniques (CYC-050)

  • 6 Credits Credits

  • View

  • CYC-090

  • Network Defense (CYC-090)

  • 6 Credits Credits

  • View

  • CYC-091

  • Computer Crime Investigation (CYC-091)

  • 6 Credits Credits

  • View

Michigan Imperial University Welcomes Students from all
Corners of the Globe to its Doors

At Michigan Imperial University, we believe in making education accessible to everyone, regardless of location or background. Our online programs are designed to be flexible and accessible to students from all around the world.Our virtual classrooms allow students from different countries and time zones to come together and learn from each other, creating a truly global learning experience. Our online platform also makes it easy for students to access course materials and communicate with their professors and peers, no matter where they are located.

EXPLORE MORE

Data Recovery Techniques (CYC-050)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Introduction To Disaster Recovery
     Preparing To Develop The Disaster Recovery Plan
  In Section 2 of this course you will cover these topics:
     Assessing Impact And Risks In The Enterprise
     Prioritizing Systems And Functions For Recovery
  In Section 3 of this course you will cover these topics:
     Identifying Data Storage And Recovery Sites
     Developing Plans And Procedures, And Relationships
  In Section 4 of this course you will cover these topics:
     Developing Procedures For Special Circumstances
     Testing The Disaster Recovery Plan
  In Section 5 of this course you will cover these topics:
     Continued Assessment Of Needs, Threats, And Solutions

Network Defense (CYC-090)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Introduction To Network Security
     Types Of Attacks
     Fundamentals Of Firewalls
  In Section 2 of this course you will cover these topics:
     Firewall Practical Applications
     Intrusion Detection Systems
     Encryption
  In Section 3 of this course you will cover these topics:
     Virtual Private Networks
     Operating System Hardening
     Defending Against Virus Attacks
  In Section 4 of this course you will cover these topics:
     Defending Against Trojan Horses And Spyware
     Security Policies
     Assessing A System
  In Section 5 of this course you will cover these topics:
     Security Standards
     Computer-Based Espionage And Terrorism

Computer Crime Investigation (CYC-091)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Introduction
     Computer Terminology And History
     History Of Crime And Computer Crime  
  In Section 2 of this course you will cover these topics:
     Computers As Targets    
     Avenues For Prosecution And Government Efforts    
     Applying The First Amendment To Computer-Related Crime  
  In Section 3 of this course you will cover these topics:
     The Fourth Amendment    
     Computer Forensic Terminology And Computer Investigations  
     Developing Computer Forensic Science Capabilities  
  In Section 4 of this course you will cover these topics:
     Computer Investigations: Pre-Search Activities  
     On-Scene Activities    
  In Section 5 of this course you will cover these topics:
     Data Analysis
     Conclusions And Future Issues

ON THE WORLD STAGE

Michigan Imperial University Makes a Strong Showing in Global Rankings, Securing a Place in the Top 100 Universities Worldwide.

40

in the Times Higher Education World University Rankings

80

in the QS World University Rankings

50

in the US News & World Report's National University Rankings

*TOP