NEW YORK
METROPOLITAN
UNIVERSITY

Graduate Course Certificate in Criminal Justice in Cyber Crime

  • Eligibility Criteria

    Bachelor's degree, or equiv. International Education

  • Credit Hours

    6

  • Courses Offered

    5

  • Course Duration

    3 Months (Self-Paced) Program

  • Estimated Fee

    $1,560

Courses Offered

A graduate certificate offered by NYMU is respected by many accreditation authorities worldwide and the decree that t holds will serve to create a line of fantastic job opportunities that will eventually progress your career.

Security Policies (CYC-156)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     The History Of Private Security
     Identifying The Essentials
     Short Security Scenarios
  In Section 2 of this course you will cover these topics:
     A Prevention System Overview: Structuring Your Security Objective
     Physical Security And Asset Protection
     Information And Computer Security
  In Section 3 of this course you will cover these topics:
     Personnel And Security Management
     Integration As The Centerpiece: Meeting Your Overall Security Objectives
     When Your Security Company Gets The Call, Will You Be Ready
  In Section 4 of this course you will cover these topics:
     Public And Private Police Interactions
     Legal Liability Issues
     Preparing An Emergency Response
  In Section 5 of this course you will cover these topics:
     Securing The Future: Drafting A Future For Public Safety
     A Return To Previous Settings

Advanced Data Recovery Techniques (CYC-219)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Introduction To Disaster Recovery
     Preparing To Develop The Disaster Recovery Plan
  In Section 2 of this course you will cover these topics:
     Assessing Impact And Risks In The Enterprise
     Prioritizing Systems And Functions For Recovery
  In Section 3 of this course you will cover these topics:
     Identifying Data Storage And Recovery Sites
     Developing Plans And Procedures, And Relationships
  In Section 4 of this course you will cover these topics:
     Developing Procedures For Special Circumstances
     Testing The Disaster Recovery Plan
  In Section 5 of this course you will cover these topics:
     Continued Assessment Of Needs, Threats, And Solutions

Cryptography (CYC-693)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Introduction
     Encryption Basics
     Link Encryption
  In Section 2 of this course you will cover these topics:
     Managing Secret Keys
     Security At The Ip Layer
     Virtual Private Networks
  In Section 3 of this course you will cover these topics:
     Remote Access With Ipsec
     Ipsec And Firewalls
  In Section 4 of this course you will cover these topics:
     Public Key Crypto And Ssl
     World Wide Web Transaction Security
  In Section 5 of this course you will cover these topics:
     Secured Electronic Mail
     Public Key Certificates

Forensics Investigation (CYC-749)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Forensic Evidence And Crime Investigation
     Computer Forensics And Digital Detective Work
     Tools, Environments, Equipment, And Certifications
  In Section 2 of this course you will cover these topics:
     Policies And Procedures
     Data, Pda, And Cell Phone Forensics
     Operating Systems And Data Transmission Basics For Digital Investigations
  In Section 3 of this course you will cover these topics:
     Investigating Windows, Linux, And Graphics Files
     E-Mail And Webmail Forensics
     Internet And Network Forensics And Intrusion Detection
  In Section 4 of this course you will cover these topics:
     Tracking Down Those Who Intend To Do Harm On A Large Scale
     Fraud And Forensic Accounting Investigation
  In Section 5 of this course you will cover these topics:
     Federal Rules And Criminal Codes
     Ethical And Professional Responsibility In Testimony

Cyber Crime (CYC-772)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Introduction To Cyber Crime And Security
     Networks And The Internet
     Assessing A Target System
  In Section 2 of this course you will cover these topics:
     Denial Of Service Attacks
     Malware
     Basics Of Assessing And Securing A System
  In Section 3 of this course you will cover these topics:
     Encryption
     Internet Fraud And Cyber Crime
  In Section 4 of this course you will cover these topics:
     Industrial Espionage
     Cyber Terrorism And Information Warfare
  In Section 5 of this course you will cover these topics:
     Cyber Detective
     Security Hardware And Software

Why Choose New York Metropolitan University

New York Metropolitan University is the name of excellence, and we emphasize fully working on the future of our students just so they can reach their true potential. Our unparalleled campus experience allows students of all races and religions to excel in their abilities. Here, you are not just growing in your educational career; you can also focus on and enhance your extracurricular activities. We are passionate about providing you with the best overall experience before you enter your professional career path. However, the real career paths of students begin with us.