Part time Course in Computer Security

View all Part time Course Studies in Computer Security 2017

Computer Security

A course is the study of a particular topic within a wider subject area and is the foundation of a qualification. A typical course includes lectures, assessments and tutorials.

Request Information Part time Course Studies in Computer Security 2017

Read More

Information Security Management

Fanshawe College
Campus or Online 1 year September 2017 Canada London

Information Security Management is a graduate program designed to provide students with a holistic approach to information systems security as it applies to business. [+]

Best Part time Course Studies in Computer Security 2017. Information Security Management Offered as an online distance education program and in a face-to-face classroom format * Secure your future in the fastest-growing sector! Information Security Management is a graduate program designed to provide students with a holistic approach to information systems security as it applies to business. The program will provide a broad understanding of security concepts and concentrate on industry best practices for information security. You will gain the knowledge required to manage both the strategic and operational aspects of information security, and develop the skills to identify vulnerabilities to business implementing effective safeguards to minimize risks to acceptable levels. During the year, you will learn detailed practical aspects of security such as risk analysis, vulnerability testing, writing security policies, implementing access controls, and performing security audits. Graduates would obtain positions such as security analysts, chief security officer, information security auditor, network security analyst, IT technical security specialist, and threat-risk/vulnerability security specialist. * Classes are delivered online and face-to-face on campus. Full-time or part-time students have the option to watch live and interactive webcasts or attend classes face-to-face on campus. All webcasts will be recorded and archived so you can review material and learn at your own pace. Students will require access to a computer and the Internet, preferably high-speed if attending online, and students will require a suitable laptop if attending face-to-face classes. Academic School: Information Technology Campus: London Campus (LC) Program Delivery: Day Time, Full Time, Online Program Type: Certificate, Graduate Available to International Students?: Yes Admission Requirements A Two- or Three-Year College Diploma, or a Degree OR Acceptable combination of related work experience and post-secondary education as judged by the College to be equivalent to the above English Language Requirements Applicants whose first language is not English will be required to demonstrate proficiency in English by one of the following methods: A Grade 12 College Stream or University Stream English credit from an Ontario Secondary School, or equivalent, depending on the program's Admission Requirements Test of English as a Foreign Language (TOEFL) test with a minimum score of 570 for the paper-based test (PBT), or 88 for the Internet-based test (iBT), with test results within the last two years International English Language Testing System (IELTS) test with an overall score of 6.5 with no score less than 6.0 in any of the four bands, with test results within the last two years Canadian Academic English Language (CAEL) test with an overall score of 70 with no score less than 60 in any of the four bands, with test results within the last two years An English Language Evaluation (ELE) at Fanshawe College with a minimum score of 75% in all sections of the test, with test results within the last two years Recommended Academic Preparation Previous business or IT post-secondary education and/or training and/or work experience. Applicant Selection Criteria Where the number of eligible applicants exceeds the available spaces in the program, the Applicant Selection Criteria will be: Preference for Permanent Residents of Ontario Receipt of Application by February 1st (After this date, Fanshawe College will consider applicants on a first-come, first-served basis until the program is full) Achievement in the Admission Requirements Other Information Classes are delivered online and face-to-face on campus. Full-time and part-time students have the option to watch live and interactive webcasts or attend classes face-to-face on campus for most courses. All webcasts will be recorded and archived so students can review material and learn at their own pace. Students will require access to a computer and the Internet, preferably high-speed if attending online, and students will require a suitable laptop as per specs if attending in face-to-face classes. Approximate Costs A laptop computer is to be purchased by the student attending the face-to-face classroom format. A laptop or computer with microphone, speaker and internet connection is required for the student attending online. The cost of the equipment is included in the General Expenses stated in the Fee Schedule. A CONNECT lab fee of $75.00 per academic term is included in the Additional Program Fees stated in the Fee Schedule. This fee helps cover costs associated with the delivery of the CONNECT mobile computing program. The CONNECT lab fee is OSAP eligible. Students should not purchase a laptop computer or software until the College publishes the recommended configuration, models, software titles and versions for that academic year. Career Opportunities This program will prepare graduates to take advantage of the growing opportunities in the information security field. Graduates will be an asset to any information technology support department or specifically as part of a security team, in virtually all sectors of business. Subsequently, with the right experience base, graduates can expect to find opportunities as security analysts and consultants, or in security management roles. They would obtain positions such as security analysts, information security auditor, network security analyst, IT technical security specialist, and threat-risk/vulnerability security specialist. [-]

EC-Council Certified Courses

Zeus Consulting
Campus 5 days September 2017 United Arab Emirates Dubai

Zeus Consulting is Accredited Trainings Centre of EC-Council. All EC-Council programs are delivered by certified trainers. [+]

Zeus Consulting is Accredited Trainings Centre of EC-Council. All EC-Council programs are delivered by certified trainers. EC-Council - Disaster Recovery Professional The EDRP course teaches you the methods in identifying vulnerabilities and takes appropriate countermeasures to prevent and mitigate failure risks for an organization. It also provides the networking professional with a foundation in disaster recovery principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies, and procedures, and understanding of the roles and relationships of various members of an organization, implementation of the plan, and recovering from a disaster. This EDRP course takes an enterprise-wide approach to developing a disaster recovery plan. Students will learn how to create a secure network by putting policies and procedures in place, and how to restore a network in the event of a disaster. Who Should Attend Network server administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment professionals. EC-Council - Certified Encryption Specialist ECES course introduces students to modern symmetric key cryptography including the details of algorithms such as Feistel Networks, DES, and AES as well as an overview of many other algorithms such as Blowfish, Twofish, Skipjack, and others. Students will learn the basics of information theory as it applies to cryptography. Students will be introduced to hashing algorithms including MD5, MD6, SHA, Gost, RIPMD 256 and others. The course also covers asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA. Students will master significant concepts such as diffusion, confusion, and Kerkchoff’s principle. Target Audience Penetration Testers, Computer Forensics Specialists, Anyone involved in selecting, implementing VPN’s or digital certificates, Anyone involved in information security operations EC-Council - Certified Security Specialist EC-Council Certified Security Specialist (ECSS) allows students to enhance their skills in three different areas namely information security, network security, and computer forensics. Target Audience The EC-Council Certified Security Specialist (ECSS) program is designed primarily for students of academic institutions. It covers the fundamental basics of information security, computer forensics, and network security. The program will give a holistic overview of the key components of information security. Students, who complete the ECSS program, will be equipped with the adequate foundation knowledge and should be able to progress onto the next level. EC-Council - Certified Secure Computer User The purpose of the CSCU training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. Target Audience This course is specifically designed for todays' computer users who use the internet and the www extensively to work, study and play. EC-Council - Network Security Administrator The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization’s information. Students will learn how to evaluate network and Internet security issues and design, and how to implement successful security policies and firewall strategies. In addition, they will learn how to expose system and network vulnerabilities and defend against them. The ENSA Course is for experienced hands in the industry and is backed by a curriculum designed by the best in the field. Who Should Attend This course will significantly benefit System Administrators, System Engineers, Firewall Administrators, Network Managers, IT Managers, IT Professionals and anyone who is interested in network security technologies. EC-Council - Certified Security Analyst The EC–Council Security Analyst (ECSA) program is a comprehensive, standards-based, methodology intensive training program which teaches information security professionals to conduct real life penetration tests by utilizing EC-Council’s published penetration testing methodology. Target Audience Network server administrators, firewall administrators, information security analysts, system administrators, and risk assessment professionals all benefit from the ECSA program Certified Ethical Hacker   A comprehensive Ethical Hacking and Information Systems Security Auditing program focusing on latest security threats, advanced attack vectors, and practical real time demonstration of the latest Hacking Techniques, methodologies, tools, tricks, and security measures. Unlike other strictly theoretical training, you will be immersed in interactive sessions with hands-on labs after each topic 
Target Audience This course is designed for security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of their network infrastructure. [-]

Computer Security and Investigations

Fleming College
Campus 6 semesters September 2017 Canada Peterborough

The Computer Security and Investigations program is designed to provide you with the necessary knowledge and skills to take a leadership role in the protection and security of information technology. [+]

Best Part time Course Studies in Computer Security 2017. The Computer Security and Investigations program is designed to provide you with the necessary knowledge and skills to take a leadership role in the protection and security of information technology. Program Highlights The Computer Security and Investigations program is designed to provide you with the necessary knowledge and skills to take a leadership role in the protection and security of information technology. Your classes are regularly reviewed and improved to be the most current subjects demanded by the industry, such as: Advanced Ethical Hacking Threat and Risk Analysis Information Security Advanced Computer Forensics Internet and Hacking Investigations CISCO Network Design and Management Network Security Criminology Justice Studies In addition to these cutting edge subjects, you will also learn how to develop systems, procedures, and human resources to manage the risks associated with information technology - and be capable of providing technical assistance to prevent, investigate, and protect individuals and organizations from cyber-crime. Your studies will be from a security management and law enforcement perspective, with emphasis placed on both the technological and management skills required to implement information technology security, and the investigative skills necessary to respond appropriately to breaches of security. You will have the added benefit of courses in law, justice, and criminology, taking advantage of Fleming College’s reputation and experience in these fields, in addition to obtaining the technical training you need to function as a technological consultant. In this three-year program, the final sixth semester is an applied project or co-operative field placement in partnership with business, industry, a law enforcement agency, or government department. Why Choose Fleming Fleming has a well-known track record of producing talented graduates in both the Applied Computing and Engineering Science, and the Law and Justice fields. As such, you will acquire the best we have to offer--in a new, winning combination that will put you on the road to success as an in-demand computer security specialist. There are no other programs like this in Ontario. The program will provide you with the knowledge and skills to prepare you for industry certification in both the computer forensics and networking disciplines. As you progress through the program you will gain the skills required to become industry certified in a number of areas, including: CCNA – Cisco Certified Network Architect CCE – Certified Computer Examiner Security+ Network+ A+ Linux+ MCSE – Microsoft Certified System Engineer CISSP – Certified Information Systems Security Professional (student level qualification) CEH - Certified Ethical Hacker EnCE - Encase Certified Examiner With your diploma, and these top certifications, you will demonstrate your abilities and value to the industry, gaining you the employment advantage. Work Experience In your final semester, you will work on an intensive team project or co-operative field placement. Each student will contribute specialized knowledge, learned in his or her program of study, to the solution of a real world technological problem posed by a sponsoring business or organization. Recent projects include: Co-operative placements within financial and forensic firms, working real cases Co-operative placements within corporate security departments and information security service providers Security and penetration testing of a large Internet Service Provider Forensic analysis and creation of standards for a security corporation Development of a Linux based Darknet and Intrusion Detection system for a professional penetration testing company Development and field deployment of a computer network Intrusion Detection System for a managed security service company to support large commercial clients This applied project or co-operative field placement will enhance problem-solving skills, applied industry knowledge, and the ability to work as part of a team. You'll also learn critical workplace skills such as time management, how to map a critical path, and presentation skills. Since you may be working on sophisticated developmental or research based work, sponsors will often use the project as a testing ground and recruitment opportunity. Is this You? excellent oral and written communication skills good problem solving skills creative and analytical thinking skills previous computing experience able to keep a cool head in a crisis research and investigative skills and interest desire to learn and be challenged strong time management skills Career Opportunities Career opportunities are available in both public and private sector organizations. Job titles include: Information Technology Security Analyst Information Security Administrator Computer Security Consultant Investigator Network Security Specialist Computer Forensics Examiner Digital Investigative Specialist Starting salaries for many positions are $40,000 to $60,000. Industry surveys identify that IT security professionals, with the security skills you will acquire, consistently earn higher income than others in the industry. Minimum Admission Requirements OSSD with the majority of credits at the College (C) and Open (O) level, including: 2 College (C) English courses (Grade 11 or Grade 12) 2 College (C) Math courses (Grade 11 or Grade 12) When (C) is the minimum course level for admission, (U) or (U/C) courses are also accepted. Mature Students If you are 19 years of age or older before classes start, and you do not possess an OSSD, you can write the Canadian Adult Achievement Test to assess your eligibility for admission. Additional testing or academic upgrading may be necessary to meet specific course requirements for this program. Advanced Standing Do you have another college diploma, or have you completed other technology courses at another college or university? You may be eligible for advanced standing entry to the Computer Security and Investigations program. With this fast track option, you can quickly complete the program and become qualified to enter the field of computer security. Contact the program coordinator to find out how you can take advantage of this opportunity. Transfer Agreements University of Ontario Institute of Technology [-]