Part time Course in Computer Security

Compare Part time Course Studies in Computer Security 2017

Computer Security

You can usually take higher education courses if you’re 18 or older. They’re regularly taught in universities, colleges and professional institutions such as art schools or agricultural colleges - nearly all of which have their own websites. You can get a wide range of skills, for example, diplomas, bachelor degrees, foundation degrees and post-graduate degrees.

Request Information Part time Course Studies in Computer Security 2017

Read More

STEM Themes Gap Year Programme

Oxford Royale Academy
Campus 10 - 10 weeks September 2017 United Kingdom Yarnton

Expert tuition and project work in Science, Technology, Engineering and Mathematics Themes for Gap Year students. [+]

Best Part time Course Studies in Computer Security 2017. The Science, Technology, Engineering and Mathematics (STEM) Themes Gap Year programme strengthens students’ knowledge and encourages them to further explore topics through individual extended project work. Introduction to STEM themes The STEM Themes Gap Year programme is ideal for students willing to challenge their existing knowledge and to develop their quantitative and research skills in preparation for a university degree or a work placement. Small core classes led by experienced teachers enable students to ascertain their understanding of the topics covered, while a selection of elective classes helps them develop new competencies. Students are also encouraged to think creatively to tackle topical issues. The Project As part of the Oxford Gap Year programme, students have the opportunity to fully explore their chosen topic through an individual extended project. Students attend workshops and tutorials with expert teachers to guide them. The extended project can take different forms depending on the chosen topic; an essay or an experiment for example; and concludes with an oral presentation. Topics Covered In addition to core Science, Technology, Engineering and Mathematics topics, the Gap Year programme encourages creative thinking on various topics related to physics, materials, biology, chemistry, health and environmental sciences such as: Designing F1 cars Changing the human body through steroids and prosthetics Could we colonise another planet? Food production and its impact on us and our environment Why take the programme? The relevance and the importance of STEM subjects in every student’s education are... [-]

EC-Council Certified Courses

Zeus Consulting
Campus 5 days September 2017 United Arab Emirates Dubai

Zeus Consulting is Accredited Trainings Centre of EC-Council. All EC-Council programs are delivered by certified trainers. [+]

Zeus Consulting is Accredited Trainings Centre of EC-Council. All EC-Council programs are delivered by certified trainers. EC-Council - Disaster Recovery Professional The EDRP course teaches you the methods in identifying vulnerabilities and takes appropriate countermeasures to prevent and mitigate failure risks for an organization. It also provides the networking professional with a foundation in disaster recovery principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies, and procedures, and understanding of the roles and relationships of various members of an organization, implementation of the plan, and recovering from a disaster. This EDRP course takes an enterprise-wide approach to developing a disaster recovery plan. Students will learn how to create a secure network by putting policies and procedures in place, and how to restore a network in the event of a disaster. Who Should Attend Network server administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment professionals. EC-Council - Certified Encryption Specialist ECES course introduces students to modern symmetric key cryptography including the details of algorithms such as Feistel Networks, DES, and AES as well as an overview of many other algorithms such as Blowfish, Twofish, Skipjack, and others. Students will learn the basics of information theory as it applies to cryptography. Students will be introduced to hashing algorithms including MD5, MD6, SHA, Gost, RIPMD 256 and others. The course also covers asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA. Students will master significant concepts such as diffusion, confusion,... [-]

Computer Security and Investigations

Fleming College
Campus 6 semesters September 2017 Canada Peterborough Lindsay Haliburton Cobourg + 2 more

The Computer Security and Investigations program is designed to provide you with the necessary knowledge and skills to take a leadership role in the protection and security of information technology. [+]

Best Part time Course Studies in Computer Security 2017. The Computer Security and Investigations program is designed to provide you with the necessary knowledge and skills to take a leadership role in the protection and security of information technology. Program Highlights The Computer Security and Investigations program is designed to provide you with the necessary knowledge and skills to take a leadership role in the protection and security of information technology. Your classes are regularly reviewed and improved to be the most current subjects demanded by the industry, such as: Advanced Ethical Hacking Threat and Risk Analysis Information Security Advanced Computer Forensics Internet and Hacking Investigations CISCO Network Design and Management Network Security Criminology Justice Studies In addition to these cutting edge subjects, you will also learn how to develop systems, procedures, and human resources to manage the risks associated with information technology - and be capable of providing technical assistance to prevent, investigate, and protect individuals and organizations from cyber-crime. Your studies will be from a security management and law enforcement perspective, with emphasis placed on both the technological and management skills required to implement information technology security, and the investigative skills necessary to respond appropriately to breaches of security. You will have the added benefit of courses in law, justice, and criminology, taking advantage of Fleming College’s reputation and experience in these fields, in addition to obtaining the technical training you need to function as a technological consultant. In this three-year program, the final sixth semester is an... [-]