18 Results in Computer Security
In the Master of Science in Information, Network, and Computer Security, you will critically evaluate various technical/architectural solutions to limit risk, mitigate th ... [+]
Information, Network, & Computer Security, M.S.
In the Master of Science in Information, Network, and Computer Security, you will:
critically evaluate various technical/architectural solutions to limit risk, mitigate the effects of hostile action, and recover from attacks design, implement, and maintain software tools to support network security across multiple operating systems oversee the information lifecycle of an organization, including planning, acquisition, and implementation of secure infrastructures study algorithm concepts, computer forensics, risk management and legal issues, and intrusion detection and hacker exploits.
NYIT professors have been awarded several prestigious research grants in the field, in areas including:... [-]
The MBA is recognized internationally as the most suitable qualification to prepare business people for successful careers within the senior cadres of their organizations ... [+]
Online Courses in partnership with The Training Portal
COM503CompTIA N10-006: CompTIA Network+
COM504CompTIA CAS-001: Advanced Security Practitioner (CASP)
PHU Online Courses
MGT501Business Management and Leadership
MGT504Knowledge Management and Technology
MGT507Online Business and eCommerce Management
MGT509Project Management
MGT513Business Process Management
Open Enrollment PolicyStudents can enroll at any time from anywhere. There is also flexibility in pacing the course.
Admission Requirement Applicants must possess an appropriate Undergraduate University or College degree from a recognized institution Applicants who do not hold a university or college degree will be considered for admissions if they have professional certification/diploma AND minimum three years full-time appropriate work experience Fees And Finance US$2,980 if you complete the program in 2 years. US$400 will be required to pay for every additional year. The maximum period of study is 5 years. Graduation Fee: US$250 (Including US Department of State Attestation and courier - If you need other country's attestation, please inquire at admission@pebblehills.edu for the fees) Professional Recognition ... [-]The MSc is a three-semester taught programme in computing which focuses on topics applicable to Systems and Software Security. ... [+]
Is this Course for You?
The MSc is a three-semester taught programme in computing which focuses on topics applicable to Systems and Software Security. These are followed by a dissertation which will offer the student the opportunity to apply a range of topics covered in the taught part of the programme to demonstrate an extended knowledge and ability in that area. The dissertation will normally be completed over one to two additional semesters.
From an industry point of view, this programme was developed in partnership with the IT industry in the north-west and with Pramerica in particular. The objective of developing the course is to ensure a supply of highly-skilled and experienced graduates for key employers locally and throughout Ireland. The existence of the course and the placement reflects the commitment of employers to this field of expertise. Graduates from this course can expect to find attractive employment opportunities locally and nationally.... [-]
This programme is suitable for both newcomers to computer security and computer forensics and practitioners who wish to further their skills. It covers relevant skills, s ... [+]
Students gain knowledge of computer crime, police and forensic methods, and the legal requirements for collecting evidence.
At the end of the programme, students are able to administer and configure business-critical distributed applications. They also gain an understanding of the threats to business networks and servers.
The programme includes hands-on training in current forensic tools as used by the police. Students can, therefore, contribute quickly to the well-being of corporate IT and informational assets.
Though our short course centre opportunity may also be provided to study for the following professional qualifications: Certified Ethical Hacker (EC-Council); EnCase Computer Forensics, Penetration Testing and Vulnerability Assessment.... [-]
In the Master of Science in Information, Network, and Computer Security, you will critically evaluate various technical/architectural solutions to limit risk, mitigate th ... [+]
In the Master of Science in Information, Network, and Computer Security, you will:
critically evaluate various technical/architectural solutions to limit risk, mitigate the effects of the hostile action, and recover from attacks design, implement and maintain software tools to support network security across multiple operating systems oversee the information lifecycle of an organization, including planning, acquisition, and implementation of secure infrastructures study algorithm concepts, computer forensics, risk management and legal issues, and intrusion detection and hacker exploitsNYIT professors have been awarded several prestigious research grants in the field, in areas including:... [-]
The Master of Science in Network and Computer Security offers students a cutting-edge curriculum in the field of cybersecurity focusing on practical security issues in ne ... [+]
Master of Science in Network and Computer Security
The Master of Science in Network and Computer Security offers students a cutting-edge curriculum in the field of cybersecurity focusing on practical security issues in networking and computing. The program has been developed in conjunction with local experts in both industry and government.
The program is designed for students who have the equivalent of an undergraduate degree in network and computer security, computer science or systems, electrical engineering or a related field; however, students without a background in one of these areas may enter the program by completing appropriate pre-requisite coursework under the guidance of a faculty adviser. Students with appropriate professional experience in information technology may also be eligible for program admission... [-]
From forensic computing to network security, the course covers a wide range of subjects. Within these, you will learn about web hacking, password cracking, malware analys ... [+]
Why choose this course?
Provides the core skills to allow you to take positions in a variety of companies where computer security is a major issue Graduates will be at the forefront of new developments in security Benefit from an active teaching group with a growing reputation based on industry links and Knowledge Transfer projects Delivered in a project-based, entrepreneurial and enterprise cultureAbertay is the only university in the UK that offers a Master's programme in Ethical Hacking and our students are passionate about their subject area and developing their knowledge. Ethical Hacking is the process of evaluating the security of a computer system by simulating an attack by a malicious hacker. The course is designed to teach students how to think like a hacker, providing them with a deep understanding of security issues and concerns.... [-]
This programme is designed for graduates with a good first degree in computer science, information systems or another computing-related subject, with some knowledge of co ... [+]
MSc Network and Computer Systems Security
This programme is designed for graduates with a good first degree in computer science, information systems or another computing-related subject, with some knowledge of computer networks studied at undergraduate level. It is suitable for both new graduates wishing to specialise in computer security and IT professionals who wish to further their skills and move into this area.
It covers the relevant skills, software and hardware technologies as well as more theoretical studies that underpin everyday practice. It will, in addition, ensure that students have a basic understanding of the legal, regulatory requirements, and international standards requirements, pertaining to computer security in different nations.... [-]
The master’s program in Security and Cloud Computing, SECCLO, is an Erasmus Mundus program in the field of Computer Science and, more specifically, Security and Cloud Com ... [+]
The master’s program in Security and Cloud Computing, SECCLO, is an Erasmus Mundus program in the field of Computer Science and, more specifically, Security and Cloud Computing. The program is offered jointly by six European universities and students will study in two European countries and graduate with a double degree.
Overview Degree awarded: Master of Science The language of instruction: English Duration: Two years (120 ECTS credits) Programme start: Late August School: School of Electrical Engineering and Computer Science Security and Cloud Computing at KTHThe program offers both practical engineering knowledge and theoretical insights into:... [-]
From national security to the privacy of personal communications, the smooth running of societies and economies depends on the security of computer networks. With a secur ... [+]
Why study MSc Network Security and Pen Testing at Middlesex? Our course provides both intensive practical training and a profound theoretical education, extending beyond the technicalities of network security to cover strategic and organisational issues. Unless you're already in employment, we'll help you to find a placement for up to 12 weeks, during which you'll work on your independent research project.
Our award-winning technology centre has five specialist laboratories equipped with the latest industry-standard hardware and software, including OPNET, Wireshark, MATLAB, Simulink, OpNet Modeller 17.0, OMNeT++, NI and Cisco technology such as Packet Tracer. While studying for this qualification you will work with our LTE test bed and Blade Server, and you will learn how to access and configure cloud-based networks. As part of your studies, you'll also have the opportunity to work towards a Cisco CCNA professional certification, worth £1,600 and considered the gold standard in the industry.... [-]
Students taking the Information Security & Privacy degree are given the opportunity to gain external accreditation in Microsystemation XRY, an industry-leading mobile ... [+]
1 year (Full-time) / 3 years (Part-time) / n/a (Distance / E-Learning)
Students taking the Information Security & Privacy degree are given the opportunity to gain external accreditation in Microsystemation XRY, an industry-leading mobile phone forensics tool. The School is one of only five universities in the UK to offer this training
Course AimsAppropriate security measures are an essential part of any modern enterprise. A detailed understanding of the key threats and the essential techniques for ensuring security, privacy and trust are fundamental requirements for successful information systems.Emerging software deployment and use, through the use of data outsourcing such as in Cloud computing and with the increasing use of social media platforms, opens up significant security and privacy issues which future IT professionals need to be aware of. Professionals in this field are well placed for a wide variety of employment opportunities.... [-]
This cross-disciplinary program enables graduates to develop a strong foundation preparing them for leadership positions in both the private and public sectors in the com ... [+]
Developers and practitioners need to understand the importance of building security and survivability into systems, rather than trying to add it once systems are installed. This curriculum addresses these concerns by drawing on the expertise of the faculty from the departments that make up the Golisano College.The MS in computing security and information assurance includes a foundation of seven core courses designed to give students a better understanding of the technological and ethical roles of computer security in society. Students then develop a specialization in one of several areas by selecting four related elective courses under the guidance of a faculty adviser. Students conclude their program of study with a thesis, completed under the guidance of the faculty. This cross-disciplinary program enables graduates to develop a strong foundation, preparing them for leadership positions in both the private and public sectors in the computer security industry or for an advanced degree. Students also can prepare for academic or research careers in computer security and information assurance, as well as further academic study.Faculty members in the contributing departments are actively engaged in consulting and research in the information assurance areas, including cryptography, databases, networking, and software engineering. There are many opportunities for graduate students to participate in these research activities toward a thesis or independent study work.... [-]
Interest in computer security is booming. From whistle-blower, Edward Snowden to the NHS ransomware attack, the increase in cybercrime has led to a strong demand for secu ... [+]
Interest in computer security is booming. From whistle-blower, Edward Snowden to the NHS ransomware attack, the increase in cybercrime has led to a strong demand for security experts in this area. This online course will teach you how to protect and safeguard the information stored on digital devices around the world.
With an in-depth focus on penetration testing and the implementation of defensive measures, your course will enhance your existing computing knowledge and develop your security expertise. We will teach you how to break systems in order to tighten their security and stop others from breaking into them, and you will develop new methods to protect a company's security.... [-]
This program aims at providing a solid background in the design and management of systemic engineering and network architecture of companies. ... [+]
This program aims at providing a solid background in the design and management of systemic engineering and network architecture of companies.
This specialization also focuses on network security and cryptography by including elements from both disciplines in the curriculum. Students in Computer Security will benefit from a disciplined approach to understanding the management, technical and legal issues associated with the security of information from a benchmarked step by step approach resulting in optimal security within risk tolerance limits.
TestimonyApoorv Chitray - India - Computer Security, Class of 2017
Professors were exemplary and helpful and the fusion between business and technology courses have provided a strong foundation to my industrial outlook with research focus which leads me to gain pace in the corporate World. Courses like Network security, Penetration testing, and PKI groomed me technically on one side and courses like Project Management, Business Writing, and Cross-Border Management made me learn about the corporate environment.... [-]
Cyber threats continue to increase, as do the opportunities for information security and assurance experts. More businesses are storing their data offsite in the cloud an ... [+]
Cyber threats continue to increase, as do the opportunities for information security and assurance experts. More businesses are storing their data offsite in the cloud and more employees have remote access to systems and data. This provides some uncertainty, as does the use of non-sanctioned devices on company networks. Cybercrime is also a reality for large corporations, e-commerce companies, defense firms, and, of course, the federal government. Information security and assurance is an ever-changing quest that challenges professionals at each turn. Staying ahead of the threat requires up-to-the-moment knowledge, like the curriculum available here at Norwich University. The Norwich University Master of Science in Information Security & Assurance online program delivers a relevant overview of security standards and computer security models, as well as topics that cover effective technology, risk management, and analytics. Our goal is to reinforce your existing information security knowledge, while also supporting your needs for advanced study of the management skills necessary to implement an enterprise-wide information assurance program. If you are transitioning into the Information Security (IS) field or looking to enhance your IS-related skill set, Virtual Security Cloud Labs, a secure, hands-on cloud computing platform, will provide you the opportunity to work on real-world business scenarios using IS tools to prepare you for a demanding career in IS.... [-]