Program Overview

  • Duration

    1 Month (Self-Paced) Program

  • Total Courses

    02

  • Total Credit Hours

    12

The Cyber Crime program at University of North Carolina is at the forefront of the battle against cyber threats and digital crime. Students delve into the world of cybersecurity, digital forensics, and cybercrime investigation. The curriculum covers cyberattack prevention, evidence collection from digital devices, and cyber law. Graduates are well-prepared to combat cybercrime in law enforcement agencies, government organizations, and private cybersecurity firms.

TUITION

Fees Breakdown Cost
GRADUATE CERTIFICATE IN CRIMINAL JUSTICE $1,800
Medical Insurance $0.00
Personal Expenses $0.00
Study Materials $0.00
Food Cost $0.00
Total Tuition Fee $1,800
WHERE AFFORDABILITY

Meets Opportunity

At the University of North Carolina, we champion the synergy of affordability and opportunity. Our unwavering dedication to accessible education ensures that exceptional learning doesn't come with an exorbitant price. We unlock the gates to knowledge, extending students the opportunity to flourish without the heavy weight of overwhelming tuition costs, empowering them for a brighter, more promising future.

Our Eligibility Criteria

Explore UONC’s Eligibility Criteria for Students Worldwide

Eligibility Criteria

Bachelor's degree, or equiv. International Education

Credit Hours

12

Course Duration

1 Month (Self-Paced) Program

Courses Offered

02

Exploring the Fundamentals of Criminal Law and Systems of Justice

At the outset of their journey in the College of Criminal Justice, students embark on a thorough examination of criminal law and the intricate justice systems. This educational phase imparts profound insights into legal principles, criminology, and law enforcement methodologies. Armed with this foundational expertise, students are well-prepared to navigate the intricate landscape of the criminal justice domain.

Hands-On Learning and Involvement with the Community

Outside the traditional classroom setting, the College of Criminal Justice places significant importance on hands-on learning and active community involvement. Students are afforded opportunities to intern with law enforcement agencies, partake in mock trials, and interact with local communities. These experiences not only refine their practical abilities but also offer invaluable perspectives into the world of criminal justice.

nvestigating Global Criminal Justice Challenges and Cross-Border Collaboration

At the University of North Carolina's College of Criminal Justice, we are deeply committed to confronting global criminal justice concerns and promoting international collaborations. Our curriculum delves into crime and justice from a worldwide standpoint, inspiring students to partake in joint research efforts and initiatives with global organizations. This global outlook equips our students to confront the intricate challenges within the field of criminal justice.

Data Recovery Techniques (CYC-050)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Introduction To Disaster Recovery
     Preparing To Develop The Disaster Recovery Plan
  In Section 2 of this course you will cover these topics:
     Assessing Impact And Risks In The Enterprise
     Prioritizing Systems And Functions For Recovery
  In Section 3 of this course you will cover these topics:
     Identifying Data Storage And Recovery Sites
     Developing Plans And Procedures, And Relationships
  In Section 4 of this course you will cover these topics:
     Developing Procedures For Special Circumstances
     Testing The Disaster Recovery Plan
  In Section 5 of this course you will cover these topics:
     Continued Assessment Of Needs, Threats, And Solutions

Network Defense (CYC-090)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Introduction To Network Security
     Types Of Attacks
     Fundamentals Of Firewalls
  In Section 2 of this course you will cover these topics:
     Firewall Practical Applications
     Intrusion Detection Systems
     Encryption
  In Section 3 of this course you will cover these topics:
     Virtual Private Networks
     Operating System Hardening
     Defending Against Virus Attacks
  In Section 4 of this course you will cover these topics:
     Defending Against Trojan Horses And Spyware
     Security Policies
     Assessing A System
  In Section 5 of this course you will cover these topics:
     Security Standards
     Computer-Based Espionage And Terrorism