Program Overview

  • Duration

    3 Months (Self-Paced) Program

  • Total Courses

    01

  • Total Credit Hours

    6

The Cyber Crime program at University of North Carolina is at the forefront of the battle against cyber threats and digital crime. Students delve into the world of cybersecurity, digital forensics, and cybercrime investigation. The curriculum covers cyberattack prevention, evidence collection from digital devices, and cyber law. Graduates are well-prepared to combat cybercrime in law enforcement agencies, government organizations, and private cybersecurity firms.

This course explores security policies and procedures in information technology. Students examine policy development, compliance, and implementation in various IT environments.


Students gain expertise in advanced data recovery techniques, covering complex data restoration methods and tools for challenging scenarios.


This course covers forensics investigation, teaching students how to analyze digital evidence, conduct forensic examinations, and present findings in legal contexts.


Students study various aspects of cybercrime, including its impact on individuals and organizations, prevention strategies, and legal responses.


This course provides an introduction to public health with a focus on disease prevention. Students learn about public health principles, epidemiology, and strategies for promoting health and preventing diseases.

TUITION

Fees Breakdown Cost
GRADUATE COURSE CERTIFICATE IN CRIMINAL JUSTICE $1,560
Medical Insurance $0.00
Personal Expenses $0.00
Study Materials $0.00
Food Cost $0.00
Total Tuition Fee $1,560
WHERE AFFORDABILITY

Meets Opportunity

At the University of North Carolina, we champion the synergy of affordability and opportunity. Our unwavering dedication to accessible education ensures that exceptional learning doesn't come with an exorbitant price. We unlock the gates to knowledge, extending students the opportunity to flourish without the heavy weight of overwhelming tuition costs, empowering them for a brighter, more promising future.

Our Eligibility Criteria

Explore UONC’s Eligibility Criteria for Students Worldwide

Eligibility Criteria

Bachelor's degree, or equiv. International Education

Credit Hours

6

Course Duration

3 Months (Self-Paced) Program

Courses Offered

01

Exploring the Fundamentals of Criminal Law and Systems of Justice

At the outset of their journey in the College of Criminal Justice, students embark on a thorough examination of criminal law and the intricate justice systems. This educational phase imparts profound insights into legal principles, criminology, and law enforcement methodologies. Armed with this foundational expertise, students are well-prepared to navigate the intricate landscape of the criminal justice domain.

Hands-On Learning and Involvement with the Community

Outside the traditional classroom setting, the College of Criminal Justice places significant importance on hands-on learning and active community involvement. Students are afforded opportunities to intern with law enforcement agencies, partake in mock trials, and interact with local communities. These experiences not only refine their practical abilities but also offer invaluable perspectives into the world of criminal justice.

nvestigating Global Criminal Justice Challenges and Cross-Border Collaboration

At the University of North Carolina's College of Criminal Justice, we are deeply committed to confronting global criminal justice concerns and promoting international collaborations. Our curriculum delves into crime and justice from a worldwide standpoint, inspiring students to partake in joint research efforts and initiatives with global organizations. This global outlook equips our students to confront the intricate challenges within the field of criminal justice.

Security Policies (CYC-156)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     The History Of Private Security
     Identifying The Essentials
     Short Security Scenarios
  In Section 2 of this course you will cover these topics:
     A Prevention System Overview: Structuring Your Security Objective
     Physical Security And Asset Protection
     Information And Computer Security
  In Section 3 of this course you will cover these topics:
     Personnel And Security Management
     Integration As The Centerpiece: Meeting Your Overall Security Objectives
     When Your Security Company Gets The Call, Will You Be Ready
  In Section 4 of this course you will cover these topics:
     Public And Private Police Interactions
     Legal Liability Issues
     Preparing An Emergency Response
  In Section 5 of this course you will cover these topics:
     Securing The Future: Drafting A Future For Public Safety
     A Return To Previous Settings

Advanced Data Recovery Techniques (CYC-219)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Introduction To Disaster Recovery
     Preparing To Develop The Disaster Recovery Plan
  In Section 2 of this course you will cover these topics:
     Assessing Impact And Risks In The Enterprise
     Prioritizing Systems And Functions For Recovery
  In Section 3 of this course you will cover these topics:
     Identifying Data Storage And Recovery Sites
     Developing Plans And Procedures, And Relationships
  In Section 4 of this course you will cover these topics:
     Developing Procedures For Special Circumstances
     Testing The Disaster Recovery Plan
  In Section 5 of this course you will cover these topics:
     Continued Assessment Of Needs, Threats, And Solutions

Cryptography (CYC-693)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Introduction
     Encryption Basics
     Link Encryption
  In Section 2 of this course you will cover these topics:
     Managing Secret Keys
     Security At The Ip Layer
     Virtual Private Networks
  In Section 3 of this course you will cover these topics:
     Remote Access With Ipsec
     Ipsec And Firewalls
  In Section 4 of this course you will cover these topics:
     Public Key Crypto And Ssl
     World Wide Web Transaction Security
  In Section 5 of this course you will cover these topics:
     Secured Electronic Mail
     Public Key Certificates

Forensics Investigation (CYC-749)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Forensic Evidence And Crime Investigation
     Computer Forensics And Digital Detective Work
     Tools, Environments, Equipment, And Certifications
  In Section 2 of this course you will cover these topics:
     Policies And Procedures
     Data, Pda, And Cell Phone Forensics
     Operating Systems And Data Transmission Basics For Digital Investigations
  In Section 3 of this course you will cover these topics:
     Investigating Windows, Linux, And Graphics Files
     E-Mail And Webmail Forensics
     Internet And Network Forensics And Intrusion Detection
  In Section 4 of this course you will cover these topics:
     Tracking Down Those Who Intend To Do Harm On A Large Scale
     Fraud And Forensic Accounting Investigation
  In Section 5 of this course you will cover these topics:
     Federal Rules And Criminal Codes
     Ethical And Professional Responsibility In Testimony

Cyber Crime (CYC-772)

TOPICS COVERED IN THIS COURSE
  In Section 1 of this course you will cover these topics:
     Introduction To Cyber Crime And Security
     Networks And The Internet
     Assessing A Target System
  In Section 2 of this course you will cover these topics:
     Denial Of Service Attacks
     Malware
     Basics Of Assessing And Securing A System
  In Section 3 of this course you will cover these topics:
     Encryption
     Internet Fraud And Cyber Crime
  In Section 4 of this course you will cover these topics:
     Industrial Espionage
     Cyber Terrorism And Information Warfare
  In Section 5 of this course you will cover these topics:
     Cyber Detective
     Security Hardware And Software