{"id":7489,"date":"2021-08-26T21:22:01","date_gmt":"2021-08-26T21:22:01","guid":{"rendered":"https:\/\/aju.ac.zw\/newaju2021\/?page_id=7489"},"modified":"2021-09-14T08:47:49","modified_gmt":"2021-09-14T08:47:49","slug":"executive-certificate-in-cyber-security-and-forensics","status":"publish","type":"page","link":"https:\/\/aju.ac.zw\/newaju2021\/executive-certificate-in-cyber-security-and-forensics\/","title":{"rendered":"EXECUTIVE CERTIFICATE IN CYBER SECURITY AND FORENSICS"},"content":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1630704660538{margin-bottom: 100px !important;background-image: url(https:\/\/aju.ac.zw\/newaju2021\/wp-content\/uploads\/2016\/01\/services.png?id=7347) !important;background-position: 0 0 !important;background-repeat: no-repeat !important;}&#8221;][vc_column offset=&#8221;vc_col-lg-9 vc_col-md-9&#8243;][vc_column_text css=&#8221;.vc_custom_1631528295021{margin-top: 45px !important;}&#8221;]<\/p>\n<div class=\"elementor-element elementor-element-990ac10 elementor-widget elementor-widget-text-editor\" data-id=\"990ac10\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-text-editor elementor-clearfix\">\n<h4><span style=\"color: #000000;\">Course description<\/span><\/h4>\n<p><span style=\"color: #000000;\">A practical oriented hands on course that provides the methodology and procedures associated with cyber security and forensic analysis.\u00a0 Students will develop a comprehensive understanding of the fundamentals associated with the software, networking, hardware devices, protocols, and applications required to conduct forensic analysis in a web and digital environment.\u00a0\u00a0 Contents cover cyber and computer crime, Computer Forensics, Forensic Tools and Processing of Electronic Evidence, Cyber Tools and Tracking as well analysis registry. This course will incorporate demonstrations and laboratory exercises to reinforce practical applications of course instruction and will require hands on practice. The course dwells on two sections namely the cyber security and the computer forensic. The course uses a more general hands on approach were focus on the practical applications are supported by the theory.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][vc_tta_accordion style=&#8221;modern&#8221; active_section=&#8221;0&#8243;][vc_tta_section title=&#8221;ENTRY REQUIREMENTS&#8221; tab_id=&#8221;1631527583128-bf45198e-7574&#8243;][vc_column_text]<span style=\"color: #000000;\">Students, IT professionals, Security personnel who want to venture into the computer forensic and cyber security.<\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>Entry Requirements:<\/strong>\u00a0Knowledge of Information Technology fundamentals (computer hardware, operating systems, applications, and networking) is needed. One can be exempted if he\/she has some experiences in the IT areas.<\/span>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;COURSE OBJECTIVE&#8221; tab_id=&#8221;1631527583170-42aefcd3-2e4f&#8221;][vc_column_text]<\/p>\n<ul>\n<li><span style=\"color: #000000;\">To correctly identify appropriate instances for the application of computer forensics<\/span><\/li>\n<li><span style=\"color: #000000;\">Correctly collect and analyze computer forensic evidence<\/span><\/li>\n<li><span style=\"color: #000000;\">Identify the essential and up-to-date concepts, algorithms, protocols, tools, and methodology of Computer Forensics<\/span><\/li>\n<li><span style=\"color: #000000;\">Understand the threats in web, mobile, networks and security concepts.<\/span><\/li>\n<li><span style=\"color: #000000;\">Apply authentication applications in different networks.<\/span><\/li>\n<li><span style=\"color: #000000;\">Understand security services for email as well as mobile devices and their applications.<\/span><\/li>\n<li><span style=\"color: #000000;\">Awareness of firewall and it applications.<\/span><\/li>\n<li><span style=\"color: #000000;\">How to use typical forensic investigation tools<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;COURSE CONTENT&#8221; tab_id=&#8221;1631527769444-98fc6934-11c7&#8243;][vc_column_text]<span style=\"color: #000000;\">The courses covers four main modules which are:-<\/span><\/p>\n<p><span style=\"color: #000000;\">Module I:\u00a0\u00a0\u00a0\u00a0 Computer foundations<\/span><\/p>\n<p><span style=\"color: #000000;\">Module II:\u00a0\u00a0 Cyber-crime and Computer crime<\/span><\/p>\n<p><span style=\"color: #000000;\">Module III:\u00a0 Computer forensics<\/span><\/p>\n<p><span style=\"color: #000000;\">Module IV:\u00a0 Forensic Tools and Processing of Electronic Evidence<\/span><\/p>\n<p><span style=\"color: #000000;\">Module V: \u00a0 Cyber Tools and Tracking<\/span><\/p>\n<p><span style=\"color: #000000;\">Module VI: Analysis and Registry<\/span><\/p>\n<p><span style=\"color: #000000;\">The course to be covered over six months. Upon completing the course, students can be engaged in IT security organization were they can apply the taught course in various forums such as security, investigations, forensics, criminology, etc.<\/span>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;COURSE FEES&#8221; tab_id=&#8221;1631527807633-133d2a68-d5f1&#8243;][vc_column_text]<span style=\"color: #000000;\">Tuition:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 USD 200<\/span><\/p>\n<p><span style=\"color: #000000;\">Application fee:\u00a0\u00a0 USD 20<\/span><\/p>\n<p><span style=\"color: #000000;\">Enrollment fee:\u00a0\u00a0\u00a0 USD 20<\/span>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][vc_btn title=&#8221;Register for program&#8221; color=&#8221;success&#8221; align=&#8221;center&#8221; i_icon_fontawesome=&#8221;stm-lnr-check&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:https%3A%2F%2Ftest2.trikotecdev.xyz%2Fwp%2Fapplications%2F|title:apply%20online&#8221;][\/vc_column][vc_column width=&#8221;1\/4&#8243; offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][vc_empty_space height=&#8221;62px&#8221;][stm_portfolio_information posts_per_row=&#8221;1&#8243; facebook=&#8221;https:\/\/www.facebook.com\/arrupejesuituniversity&#8221; twitter=&#8221;https:\/\/twitter.com\/aju2018?s=11&#8243; instagram=&#8221;https:\/\/instagram.com\/arrupejesuituniversity?utm_medium=copy_link&#8221;][vc_raw_html]JTVCdmlkZW8lMjBpZCUzRDc5MDklNUQ=[\/vc_raw_html][stm_sidebar sidebar=&#8221;311&#8243;][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1630704660538{margin-bottom: 100px !important;background-image: url(https:\/\/aju.ac.zw\/newaju2021\/wp-content\/uploads\/2016\/01\/services.png?id=7347) !important;background-position: 0 0 !important;background-repeat: no-repeat !important;}&#8221;][vc_column offset=&#8221;vc_col-lg-9 vc_col-md-9&#8243;][vc_column_text css=&#8221;.vc_custom_1631528295021{margin-top: 45px !important;}&#8221;] Course description A practical oriented hands on course that provides the methodology and procedures associated with cyber security and forensic analysis.\u00a0 Students will develop a comprehensive understanding of the fundamentals associated with the software, networking, hardware devices, protocols, and<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-7489","page","type-page","status-publish","hentry"],"featured_image_urls":{"full":"","thumbnail":"","medium":"","medium_large":"","large":"","1536x1536":"","2048x2048":"","consulting-image-350x204-croped":"","consulting-image-350x250-croped":"","consulting-image-1110x550-croped":"","consulting-image-50x50-croped":"","consulting-image-320x320-croped":"","consulting-image-255x182-croped":"","consulting-image-350x195-croped":"","consulting-image-900x640-croped":"","consulting-image-900w":"","consulting-image-358x250-cropped":""},"post_excerpt_stackable":"<p>[vc_row css=&#8221;.vc_custom_1630704660538{margin-bottom: 100px !important;background-image: url(https:\/\/aju.ac.zw\/newaju2021\/wp-content\/uploads\/2016\/01\/services.png?id=7347) !important;background-position: 0 0 !important;background-repeat: no-repeat !important;}&#8221;][vc_column offset=&#8221;vc_col-lg-9 vc_col-md-9&#8243;][vc_column_text css=&#8221;.vc_custom_1631528295021{margin-top: 45px !important;}&#8221;] Course description A practical oriented hands on course that provides the methodology and procedures associated with cyber security and forensic analysis.\u00a0 Students will develop a comprehensive understanding of the fundamentals associated with the software, networking, hardware devices, protocols, and applications required to conduct forensic analysis in a web and digital environment.\u00a0\u00a0 Contents cover cyber and computer crime, Computer Forensics, Forensic Tools and Processing of Electronic Evidence, Cyber Tools and Tracking as well analysis registry. This course will incorporate demonstrations and laboratory exercises to reinforce&hellip;<\/p>\n","category_list":"","author_info":{"name":"admin","url":"https:\/\/aju.ac.zw\/newaju2021\/author\/admin\/"},"comments_num":"0 comments","_links":{"self":[{"href":"https:\/\/aju.ac.zw\/newaju2021\/wp-json\/wp\/v2\/pages\/7489","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aju.ac.zw\/newaju2021\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/aju.ac.zw\/newaju2021\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/aju.ac.zw\/newaju2021\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aju.ac.zw\/newaju2021\/wp-json\/wp\/v2\/comments?post=7489"}],"version-history":[{"count":13,"href":"https:\/\/aju.ac.zw\/newaju2021\/wp-json\/wp\/v2\/pages\/7489\/revisions"}],"predecessor-version":[{"id":8019,"href":"https:\/\/aju.ac.zw\/newaju2021\/wp-json\/wp\/v2\/pages\/7489\/revisions\/8019"}],"wp:attachment":[{"href":"https:\/\/aju.ac.zw\/newaju2021\/wp-json\/wp\/v2\/media?parent=7489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}