CERTIFICATE IN CYBERSECURITY AND DIGITAL FORENSICS -CCDF
$3,000.00 $1,249.00
Duration: 20 days
This course will equip you with the skills needed to become an expert in this rapidly growing domain. You will learn comprehensive approaches to protecting your infrastructure, including securing data and information, running risk analysis and mitigation, architecting cloud-based security, achieving compliance and much more with this best-in-class program.
Module 1: Cyber-crime and Forensics Awareness
- Upon successful completion of this module, you will have a systematic understanding of knowledge, and critical awareness of current cyber security challenges and how they are exploited through cybercrime. This includes gaining practical knowledge of how to perform and critical evaluate a crime scene from a digital perspective.
- This module also enables a conceptual understanding that enables the learner to critically evaluate and engage in scholarship in the discipline, including proposing and testing both research and investigative hypotheses.
- The module covers many different aspects of cybercrime and how they are fundamentally possible, often through exploiting weaknesses in computer and network security.
- The module presents an introduction to forensic analysis of digital systems, which focuses on recovering deleted data from persistent data storage mechanisms (e.g. hard drives).
Module 2: Emerging Technologies for Cyber Physical Systems
- Cyber-Physical Systems (CPS) are collections of physical and software components that communicate and interact with users via networks.
- CPS extend the traditional capabilities of embedded systems by incorporating sensor networks and data services to enable previously disparate systems to become more integrated through ‘smart’ capabilities. Examples of CPS include the Internet of Things (IoT), smart cities and digital manufacturing.
- This module will enable learners to explore contemporary issues in relation to emerging technologies that can be used to realise cyber-physical systems.
Module 3: Digital Forensics
- Digital Forensics (DF) is the process of identifying, acquiring, analysing and reporting on digital evidence (DE) used in a wide range of investigations.
- Digital Forensic Investigations (DFIs) have a variety of applications, being used in civil, administrative, and criminal proceedings in pursuit of DE.
- A typical DFI would involve the investigation of crimes such as hacking and possession of illegal imagery, etc. The aim of this module is to provide the learner with the knowledge and critical understanding of the key concepts in Digital Forensics.
- Through this module, the learner will be taught how to identify, preserve, extract and analyse digital evidence in a forensically-sound manner and report on the findings. Furthermore, this module will equip the learner with practical skills in applying specialised forensic tools, such as FTK Imager and Autopsy, and techniques, such as data carving and file system analysis, to a specific application scenario.
Module 4: Applications of Artificial Intelligence in Cyber Security
- Artificial intelligence (AI) is the study and development of intelligent behaviour exhibited in computational form. Its purpose is to demonstrate intelligent characteristics that provide enriched system functionality beyond that of traditional software systems.
- The benefits of AI spread across many application areas, and one such area is that of cyber security.
- Artificial intelligence can be loosely categorised into symbolic and statistical approaches, which are often used depending on application requirements.
- In this module, the learner will study the different types of AI systems and focus on their different application use cases in cyber security.
Module 5: Security Architecture
- Security architecture is a unified security design that addresses the necessities and potential risks involved in a certain scenario or environment.
- It also specifies when and where to apply security controls.
- The design process is generally reproducible.
In security architecture, the design principles are reported clearly, and in-depth security control specifications are generally documented in independent documents. - System architecture can be considered a design that includes a structure and addresses the connection between the components of that structure.
Module 6: Incident Response
- Incident response (IR) is the steps used to prepare for, detect, contain, and recover from a data breach. An incident response plan is a document that outlines an organization’s procedures, steps, and responsibilities of its incident response program.
- Incident response planning often includes the following details:
- how incident response supports the organization’s broader mission
- the organization’s approach to incident response
- activities required in each phase of incident response
- roles and responsibilities for completing IR activities
- communication pathways between the incident response team and the rest of the organization
- metrics to capture the effectiveness of its IR capabilities
Module 7: Final Projects
- Students should submit a portfolio of their findings and understanding of attack types and incident report.
- They will also provide evidence of understanding on how to prevent and detect a cybercrime and a digital forensic.
Sample Certificate
Responsible | Mohammad Fadi Qaddo |
---|---|
Last Update | 08/08/2024 |
Members | 1 |