Our Eligibility Criteria

Explore DUNC’s Eligibility Criteria for Students Worldwide

Eligibility Criteria

High School Diploma, GED Or Equiv. International Education

Credit Hours

36 Hours

Course Duration

6 Months (Self-Paced) Program

Courses Offered

6

Courses Offered In UNDERGRADUATE DIPLOMA

  • Courses Name

  • Courses Description

  • Credit Hours

  • Data Recovery Techniques

  • Data recovery techniques can prove to be very useful skills in investigating a cyber criminal activity. This course will cover advanced data recovery methods and techniques. Various hardware and software issues will also be discussed in this course.

  • 6 Credits

  • Network Defense

  • This course will empower you to understand the basics of network defense and introduce them to the fundamental tools and techniques used in this regard. The course will cover how to develop a secure baseline and 'harden' your enterprise architectures from the most advanced attacks.

  • 6 Credits

  • Computer Crime Investigation

  • This course introduces the fundamental principles of computer crime investigation processes. Topics include crime scene/incident processing, information gathering techniques, data retrieval, collection and preservation of evidence, preparation of reports and court presentations.

  • 6 Credits

  • Technology Crimes & Law

  • This course covers the applicable technological laws dealing with the regulation of cyber security and criminal activity. Topics of this course include an examination of Legacy Systems Integration, Electronic Commerce Tools, Copyright Law Basics and Copyright Infringement.

  • 6 Credits

  • Ethics & High Technology

  • This course explores the ethical dilemmas that exist where human beings, information objects, and technology interact. The course introduces you to a variety of ethical models from historical perspectives and then explores the relevance of these models to a variety of new and emerging technologies.

  • 6 Credits

  • Introduction to Cyber Crime

  • This course introduces and explains the various types of offenses that qualify as cyber crime activity. Emphasis is placed on identifying cyber crime activity and the response to these problems from both the private and public domains.

  • 6 Credits