Forensic schools/courses

Forensics programs, certificates, diplomas and degrees (On campus, Online or On-site)
Total 145 training courses/programs at schools in New York, NY, USA



Touro College

Campus/Training Center: New York City
Phone No.: (212) 463-0400

MBA in Forensic Accounting (Master Degree)

Course Format: Public Course/Instructor-Led/Open Enrollment

The Master of Business Administration (MBA) degree with specialization in Forensic Accounting helps students develop core skills necessary to prevent, identify and detect fraud. This practitioner-oriented degree familiarizes students with the investigation, prevention and reporting practices basic to forensic accounting.


Berkeley College

Campuses/Training Centers: New York City, Manhattan, Brooklyn, White Plains, Woodland Park, Woodbridge, Newark, Paramus
Phone No.: 800-446-5400 ext. WWA

Forensic Accounting and Fraud Investigation

Course Format: Public Course/Instructor-Led/Open Enrollment

Covers basic forensic accounting principles, types of fraud, and methods to detect and investigate financial fraud in an organization. Provides students with a broad understanding of various types of fraud prevention and detection procedures.


New York University School of Continuing and Professional Studies

Campus/Training Center: New York City
Phone No.: (212) 998-7200

Forensic Accounting

Course Format: Public Course/Instructor-Led/Open Enrollment  V

Over the past two decades, attorneys, judges, and regulators have increasingly recognized the need for--and the benefit of--utilizing and applying accounting-related information, evidence, and standards to corporate investigations, litigation, and dispute resolution. This introductory course provides a survey of this exciting, growing specialty. Students gain a solid understanding of the interaction between the legal process and the forensic accountant’s investigation of potential matters and participation in the development of a case.


New Horizons New York City

Campus/Training Center: New York City
Phone No.: 646-695-5700

Computer Hacking Forensics Investigator (CHFI)

Course Format: Public Course/Instructor-Led/Open Enrollment  V

This course will provide participants the necessary skills to identify an intruders footprints and to properly gather the necessary evidence to prosecute in the court of law.

Objective :
Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a client’s systems, to tracing the originator of defamatory emails, to recovering signs of fraud.

At Course Completion:
Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a client’s systems, to tracing the originator of defamatory emails, to recovering signs of fraud.


Sun Microsystems, Inc.

Campuses/Training Centers: Atlanta, Boston, Los Angeles, Edison, Louisville, New York, Phoenix, San Diego, San Francisco, Tampa
Phone No.: (800) 422-8020

Computer Security Forensics and System Recovery

Course Format: Public Course/Instructor-Led/Open Enrollment  V

Module 1 - Computer Forensics Overview

Define the computer forensics process
Describe the elements of the computer forensics process

Module 2 - Security Policies and Procedures

Describe why security policies and procedures need to be developed
Define the characteristics of an incident response policy and how it relates to forensic examination
Define the characteristics of an incident response procedure and how it relates to forensic examination

Module 3 - Security Compromise Detection and Identification

Identify indicators of a possible system compromise
Describe intrusion response tasks and roles

Module 4 - Computer Crime Scene Investigation

Describe fundamental crime scene investigation procedures
List the forensic tools and commands used at a crime scene
Describe how evidence is collected and secured

Module 5 - System Recovery

Describe the steps for platform reinstallation
Descri... [Read More]


Brandeis University

Campus/Training Center: Online
Phone No.: (781) 736-2000

Information Technology Forensics and Investigations

Course Format: Online/Virtual Classroom/Webinar  V

This course covers both the principles and practice of digital forensics. It investigates the societal and legal impact of computer activity including computer crime, intellectual property, privacy issues, legal codes, risks, vulnerabilities, and countermeasures, forensic tools and techniques to uncover illegal or illicit activities left on disk and recovering files from intentionally damaged media, specific manifestations of cyber crime, including hacking, viruses, and other forms of malicious software, methods and standards for extraction, preservation, and deposition of legal evidence in a court of law. The course maps to the objectives of the International Association of Computer Investigative Specialists (IACIS) certification to provide credible, standards-based information.

At the end of the course, students will be able to:
Investigate digital forensics issues related to information technology.
Communicate the results of digital forensics investiga... [Read More]


Lewis University

Campus/Training Center: Online
Phone No.: (800) 897-9000

Malware Forensics

Course Format: Online/Virtual Classroom/Webinar

This course presents hands-on techniques for analyzing malware incidents in organizations. Students will use applications for identifying and preventing malware incidents, preserve data and control the propagation of malware on corporate networks.

Network Forensics

Course Format: Online/Virtual Classroom/Webinar  V

This course presents hands-on techniques for conducting analysis of Network Intrusions and Cybercrime in an organization. This course discusses log file analysis, gathering evidence from all networked devices, and router forensics. It also covers principles and practice related to examination of internal and external cyber attacks, cybercrimes, e-mail crimes and violations, corporate espionage, copyright and trademark violations.

Mobile Device Forensics

Course Format: Online/Virtual Classroom/Webinar  V

This course presents hands-on techniques for recovering evidence, data and corporate assets from mobile devices such as Iphones, windows mobile phones, Android phones, Ipads, Tablet PCs and Ipods. The course discusses forensics acquisition, analysis and reporting of evidence retrieved from mobile devices. Students will learn how to recover passwords, deleted voicemails, photos, and text messages, geotagged metadata from camera phones and data from various apps that run on mobile devices.

Computer Forensics

Course Format: Online/Virtual Classroom/Webinar  V

This course presents hands-on methods to conduct a Windows-based computer forensics investigation. Students will gain an in-depth understanding of the tools and techniques used by computer forensics experts such as analysis of file structures, evidence imaging, data recovery, e-mail investigations, graphics investigations, registry analysis, password recovery and decryption of encrypted data.


IIT School of Applied Technology

Campus/Training Center: Online
Phone No.: 708.563.1576, 312.567.5290, 630.682.6000

Cyber Forensics

Course Format: Online/Virtual Classroom/Webinar  V

This course will address methods to properly conduct a computer and/or network forensics investigation including digital evidence collection and evaluation and legal issues involved in network forensics. Technical issues in acquiring court-admissible chans-of evidence using various forensic tools that reconstruct criminally liable actions at the physical and logical levels are also addressed. Technical topics covered include detailed analysis of hard disks, files systems (including FAT, NTFS and EXT) and removable storage media, mechanisms for hiding and detecting hidden information, and the hands-on use of powerful forensic analysis tools.

Upon completion of this course, participants should be able to perform cyber forensic analysis.



Course Outline:

Introduction to network and computer forensics

Forensic tools and tool systems

Data acquisition and image creation

EnCase and AccessData forensic too... [Read More]

Mobile Device Forensics

Course Format: Online/Virtual Classroom/Webinar  V

This course will address methods for recovering digital data or evidence and conducting forensic analysis of mobile devices such as smart phones and tablets. Various devices will be compared including iPhone, Android, and Blackberry. A brief review of Linux and related forensic tools. ANAND technology and mobile file systems will be discussed. Students will learn how to unlock and root mobile devices and recover data from actual mobile devices.

Expected Outcomes:

•Produce a forensic report that includes the steps in the collection, handling, and preservation of digital evidence from mobile devices.
•Construct a forensic acquisition plan for mobile devices that will account for various scenarios and the limitations of cell phone technology.
•Validate data obtained from the forensic acquisition of mobile devices with current tools.
•Analyze data retrieved from mobile devices with current tools.
•Assess the differences between cellular ... [Read More]

Cyber Forensics and Security (Master Degree)

Course Format: Online/Virtual Classroom/Webinar  V

Master of Cyber Forensics and Security - This unique and highly sought after degree program combines technology, management and legal issues of cyber forensics and security. Legal courses are offered by IIT Chicago-Kent College of Law.

Creation and management of cyber security, computer forensics, security and protection of computers, networks, and information

Master of Cyber Forensics and Security

Core Courses (15 hours)

Required Courses
ITMS 538 Cyber Forensics
ITMS 543 Vulnerability Analysis and Control
ITMS 548 Cyber Security Technologies
ITMS 578 Cyber Security Management
LAW 273 Evidence

Elective Courses (15 hours)

Select at least twelve hours from the following:
ITMS 518 Coding Security
ITMS 528 Database Security
ITMS 539 Steganography
ITMS 549 Cyber Security Technologies: Projects and Advanced Methods
ITMS 555 Mobile Device Forensics
ITMS... [Read More]

Pages: 1 2 3 4 5 6 7 ...



- Course Subjects -
Ask for Training
Add Courses