Explore jobs
Find specific jobs
Explore careers
Explore professions
Best companies
Explore companies
| Rank | Major | Percentages |
|---|---|---|
| 1 | Criminal Justice | 50.8% |
| 2 | Psychology | 6.3% |
| 3 | Business | 6.3% |
| 4 | Law Enforcement | 6.3% |
| 5 | Law | 3.2% |
1. Threat Investigation
If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will help you understand how threat-centric SOC must prepare for analyzing new and emerging threats by implementing robust security investigation procedures • By the end of the course, you will be able to: • Understand cyber-threat hunting concepts • Describe the five hunting maturity levels (HM0–HM4) • Describe the hunting cycle four-stage loop• Describe the use of the Common...
2. International Law in Action: A Guide to the International Courts and Tribunals in The Hague
International Law in Action explains the functions of each international court and tribunal present in The Hague, and it looks at how these institutions address contemporary problems. On the basis of selected cases, and through interviews with judges and lawyers, you will explore the role of these courts and tribunals and their potential to contribute to global justice. The first module of the course will investigate how judicial settlement is different from other more political forms of...
3. IFCI Expert Cybercrime Investigator's Course
Protect your network - Put cybercriminals in jail. Learn computer forensics, malware analysis and hacker investigations...
4. Investigative Journalism
How to find hidden sources. How to look for documents and people...
5. International Law In Action: Investigating and Prosecuting International Crimes
‘Investigating and Prosecuting International Crimes’ is the second course in Leiden University’s new series on International Law in Action. The first course covered international courts and tribunals in The Hague in general. This second course provides an insider perspective into the work of international criminal courts and tribunals. You will learn about the investigation and prosecution of international crimes in The Hague. Atrocities produce unspeakable forms of violence. We will explore...
6. Threat Analysis
If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will help you understand Incident Analysis in a Threat-Centric SOC. By the end of the course, you will be able to: •Use the classic kill chain model to perform network security incident analysis • Describe the reconnaissance phase of the classic kill chain model • Describe the weaponization phase of the classic kill chain model • Describe the delivery phase of the classic kill chain...
7. Cyber Security: Info Security, Combat Cyber Threats, ChatGPT
Cyber Threats, Attacks, Viruses, Chat GPT & Cyber, Cyber Crimes, Firewalls, Cyber Security Concepts, Digital Forensics...
8. AWS Security and Governance Administration for Professionals
In-Depth AWS Security Administration and Governance: Learn hands-on with certified industry professionals...
9. Introduction to International Criminal Law
-- About the Course -- From the Nuremberg trial to the case against Saddam Hussein, from the prosecution of Al-Qaeda terrorists to the trial of Somali pirates – no area of law is as important to world peace and security as international criminal law. Taught by one of the world’s leading experts in the field, this course will educate students about the fundamentals of international criminal law and policy. We will explore the contours of international crimes such as genocide, war crimes,...
10. Homeland Security and Cybersecurity
Homeland security is about safeguarding the United States from domestic catastrophic destruction. Cybersecurity has emerged as a priority homeland security concern because a coordinated cyber attack against critical infrastructure could result in the worst catastrophe in the nation’s history. This specialization examines the cybersecurity problem, and takes a close look at what is being done to safeguard the United States from domestic catastrophic destruction by cyber attack. At the conclusion...
11. Criminal Law in 120 Minutes: A Fast Track Course
A 2 hour fast track summary of Criminal Law, targeting all common law LL.B examinations!...
12. Information Security Fundamentals - Cyber Security Bootcamp
A Beginners Awareness Guide on Information Security & Cyber Security to Keep Online and Offline Devices Safe!...
13. Network Security Support Fundamentals
Explore network security with the Network Security Support Fundamentals online course. Designed to offer a comprehensive understanding of network security, this course is crucial in today's digital world. By the end of this course, you will be able to describe the role of enterprise networks, explain enterprise network security basics, and understand network security operations. Perfect for beginners aiming for a cybersecurity career or professionals looking to enhance their skill set, this...
14. ERPO: A Civil Approach to Gun Violence Prevention Teach-Out
Evidence shows that 1 life is saved for every 10-20 Extreme Risk Protection Orders (ERPOs) issued. ERPOs are legally issued civil orders that allow people on the front lines to ask a court to prevent a person at imminent risk of harm to themselves or others from purchasing or possessing firearms during a critical period of risk. As of October 2020, ERPO laws have been enacted by nineteen states and the District of Columbia and while some aspects differ by state, the general process for applying...
15. Conduct a Strategy Analysis using Business Analysis
Use business analysis techniques to create and recommend the best strategies and solutions! - ECBA/CCBA/CBAP endorsed...
16. Security Guard Training Course
Security Officer Training In Today's Job Market...
17. Check Point Jump Start: Cloud Security
Check Point CloudGuard, a comprehensive cloud security portfolio, is designed to prevent the latest fifth generation (Gen V), multi-vector cyberattacks targeting enterprise cloud services Section 1: Overview of CloudGuard Product line In this course you will learn about cloud security challenges and what different Check Point CloudGuard product line can be used to protect your cloud environment. How to Secure your Cloud Environment Cloud Challenges Security in the Cloud What is CloudGuard...
18. Digital Forensics Masterclass: Forensic Science 2023 DFMC+
Learn digital forensics and be computer forensics investigator / Certificate after completing course / DFMC+ / DFIR 2023...
19. Forensic accounting, fraud investigation and fraud analytics
The 14 hour course(50casestudies) helps to understand fraud examination, forensic audit,financial crime, data analytics...
20. Certified Information Systems Security Officer (CISSO)
Certified Information Systems Security Officer (CISSO) Certification Exam Prep Course...
| Deputy united states marshal education level | Deputy united states marshal salary |
|---|---|
| Master's Degree | $46,724 |
| High School Diploma or Less | $37,571 |
| Bachelor's Degree | $45,284 |
| Some College/ Associate Degree | $39,863 |