国际学生入学条件
Official transcripts must be submitted.
Option 1- midterm grades
If you are at least half way through the required Grade 11 or 12 course, apply by submitting your midterm grade* for the required course.
Option 2- final grades
If you have completed the required Grade 11 or 12 course, apply with your final grade for the required course.
English Studies 12 (67%) or
English First Peoples 12 (67%) or
3.0 credits of post-secondary English, humanities or social sciences (67%) from a recognized institution
Completion of one of the following options:
Option 1: A two-year diploma (minimum 60.0 credits), an associate's degree, or a bachelor's degree from a recognized post-secondary institution in a computing or IT field, such as Computer Information Technology (CIT), Computer Systems Technology (CST), Full-Stack Web Development (FSWD), Business Information Technology Management (BITMAN), Computer Information Systems Administration (CISA)*, or Industrial Network Cybersecurity (INCS)*.
Option 2: A minimum of 60.0 credits of courses fulfilling the requirements of the first two years of study towards the completion of a defined undergraduate degree from a recognized post-secondary institution in a computing or IT field.
Option 3: A minimum of 60.0 credits, including 18.0 second year or higher level credits, of courses from one or more recognized post-secondary institutions in a computing or IT field.
Option 4: Certification as a police constable and working within a Technological Crime Unit and completion of 30.0 credits from a recognized post-secondary institution in an appropriate computing or IT field.
IELTS - 6.5, TOEFL iBT - 86, Duolingo English Test - 115
展开 IDP—雅思考试联合主办方
雅思考试总分
6.5
了解更多
雅思考试指南
- 雅思总分:6.5
- 托福网考总分:86
- 托福笔试总分:160
- 其他语言考试:PTE Academic - 60
CRICOS代码:
申请截止日期: 请与IDP顾问联系以获取详细信息。
课程简介
计算机越来越多地用于犯罪活动。从欺诈到暴力犯罪
Computers are increasingly being used in criminal activity. From fraud to violent crime, computers are often found to play a significant role as a tool for planning and conducting a crime, and may contain relevant evidence pertaining to an offence. As indispensable tools in our everyday life, computers and mobile devices are key targets for criminals wishing to steal personal or corporate information, money, and more. There is therefore a growing need for specialists trained in the field of digital forensics and cybersecurity. Specialists in these fields rely on an essential combination of technical expertise, investigative skills, legal knowledge and communication skills.Training in computer forensics is extremely important in order to understand how to handle the delicate information in storage devices. Technical people may think they know how to extract data, however, they may inadvertently alter or delete important information. Computer forensics practitioners know how to handle information extraction, as well as how to identify information that is useful in a legal case and how to explain and present it in court.
展开