Computer and Mathematical
Conduct investigations on computer-based crimes establishing documentary or physical evidence, such as digital media and logs associated with cyber intrusion incidents. Analyze digital evidence and investigate computer security incidents to derive information in support of system and network vulnerability mitigation. Preserve and present computer-related evidence in support of criminal, fraud, counterintelligence, or law enforcement investigations.
by University of South Africa
by Vaal University of Technology
by The Independent Institute of Education (Pty) Ltd
by The Independent Institute of Education (Pty) Ltd
by MANCOSA Pty (Ltd)
by Red and Yellow Creative School of Business (Pty) Ltd (previously known as The Red & Yellow School of Logic & Magic)
by University of Witwatersrand
by City Varsity (Pty) Ltd
by University of Johannesburg
by University of KwaZulu-Natal
This page includes information from the O*NET 28.3 Database by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 license. Builtneat Pty Ltd trading as Study Start, has modified all or some of this information. USDOL/ETA has not approved, endorsed, or tested these modifications.