Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Computer Forensics Course Catalog
- Status: Free Trial
Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Application Security, Vulnerability Assessments, Vulnerability Management, Event Monitoring, Security Controls, Data Integrity, System Monitoring, Patch Management, Server Side
- Status: Free Trial
Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Threat Detection, Threat Management, Exploit development, Computer Security Incident Management, Network Analysis, Cybersecurity, Network Security, Network Monitoring, SQL
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Endpoint Detection and Response, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Anomaly Detection, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Network Analysis
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Wireless Networks, Mobile Security, General Networking, Proxy Servers, Network Security, Cybersecurity, Virtual Private Networks (VPN), Computer Security Awareness Training, Personally Identifiable Information, Information Privacy, Emerging Technologies
- Status: Free Trial
University of London
Skills you'll gain: Computer Science, Computer Systems, Web Applications, Computer Literacy, Network Security, Computer Networking, Computational Thinking, Debugging, Web Design and Development, Cybersecurity, Problem Management, Software Architecture, Data Storage
- Status: Free Trial
LearnQuest
Skills you'll gain: Visual Basic (Programming Language), Database Management, System Software, Databases, Relational Databases, Algorithms, Computer Architecture, Network Security, Computer Hardware, SQL, Computer Science, Computer Networking, Computer Programming, Network Protocols, Programming Principles, Software Development, Automation, Analysis, Cloud Computing, Debugging
- Status: Preview
Kennesaw State University
Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Business Continuity, Cryptography, Secure Coding, Systems Development Life Cycle, Security Controls, Law, Regulation, and Compliance, Infrastructure Security, Safety and Security, Identity and Access Management, Governance, Risk Management
- Status: Free
Coursera Project Network
Skills you'll gain: Threat Detection, Anomaly Detection, Network Security, General Networking, Network Monitoring, Network Troubleshooting, Real Time Data, Security Strategy, Network Analysis, Network Protocols, Data Capture
- Status: Preview
University of Lausanne
Skills you'll gain: Criminal Investigation and Forensics, Legal Proceedings, Laboratory Reports, Scientific Methods, Statistical Analysis, Report Writing, Probability & Statistics, Research, Technical Communication, Case Studies, Molecular Biology
- Status: Free Trial
Royal Holloway, University of London
Skills you'll gain: Human Factors (Security), Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Cyber Risk, Security Awareness, Social Sciences, Culture, Psychology, Survey Creation, Research
- Status: Preview
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
- Status: New
Skills you'll gain: Cyber Threat Intelligence, Vulnerability Assessments, Incident Response, Vulnerability Scanning, Cybersecurity, Threat Modeling, Threat Detection, Application Security, Security Management, Intrusion Detection and Prevention, Security Engineering, Security Controls, Malware Protection, Network Analysis
Computer Forensics learners also search
In summary, here are 10 of our most popular computer forensics courses
- OWASP Top 10 - Risks 6-10: Infosec
- Threat Analysis: Cisco Learning and Certifications
- Introduction to Intrusion Detection Systems (IDS): Johns Hopkins University
- Cybersecurity: Protecting your Information on the Go: Kennesaw State University
- How Computers Work: University of London
- Foundations of Computer Science: LearnQuest
- Cybersecurity and Its Ten Domains: Kennesaw State University
- Wireshark for Security: Detect Network Anomalies: Coursera Project Network
- Challenging Forensic Science: How Science Should Speak to Court: University of Lausanne
- Cybercrime: Royal Holloway, University of London