• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Computer Forensics

    Computer Forensics Courses Online

    Learn computer forensics techniques for investigating digital crimes. Understand how to collect, analyze, and preserve digital evidence.

    Skip to search results

    Filter by

    Subject
    Required
     *

    Language
    Required
     *

    The language used throughout the course, in both instruction and assessments.

    Learning Product
    Required
     *

    Build job-relevant skills in under 2 hours with hands-on tutorials.
    Learn from top instructors with graded assignments, videos, and discussion forums.
    Learn a new tool or skill in an interactive, hands-on environment.
    Get in-depth knowledge of a subject by completing a series of courses and projects.
    Earn career credentials from industry leaders that demonstrate your expertise.
    Earn career credentials while taking courses that count towards your Master’s degree.
    Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.
    Earn a university-issued career credential in a flexible, interactive format.

    Level
    Required
     *

    Duration
    Required
     *

    Skills
    Required
     *

    Subtitles
    Required
     *

    Educator
    Required
     *

    Explore the Computer Forensics Course Catalog

    • Status: Free Trial
      Free Trial
      U

      University of Colorado System

      Fundamentals of Computer Network Security

      Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques

      4
      Rating, 4 out of 5 stars
      ·
      585 reviews

      Intermediate · Specialization · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      U

      University of London

      Cyber Security – Technology and Governance

      Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Computer Networking, Cybersecurity, Cyber Security Strategy, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks

      4.7
      Rating, 4.7 out of 5 stars
      ·
      107 reviews

      Beginner · Specialization · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      I

      Infosec

      Windows Registry Forensics

      Skills you'll gain: Microsoft Windows, Data Analysis Software, User Accounts, USB, File Systems, System Configuration, Software Installation, Computer Security Incident Management, File Management, Data Access, Encryption

      4.7
      Rating, 4.7 out of 5 stars
      ·
      63 reviews

      Intermediate · Course · 1 - 3 Months

    • P

      Packt

      Digital Forensics for Pentesters - Hands-On Learning

      Skills you'll gain: Penetration Testing, Vulnerability Assessments, Network Security, Network Analysis, Cyber Security Assessment, Virtual Machines, Virtualization and Virtual Machines, Open Source Technology, Malware Protection, Linux, Microsoft Windows

      4.5
      Rating, 4.5 out of 5 stars
      ·
      12 reviews

      Intermediate · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      K

      Kennesaw State University

      Cybersecurity: Developing a Program for Your Business

      Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Cyber Security Policies, Cyber Security Strategy, Cyber Governance, Threat Detection, Human Factors (Security), Business Risk Management, Cybersecurity, Security Awareness, Enterprise Risk Management (ERM), Information Management, Computer Security Awareness Training, Mobile Security, Business Ethics, Performance Measurement, Cyber Risk

      4.5
      Rating, 4.5 out of 5 stars
      ·
      2.7K reviews

      Beginner · Specialization · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      M

      Microsoft

      Essential Aspects of Software, Hardware, and Data Backup

      Skills you'll gain: Cybersecurity, Application Security, Information Systems Security, Software Installation, System Configuration, Data Management, Computer Hardware, Data Security, Data Storage, Microsoft Windows, Firewall, Disaster Recovery, Encryption, Identity and Access Management

      4.7
      Rating, 4.7 out of 5 stars
      ·
      145 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      I

      Infosec

      Windows OS Forensics

      Skills you'll gain: File Systems, Microsoft Windows, File Management, Operating Systems, Data Structures, Data Validation, System Software, Data Integrity, Data Storage

      4.7
      Rating, 4.7 out of 5 stars
      ·
      77 reviews

      Intermediate · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      C

      Cisco Learning and Certifications

      Threat Analysis

      Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Threat Detection, Threat Management, Exploit development, Computer Security Incident Management, Network Analysis, Cybersecurity, Network Security, Network Monitoring, SQL

      4.9
      Rating, 4.9 out of 5 stars
      ·
      34 reviews

      Mixed · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      U

      University of Illinois Urbana-Champaign

      Accelerated Computer Science Fundamentals

      Skills you'll gain: C++ (Programming Language), Data Structures, Object Oriented Programming (OOP), Object Oriented Design, Graph Theory, Development Environment, Data Storage, Engineering Software, Unstructured Data, Computer Programming, Algorithms, Data Storage Technologies, Debugging, Program Development, Database Systems, Database Theory, Network Routing, Theoretical Computer Science

      4.7
      Rating, 4.7 out of 5 stars
      ·
      3.5K reviews

      Intermediate · Specialization · 1 - 3 Months

    • Status: New
      New
      P

      Packt

      TOTAL - CompTIA CySA+ Cybersecurity Analyst (CS0-003)

      Skills you'll gain: Cyber Threat Intelligence, Vulnerability Assessments, Incident Response, Vulnerability Scanning, Cybersecurity, Threat Modeling, Threat Detection, Application Security, Security Management, Intrusion Detection and Prevention, Security Engineering, Security Controls, Malware Protection, Network Analysis

      Intermediate · Course · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      U

      University of Colorado System

      Introduction to Applied Cryptography

      Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science

      4.6
      Rating, 4.6 out of 5 stars
      ·
      998 reviews

      Beginner · Specialization · 3 - 6 Months

    • Status: Free
      Free
      P

      Princeton University

      Computer Architecture

      Skills you'll gain: Microarchitecture, Computer Architecture, Hardware Architecture, Computer Systems, Computer Engineering, Systems Architecture, Operating Systems, Performance Tuning, Scalability

      4.7
      Rating, 4.7 out of 5 stars
      ·
      3.7K reviews

      Advanced · Course · 3 - 6 Months

    Computer Forensics learners also search

    Digital Forensics
    Computer Security
    Information Security
    Information Science
    Privacy
    Information Engineering
    Data Security
    Software Security
    1…456…530

    In summary, here are 10 of our most popular computer forensics courses

    • Fundamentals of Computer Network Security: University of Colorado System
    • Cyber Security – Technology and Governance: University of London
    • Windows Registry Forensics: Infosec
    • Digital Forensics for Pentesters - Hands-On Learning: Packt
    • Cybersecurity: Developing a Program for Your Business: Kennesaw State University
    • Essential Aspects of Software, Hardware, and Data Backup: Microsoft
    • Windows OS Forensics: Infosec
    • Threat Analysis: Cisco Learning and Certifications
    • Accelerated Computer Science Fundamentals: University of Illinois Urbana-Champaign
    • TOTAL - CompTIA CySA+ Cybersecurity Analyst (CS0-003): Packt

    Other topics to explore

    Arts and Humanities
    338 courses
    Business
    1095 courses
    Computer Science
    668 courses
    Data Science
    425 courses
    Information Technology
    145 courses
    Health
    471 courses
    Math and Logic
    70 courses
    Personal Development
    137 courses
    Physical Science and Engineering
    413 courses
    Social Sciences
    401 courses
    Language Learning
    150 courses

    Coursera Footer

    Skills

    • Artificial Intelligence (AI)
    • Cybersecurity
    • Data Analytics
    • Digital Marketing
    • English Speaking
    • Generative AI (GenAI)
    • Microsoft Excel
    • Microsoft Power BI
    • Project Management
    • Python

    Certificates & Programs

    • Google Cybersecurity Certificate
    • Google Data Analytics Certificate
    • Google IT Support Certificate
    • Google Project Management Certificate
    • Google UX Design Certificate
    • IBM Data Analyst Certificate
    • IBM Data Science Certificate
    • Machine Learning Certificate
    • Microsoft Power BI Data Analyst Certificate
    • UI / UX Design Certificate

    Industries & Careers

    • Business
    • Computer Science
    • Data Science
    • Education & Teaching
    • Engineering
    • Finance
    • Healthcare
    • Human Resources (HR)
    • Information Technology (IT)
    • Marketing

    Career Resources

    • Career Aptitude Test
    • Examples of Strengths and Weaknesses for Job Interviews
    • High-Income Skills to Learn
    • How Does Cryptocurrency Work?
    • How to Highlight Duplicates in Google Sheets
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Preparing for the PMP Certification
    • Signs You Will Get the Job After an Interview
    • What Is Artificial Intelligence?

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • Share your Coursera learning story

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Manage Cookie Preferences
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok