Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "criminal investigation and forensics"
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Unix, Computer Security, Vulnerability Assessments, Unix Commands, System Programming, Shell Script, Linux, Debugging, Computer Architecture
- Status: New
Macquarie University
Skills you'll gain: Mobile Security, Investigation, Mobile Development, Apple iOS, Criminal Investigation and Forensics, Android (Operating System), Application Security, Legal Proceedings, Cybersecurity, File Systems, Malware Protection, Computer Security, Secure Coding, Computer Security Incident Management, Cloud Security, Security Strategy, Analysis, Encryption, Debugging, Disaster Recovery
- Status: Preview
Kennesaw State University
Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Business Continuity, Cryptography, Secure Coding, Systems Development Life Cycle, Security Controls, Law, Regulation, and Compliance, Infrastructure Security, Safety and Security, Identity and Access Management, Governance, Risk Management
Skills you'll gain: Anomaly Detection, Google Cloud Platform, Application Deployment, Image Analysis, Cloud Computing, Computer Vision, Predictive Modeling
- Status: Free Trial
Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Cyber Threat Intelligence, Threat Detection, Security Strategy, Threat Management, Cybersecurity, Continuous Monitoring, Security Information and Event Management (SIEM), Network Security, Technical Communication
- Status: Free Trial
Skills you'll gain: Cryptography, Cybersecurity, Network Security, Threat Modeling, Encryption, Identity and Access Management, Information Systems Security, Threat Detection, Firewall, Infrastructure Security, Security Controls, Security Strategy, Authorization (Computing), Authentications, Security Awareness, Risk Management Framework
- Status: Free Trial
Skills you'll gain: Risk Management Framework, Incident Response, Cyber Security Policies, Secure Coding, Cybersecurity, Computer Security Incident Management, Cyber Security Assessment, Threat Modeling, Application Security, ISO/IEC 27001, Cyber Governance, Data Security, Malware Protection, Penetration Testing, Security Controls, Threat Detection
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Personally Identifiable Information, Cyber Risk, Threat Detection, Information Privacy, Safety and Security, Multi-Factor Authentication
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Threat Detection, Network Analysis, Cybersecurity, System Design and Implementation, Network Security, Machine Learning Software, Machine Learning Methods, Performance Testing, Machine Learning Algorithms, Machine Learning, Supervised Learning, Microsoft Windows
- Status: Free Trial
Infosec
Skills you'll gain: File Systems, Microsoft Windows, File Management, Operating Systems, Data Structures, Data Validation, System Software, Data Integrity, Data Storage
- Status: Free Trial
Skills you'll gain: Incident Response, Computer Security Incident Management, Open Web Application Security Project (OWASP), Cyber Threat Intelligence, Application Security, Secure Coding, Cloud Security, Cybersecurity, Vulnerability Assessments, Information Systems Security, Metasploit, Security Strategy, Intrusion Detection and Prevention, Infrastructure Security, Vulnerability Scanning, Security Testing, Hardening, Penetration Testing, Mobile Security, Automation
In summary, here are 10 of our most popular criminal investigation and forensics courses
- Security & Ethical Hacking: Attacking the Network: University of Colorado Boulder
- Security & Ethical Hacking: Attacking Unix and Windows : University of Colorado Boulder
- Cyber Security: Mobile Security: Macquarie University
- Cybersecurity and Its Ten Domains: Kennesaw State University
- Deploy and Test a Visual Inspection AI Cosmetic Anomaly Detection Solution: Google Cloud
- Advanced Threat Hunting and Incident Response: LearnQuest
- Security Foundations, Threats, and Network Protection: Packt
- Incident Response, Risk Management, and Compliance: Packt
- Cybersecurity: What to Do When You Are a Victim: Kennesaw State University
- Advanced Malware and Network Anomaly Detection: Johns Hopkins University