Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Computer Forensics Course Catalog
- Status: NewStatus: Preview
Skills you'll gain: Event Monitoring, OSI Models, Network Monitoring, Network Protocols, Cyber Threat Intelligence, Network Analysis, Network Troubleshooting, TCP/IP, Distributed Denial-Of-Service (DDoS) Attacks, Threat Detection, General Networking, Network Security, Incident Response, Command-Line Interface
- Status: Free Trial
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Threat Management, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Intrusion Detection and Prevention, Security Management, Cyber Threat Intelligence, Threat Detection, Cyber Attacks, Cyber Security Assessment, Event Monitoring, Network Security, Network Monitoring, Data Security, Business Continuity, Network Analysis, Analysis
Skills you'll gain: Incident Response, Disaster Recovery, Computer Security Incident Management, Business Continuity, Security Management, Cybersecurity, Investigation, Continuous Monitoring, Threat Detection, Risk Management
- Status: Preview
Peking University
Skills you'll gain: Computer Architecture, Hardware Architecture, Computer Hardware, Peripheral Devices, Data Storage, Data Storage Technologies, Systems Architecture, Operating Systems, Computational Logic
- Status: Free Trial
Skills you'll gain: Incident Response, Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Threat Detection, Risk Management, Cybersecurity, Computer Security Incident Management, Secure Coding, Cyber Security Assessment, Incident Management, Security Testing, Cyber Governance, Intrusion Detection and Prevention, Risk Management Framework, Cyber Threat Intelligence, Network Infrastructure, Network Security, Security Information and Event Management (SIEM)
- Status: Preview
The University of Tokyo
Skills you'll gain: Visualization (Computer Graphics), Interactive Design, Computer Graphics, Computer Graphic Techniques, Human Computer Interaction, Animations, User Interface (UI), Design, 3D Assets, Technical Design, Algorithms, Simulations
- Status: Preview
Skills you'll gain: Malware Protection, Exploitation techniques, Exploit development, Cyber Threat Hunting, Cyber Security Assessment, Application Security, Threat Detection, Virtual Machines, Code Review, Debugging, System Programming, Scripting, Windows PowerShell, Virtual Environment, Linux, File Management
- Status: Free Trial
Microsoft
Skills you'll gain: Vulnerability Management, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Security Testing, Network Security, System Testing, Threat Detection, Firewall, Cybersecurity, Cloud Security, Microsoft Azure, Virtual Private Networks (VPN), Windows PowerShell, Command-Line Interface
- Status: Free Trial
University of Colorado System
Skills you'll gain: Windows Servers, Computer Security, Linux Administration, Contingency Planning, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, Enterprise Application Management, OSI Models, User Accounts, Group Policy, Security Management, Operating System Administration, Systems Administration, Virtualization, Cybersecurity
- Status: Free Trial
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Cybersecurity, Cyber Threat Hunting, Continuous Monitoring, Network Security, Network Monitoring, Document Management, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
- Status: Preview
University of Michigan
Skills you'll gain: Network Security, Network Protocols, Network Architecture, TCP/IP, Web Applications, Computer Networking, Encryption, Network Infrastructure, Innovation, Hypertext Markup Language (HTML)
- Status: Free Trial
Board Infinity
Skills you'll gain: Business Continuity Planning, Incident Response, Cybersecurity, Risk Mitigation, Cyber Threat Hunting, Risk Management Framework, Cyber Risk, Risk Management, Risk Analysis, Network Security, Threat Management, IT Management, Vulnerability Management, Security Management, Enterprise Risk Management (ERM), Cyber Security Strategy, Cyber Security Policies, Business Risk Management, Cyber Threat Intelligence, Computer Security Incident Management
Computer Forensics learners also search
In summary, here are 10 of our most popular computer forensics courses
- Network Traffic Analysis for Incident Response: Infosec
- Cyber Incident Response: Infosec
- Incident Response and Recovery: ISC2
- 计算机组成 Computer Organization: Peking University
- CompTIA CySA+ (CS0-003): Packt
- Interactive Computer Graphics: The University of Tokyo
- Malware Analysis and Introduction to Assembly Language: IBM
- Cybersecurity Testing and Prevention: Microsoft
- Computer Security and Systems Management: University of Colorado System
- Sound the Alarm: Detection and Response: Google