Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "criminal investigation and forensics"
Status: Free TrialUniversity of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Risk Management Framework, Infrastructure Security, Cyber Attacks, Cyber Risk, Cyber Security Policies, Public Safety and National Security, Cyber Security Assessment, Cyber Operations, Cyber Governance, Security Management, NIST 800-53, Incident Response, Security Strategy, Technology Roadmaps, Network Infrastructure, Technology Solutions, Transportation Operations, Legal Risk
Status: Free TrialSkills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Cyber Threat Hunting, Cyber Threat Intelligence, Cyber Operations, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Network Security, Network Monitoring, Data Security, Network Analysis, Exploitation techniques, Malware Protection, Vulnerability Assessments, Operating Systems
Status: Free TrialInfosec
Skills you'll gain: File Systems, Microsoft Windows, File Management, Operating Systems, Data Structures, Data Validation, System Software, Data Integrity, Data Storage
Status: Free TrialInfosec
Skills you'll gain: Microsoft Windows, Data Analysis Software, User Accounts, USB, File Systems, System Configuration, Software Installation, Computer Security Incident Management, File Management, Data Access, Encryption
Status: Free TrialSkills you'll gain: Cryptography, Cybersecurity, Network Security, Threat Modeling, Encryption, Identity and Access Management, Information Systems Security, Threat Detection, Firewall, Infrastructure Security, Security Controls, Security Strategy, Authorization (Computing), Authentications, Security Awareness, Risk Management Framework
Status: Free TrialJohns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, Threat Detection, Network Analysis, TCP/IP, Network Protocols, Cybersecurity, Application Security, Vulnerability Scanning, Wireless Networks, Splunk, Information Privacy
Status: Free TrialJohns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Endpoint Detection and Response, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Anomaly Detection, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Network Analysis
Status: Free TrialRoyal Holloway, University of London
Skills you'll gain: Human Factors (Security), Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Security Awareness, Social Sciences, Exploitation techniques, Culture, Psychology, Survey Creation, Research
Status: Free TrialInfosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Threat Management, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Threat Detection, Event Monitoring, Business Continuity, System Monitoring, Verification And Validation, Technical Communication
Status: PreviewCoursera Instructor Network
Skills you'll gain: Anomaly Detection, Fraud detection, Data Visualization, Generative AI, Risk Management, ChatGPT, Data Synthesis, Compliance Management, Unsupervised Learning, Test Data, Data Pipelines, Automation, Predictive Analytics, Artificial Intelligence
Status: Free TrialSkills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, MITRE ATT&CK Framework, Exploitation techniques, Threat Detection, Infrastructure Security, Payment Card Industry (PCI) Data Security Standards, NIST 800-53, Network Analysis, General Data Protection Regulation (GDPR), Information Privacy
Status: Free TrialUniversity of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
In summary, here are 10 of our most popular criminal investigation and forensics courses
- Homeland Security and Cybersecurity: University of Colorado System
- Technical Deep Dive with Incident Response Tools: Infosec
- Windows OS Forensics: Infosec
- Windows Registry Forensics: Infosec
- Security Foundations, Threats, and Network Protection: Packt
- Advanced Network Security and Analysis: Johns Hopkins University
- Introduction to Intrusion Detection Systems (IDS): Johns Hopkins University
- Cybercrime: Royal Holloway, University of London
- Stages of Incident Response: Infosec
- GenAI for Fraud Analysts: Improving Detection Efficiency: Coursera Instructor Network










