Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Digital Forensics Course Catalog
- Status: Free Trial
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Cybersecurity, Cyber Threat Hunting, Continuous Monitoring, Network Security, Network Monitoring, Document Management, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
- Status: NewStatus: Free Trial
Skills you'll gain: Security Information and Event Management (SIEM), Cyber Risk, Cyber Security Policies, Data Security, Personally Identifiable Information, Email Security, Cybersecurity, Threat Detection, Information Privacy, Data Governance, Event Monitoring, Incident Response, Automation
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Data Security, Cybersecurity, Data Ethics, Authentications, Data Encryption Standard, Computer Security Awareness Training, Cryptography, Cyber Security Policies, Cyber Threat Intelligence, Authorization (Computing), Security Controls, Information Privacy, Security Awareness, Threat Modeling, Risk Analysis, Problem Solving, Communication
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Personally Identifiable Information, Cyber Risk, Information Privacy, Safety and Security, Multi-Factor Authentication
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Endpoint Detection and Response, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Anomaly Detection, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Network Analysis
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Wireless Networks, Mobile Security, General Networking, Proxy Servers, Network Security, Cybersecurity, Virtual Private Networks (VPN), Data Security, Security Awareness, Information Privacy, Encryption
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Email Security, Personally Identifiable Information, Firewall, Threat Detection, Network Security, Cybersecurity, Security Awareness, Cloud Storage, Information Privacy, Cloud Computing, General Networking, Encryption
Google Cloud
Skills you'll gain: Data Loss Prevention, Personally Identifiable Information, Information Privacy, JSON, Data Security, Cloud API, Google Cloud Platform, Data Cleansing, Unstructured Data, Cloud Storage
- Status: NewStatus: Free Trial
Skills you'll gain: Cybersecurity, Network Security, Cyber Security Strategy, Data Security, Security Controls, Continuous Monitoring, Threat Management, Security Strategy, Security Information and Event Management (SIEM), Vulnerability Management, Incident Response, Vulnerability Assessments, Systems Architecture
- Status: Preview
Skills you'll gain: Malware Protection, Cyber Threat Hunting, Cyber Security Assessment, Application Security, Threat Detection, Network Analysis, Virtual Machines, Code Review, Debugging, System Programming, Microsoft Windows, Windows PowerShell, Programming Principles, Computer Architecture, Excel Macros, Linux
- Status: Preview
Skills you'll gain: Generative AI, Data Ethics, Anomaly Detection, Personally Identifiable Information, Advanced Analytics, Threat Detection, Artificial Intelligence, Regulatory Compliance, Deep Learning, Data Security, Applied Machine Learning, Information Privacy, Natural Language Processing
- Status: NewStatus: Free Trial
Skills you'll gain: Incident Response, Business Continuity Planning, Disaster Recovery, Computer Security Incident Management, Investigation, Business Continuity, Cybersecurity, Business Priorities, Resource Management, Resource Allocation, Prioritization, Risk Analysis, Business Analysis, Data Storage Technologies, Law, Regulation, and Compliance, Ethical Standards And Conduct
Digital Forensics learners also search
In summary, here are 10 of our most popular digital forensics courses
- Sound the Alarm: Detection and Response:Â Google
- Cybersecurity Prevention and Detection: Unit 2:Â Pearson
- Cybersecurity for Data Science:Â University of Colorado Boulder
- Cybersecurity: What to Do When You Are a Victim:Â Kennesaw State University
- Introduction to Intrusion Detection Systems (IDS):Â Johns Hopkins University
- Cybersecurity: Protecting your Information on the Go:Â Kennesaw State University
- Cybersecurity: Protecting your Information at Home:Â Kennesaw State University
- Data Loss Prevention: Qwik Start - JSON:Â Google Cloud
- Cybersecurity Prevention and Detection: Unit 4:Â Pearson
- Malware Analysis and Introduction to Assembly Language:Â IBM