Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Computer Forensics Course Catalog
Skills you'll gain: ChatGPT, Generative AI, Artificial Intelligence, Data Ethics, OpenAI, Artificial Intelligence and Machine Learning (AI/ML), Deep Learning, Artificial Neural Networks, Application Deployment, IBM Cloud, Governance, Machine Learning, Business Transformation, Ethical Standards And Conduct, Computer Vision, Self Service Technologies, Information Architecture, Business Process Automation, Software Development Tools, Image Analysis
Skills you'll gain: Network Security, Intrusion Detection and Prevention, Hardening, TCP/IP, Cyber Attacks, Network Architecture, Computer Networking, Cloud Computing, Firewall, Network Infrastructure, Network Protocols, Virtual Private Networks (VPN)
University of Michigan
Skills you'll gain: Network Security, Network Protocols, Network Architecture, TCP/IP, Web Applications, General Networking, Computer Networking, Encryption, Web Servers, Innovation, Hypertext Markup Language (HTML)
University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Threat Detection, Data Sharing
Skills you'll gain: Computer Hardware, Technical Support, Software Installation, Help Desk Support, Information Technology, Hardware Troubleshooting, Microsoft Windows, Linux, Computer Networking, Computational Logic, Technical Documentation
University of Michigan
Skills you'll gain: Web Scraping, Data Processing, Relational Databases, JSON, Database Design, SQL, Network Protocols, Databases, Web Services, Restful API, Programming Principles, Data Cleansing, Data Structures, Data Storytelling, Data Collection, Computer Programming, Python Programming, Data Manipulation, Development Environment, Computational Thinking
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Security Management, Vulnerability Scanning, Vulnerability Assessments, Threat Modeling, Security Information and Event Management (SIEM), Security Awareness
University at Buffalo
Skills you'll gain: Computer Vision, Image Analysis, Computer Graphics, Visualization (Computer Graphics), Color Theory, Data Processing, Artificial Intelligence, Matlab, Artificial Neural Networks, Algorithms, Calculus, Probability & Statistics
University of Michigan
Skills you'll gain: Programming Principles, Computer Programming, Python Programming, Computational Thinking, Software Installation, Development Environment
Duke University
Skills you'll gain: Object Oriented Programming (OOP), Java, Hypertext Markup Language (HTML), Software Design, Data Structures, Debugging, Web Design and Development, Software Engineering, Cryptography, Cascading Style Sheets (CSS), Web Development, Programming Principles, Javascript, Encryption, Algorithms, Program Development, Web Applications, Front-End Web Development, Statistical Analysis, Computer Programming
Rice University
Skills you'll gain: Computational Thinking, Event-Driven Programming, Algorithms, Combinatorics, Graph Theory, Programming Principles, Application Development, Object Oriented Programming (OOP), Data Structures, Theoretical Computer Science, Independent Thinking, Probability, Computer Programming, Interactive Design, Program Development, Big Data, Python Programming, Data Analysis, Probability & Statistics, Computational Logic
Skills you'll gain: CI/CD, Open Web Application Security Project (OWASP), Istio, Continuous Integration, Software Development Life Cycle, Linux Commands, Agile Software Development, Unit Testing, Cloud Computing Architecture, Application Deployment, Test Driven Development (TDD), Gherkin (Scripting Language), Kubernetes, Jenkins, Bash (Scripting Language), Cloud Services, DevOps, Git (Version Control System), Jupyter, Grafana
Computer Forensics learners also search
In summary, here are 10 of our most popular computer forensics courses
- AI Foundations for Everyone: IBM
- Connect and Protect: Networks and Network Security: Google
- Internet History, Technology, and Security: University of Michigan
- Proactive Computer Security: University of Colorado System
- Technical Support Fundamentals: Google
- Python for Everybody: University of Michigan
- Security Analyst Fundamentals: IBM
- Computer Vision Basics: University at Buffalo
- Programming for Everybody (Getting Started with Python): University of Michigan
- Java Programming and Software Engineering Fundamentals: Duke University