Filter by
The language used throughout the course, in both instruction and assessments.
Results for "forensics"
Kennesaw State University
Skills you'll gain: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Personally Identifiable Information, Threat Detection, Information Privacy, Safety and Security, Multi-Factor Authentication
Skills you'll gain: Email Security, Incident Response, Computer Security Incident Management, Malware Protection, Security Management, Network Security, Cybersecurity, Incident Management, Intrusion Detection and Prevention, Cyber Threat Hunting, Security Controls, Distributed Denial-Of-Service (DDoS) Attacks, Digital Communications, Data Integrity
Skills you'll gain: Anomaly Detection, Google Cloud Platform, Application Deployment, Image Analysis, Cloud Computing, Applied Machine Learning, Computer Vision
Google Cloud
Skills you'll gain: Feature Engineering, Exploratory Data Analysis, Real Time Data, Applied Machine Learning, MLOps (Machine Learning Operations), Anomaly Detection, Application Deployment, Jupyter, Google Cloud Platform, Predictive Modeling, Data Analysis, Data Processing, Data Warehousing, Continuous Monitoring, Statistical Modeling
- Status: Free
University of Lausanne
Skills you'll gain: Health Care Procedure and Regulation, Law, Regulation, and Compliance, Clinical Laboratory Science, Pharmaceuticals, Culture, Research, Social Sciences, Criminal Investigation and Forensics, Sociology, Ethical Standards And Conduct, Psychology
Kennesaw State University
Skills you'll gain: Wireless Networks, Mobile Security, Proxy Servers, Network Security, Cybersecurity, Virtual Private Networks (VPN), Computer Networking, Computer Security Awareness Training, Information Privacy, Emerging Technologies
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Cybersecurity, Cyber Operations, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Security Information and Event Management (SIEM), Threat Detection, Cloud Security, Threat Management, System Monitoring, Automation
Queen Mary University of London
Skills you'll gain: Tax, Tax Laws, Law, Regulation, and Compliance, Cloud Services, Tax Compliance, Cloud Computing, Sales Tax, Regulation and Legal Compliance, Corporate Tax, Income Tax, General Data Protection Regulation (GDPR), Data Access, Information Privacy, Interoperability, Criminal Investigation and Forensics, Competitive Analysis, Market Analysis, Market Dynamics
Skills you'll gain: Continuous Monitoring, Incident Response, NIST 800-53, Risk Management Framework, Computer Security Incident Management, Business Continuity, Security Management, Disaster Recovery, Security Controls, Authorization (Computing), Risk Management, System Monitoring, Security Testing, Threat Management, Security Strategy, Cyber Security Policies, Cybersecurity, Cyber Risk, Configuration Management, Information Systems Security
- Status: Free
Coursera Project Network
Skills you'll gain: Linux Commands, Linux, TCP/IP, Scripting, Shell Script, Network Monitoring, Network Analysis, Network Security, Network Protocols
Google Cloud
Skills you'll gain: Data Import/Export, Google Cloud Platform, Data Pipelines, Security Information and Event Management (SIEM), Data Sharing, Cloud Security
Banco Interamericano de Desarrollo
Skills you'll gain: Public Safety and National Security, Governance, Social Justice, Security Management, Policy Analysis, Public Policies, Management Information Systems, Policy Development, Criminal Investigation and Forensics, Community Development, Social Sciences, Program Evaluation
In summary, here are 10 of our most popular forensics courses
- Cybersecurity: What to Do When You Are a Victim: Kennesaw State University
- Handling Security Incidents Across Domains: Packt
- Deploy and Test a Visual Inspection AI Cosmetic Anomaly Detection Solution: Google Cloud
- Data Analysis with the FraudFinder Workshop: Google Cloud
- Dopage : Sports, Organisations et Sciences: University of Lausanne
- Cybersecurity: Protecting your Information on the Go: Kennesaw State University
- Detect, Respond, and Recover from Cloud Cybersecurity Attacks: Google Cloud
- Cloud Computing Law: Law Enforcement, Competition, & Tax: Queen Mary University of London
- NIST Cybersecurity and Risk Management Frameworks: Packt
- Analyze Network Traffic with TCPDump: Build a Logging Tool: Coursera Project Network