Filter by
The language used throughout the course, in both instruction and assessments.
Results for "computer+forensics"
Skills you'll gain: Cybersecurity, Application Security, Information Systems Security, Software Installation, System Configuration, Data Management, Security Controls, Computer Hardware, Data Security, Hardware Architecture, Data Storage, Information Technology Operations, Microsoft Windows, Firewall, Disaster Recovery, Encryption, Identity and Access Management
Kennesaw State University
Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Cryptography, Cyber Security Assessment, Cyber Risk, Secure Coding, Systems Development Life Cycle, Security Controls, Cyber Security Policies, Infrastructure Security, Security Awareness, Identity and Access Management
Skills you'll gain: Penetration Testing, Network Security, Threat Management, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Vulnerability Scanning, Cybersecurity, Authorization (Computing), Security Awareness, Cyber Threat Intelligence, Malware Protection, Data Security, Cyber Attacks, Threat Detection, Computer Security Awareness Training
- Status: Free
University of Lausanne
Skills you'll gain: Criminal Investigation and Forensics, Scientific Methods, Investigation, Statistical Analysis, Report Writing, Probability & Statistics, Research, Data Collection, Verification And Validation
University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Cryptographic Protocols, Intrusion Detection and Prevention, Application Security, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls
Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Application Security, Vulnerability Assessments, Vulnerability Management, Event Monitoring, Security Controls, Data Integrity, Patch Management, Network Security
Infosec
Skills you'll gain: Criminal Investigation and Forensics, Cybersecurity, TCP/IP, Network Protocols, Information Systems Security, Data Ethics, General Networking, Record Keeping, Data Integrity, File Management, Ethical Standards And Conduct, Encryption, Technical Writing, Linux Commands
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
EC-Council
Skills you'll gain: Malware Protection, Cybersecurity, Data Security, Cyber Attacks, Threat Detection, Computer Security Awareness Training, Network Security, Cyber Threat Intelligence, Data Integrity, Incident Response, Network Analysis, Microsoft Windows, Mac OS, Linux Commands, Linux, Operating Systems, Web Applications, File Systems, Web Servers
University of Colorado System
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Risk Management, Enterprise Security, Cyber Security Assessment, Vulnerability Assessments, Encryption, Network Security, Data Security, Cryptography, Security Awareness, Information Assurance
University of Colorado System
Skills you'll gain: Computer Security, OSI Models, Systems Administration, Virtualization, Network Security, Information Technology, Information Systems Security, Enterprise Security, General Networking, Network Administration, Information Systems, Computer Networking, Virtual Machines, Computer Systems, Data Integrity
University of California, Irvine
Skills you'll gain: Systems Development Life Cycle, Agile Methodology, Productivity Software, Network Security, Computer Hardware, Hardware Architecture, Computer Systems, Data Security, Systems Design, Systems Development, Risk Management, System Design and Implementation, TCP/IP, Information Technology, Software Development Methodologies, Networking Hardware, Data Ethics, Cybersecurity, General Networking, Safety and Security
Searches related to computer+forensics
In summary, here are 10 of our most popular computer+forensics courses
- Essential Aspects of Software, Hardware, and Data Backup: Microsoft
- Cybersecurity and Its Ten Domains: Kennesaw State University
- Cybersecurity Attack and Defense Fundamentals: EC-Council
- Challenging Forensic Science: How Science Should Speak to Court: University of Lausanne
- Fundamentals of Computer Network Security: University of Colorado System
- OWASP Top 10 - Risks 6-10: Infosec
- Digital Forensics Concepts: Infosec
- Detecting and Mitigating Cyber Threats and Attacks: University of Colorado System
- Digital Forensics Essentials (DFE): EC-Council
- Introduction to Cybersecurity for Business: University of Colorado System