• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Computer Forensics


Results for "computer+forensics"


  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Fundamentals of Computer Network Security

    Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques, Software Design Patterns

    4
    Rating, 4 out of 5 stars
    ·
    594 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Essentials

    Skills you'll gain: Cyber Risk, Security Awareness, Cyber Attacks, Mobile Security, Cybersecurity, Cyber Security Assessment, Cyber Security Policies, Data Security, Cyber Threat Hunting, Email Security, Authentications, Security Management, Security Strategy

    4.6
    Rating, 4.6 out of 5 stars
    ·
    24 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Introduction to Computers and Operating Systems and Security

    Skills you'll gain: Computer Systems, Operating Systems, Generative AI, Business Systems, Cybersecurity, Enterprise Security, Servers, Security Awareness, Computer Hardware, Information Systems Security, Computer Architecture, Data Storage, Patch Management, Cloud Computing

    4.8
    Rating, 4.8 out of 5 stars
    ·
    2K reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Preview
    Preview
    S

    Starweaver

    Cyber Espionage and Counterintelligence

    Skills you'll gain: Endpoint Detection and Response, Threat Detection, MITRE ATT&CK Framework, Cyber Threat Hunting, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Modeling, Security Information and Event Management (SIEM), Cyber Security Strategy, Cyber Operations, Cybersecurity, Malware Protection, Incident Response, Data Loss Prevention, Anomaly Detection, Data Security, System Implementation, Open Source Technology

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Windows Registry Forensics

    Skills you'll gain: Digital Forensics, Microsoft Windows, Data Analysis Software, User Accounts, USB, File Systems, System Configuration, Software Installation, Operating Systems, System Support

    4.7
    Rating, 4.7 out of 5 stars
    ·
    66 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Mobile Security

    Skills you'll gain: Mobile Security, Investigation, Mobile Development, Apple iOS, Criminal Investigation and Forensics, Android (Operating System), Application Security, Legal Proceedings, Cybersecurity, File Systems, Malware Protection, Computer Security, Secure Coding, Computer Security Incident Management, Cloud Security, Security Strategy, Analysis, Encryption, Debugging, Disaster Recovery

    4.5
    Rating, 4.5 out of 5 stars
    ·
    12 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Data Security and Information Privacy

    Skills you'll gain: Data Security, Cyber Risk, Cybersecurity, Data Sharing, Cyber Attacks, Security Management, Cryptography, Security Software, Security Strategy, Network Security, Risk Modeling, Data Access, Statistical Methods

    Beginner · Course · 1 - 3 Months

  • Status: New
    New
    Status: Preview
    Preview
    S

    Starweaver

    Legal and Ethical Cyber Investigations

    Skills you'll gain: Digital Forensics, Electronic Discovery, Investigation, Criminal Investigation and Forensics, Incident Response, Cyber Threat Intelligence, Technical Communication, Computer Security Incident Management, Report Writing, Cybersecurity, Cyber Security Policies, Fraud detection, Legal Proceedings, Law, Regulation, and Compliance, Ethical Standards And Conduct, Business Ethics, Compliance Reporting, Data Collection, Analysis, Management Reporting

    Beginner · Course · 1 - 3 Months

  • P

    Packt

    TOTAL - CompTIA CySA+ Cybersecurity Analyst (CS0-003)

    Skills you'll gain: Cyber Threat Intelligence, Vulnerability Assessments, Incident Response, Cybersecurity, Threat Modeling, Cyber Threat Hunting, Threat Detection, Application Security, Security Management, Intrusion Detection and Prevention, Security Controls, Malware Protection, Network Analysis

    Intermediate · Course · 3 - 6 Months

  • P

    Packt

    Offensive Hacking Unfolded - Become a Pro Pentester

    Skills you'll gain: Exploitation techniques, Metasploit, Vulnerability Assessments, Vulnerability Scanning, Brute-force attacks, Virtual Environment, Cybersecurity, Technical Writing, Web Servers, Linux

    4
    Rating, 4 out of 5 stars
    ·
    6 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Preview
    Preview
    J

    Johns Hopkins University

    Computing for Cancer Informatics

    Skills you'll gain: Computer Systems, Informatics, Data Processing, Data Sharing, Computing Platforms, Bioinformatics, Data Storage, Computer Literacy, Computer Hardware, Big Data, Capacity Management, Data Centers, Computer Security Awareness Training, Cloud Computing, Oncology

    4.6
    Rating, 4.6 out of 5 stars
    ·
    16 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    A

    Arizona State University

    Digital Safety and Security

    Skills you'll gain: Cyber Attacks, Data Security, Safety and Security, Cybersecurity, Computer Security Awareness Training, digital literacy, Information Systems Security, Security Strategy, Security Controls, Data Loss Prevention, Incident Response, Data Storage, Vulnerability Assessments, Patch Management

    4.6
    Rating, 4.6 out of 5 stars
    ·
    70 reviews

    Mixed · Course · 1 - 3 Months

1…456…9

In summary, here are 10 of our most popular computer+forensics courses

  • Fundamentals of Computer Network Security: University of Colorado System
  • Cyber Security: Essentials: Macquarie University
  • Introduction to Computers and Operating Systems and Security: Microsoft
  • Cyber Espionage and Counterintelligence: Starweaver
  • Windows Registry Forensics: Infosec
  • Cyber Security: Mobile Security: Macquarie University
  • Cyber Security: Data Security and Information Privacy: Macquarie University
  • Legal and Ethical Cyber Investigations : Starweaver
  • TOTAL - CompTIA CySA+ Cybersecurity Analyst (CS0-003): Packt
  • Offensive Hacking Unfolded - Become a Pro Pentester: Packt

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok