Filter by
The language used throughout the course, in both instruction and assessments.
Results for "criminal+investigation+and+forensics"
Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Cyber Threat Hunting, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Network Security, Network Monitoring, Data Security, Network Analysis, Malware Protection, Vulnerability Assessments, Operating Systems, OS Process Management
Kennesaw State University
Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Cryptography, Cyber Security Assessment, Cyber Risk, Secure Coding, Systems Development Life Cycle, Security Controls, Cyber Security Policies, Infrastructure Security, Security Awareness, Identity and Access Management
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Threat Management, Disaster Recovery, Cyber Operations, Cybersecurity, Threat Detection, Intrusion Detection and Prevention, Event Monitoring, Business Continuity, Vulnerability Assessments, Technical Communication
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Threat Modeling, Email Security, Security Engineering, System Design and Implementation, Network Security, Jupyter, Authentications, Deep Learning, Machine Learning Software
- Status: Free
Peking University
Skills you'll gain: Social Justice, Law, Regulation, and Compliance, Adjudication, Ethical Standards And Conduct, Regulation and Legal Compliance, Research
- Status: Free
The State University of New York
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Policies, Cybersecurity, International Relations, Cyber Risk, Cyber Operations, Cyber Governance, Infrastructure Security, Law, Regulation, and Compliance, Security Management, Political Sciences, Media and Communications, Computer Networking, Psychology
Johns Hopkins University
Skills you'll gain: Epidemiology, Event Monitoring, Health Care, Descriptive Analytics, Continuous Monitoring, Technical Communication, Preventative Care, Anomaly Detection, Media and Communications, Infectious Diseases, Law, Regulation, and Compliance, Data Ethics, Information Privacy
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
Arizona State University
Skills you'll gain: Data Storytelling, Research, Data Collection, Critical Thinking, Scientific Methods, Analysis, Learning Strategies, Persuasive Communication, Data Analysis, Testability
Cisco Learning and Certifications
Skills you'll gain: Cyber Threat Hunting, Threat Detection, Threat Modeling, Threat Management, Event Monitoring, Vulnerability Management, Security Information and Event Management (SIEM), Cybersecurity, Continuous Monitoring, Incident Response, Security Management, Network Security, Network Monitoring
University of Illinois Urbana-Champaign
Skills you'll gain: Medical Science and Research, Criminal Investigation and Forensics, Law, Regulation, and Compliance, Information Privacy, Life Sciences, General Science and Research, Health Care Procedure and Regulation, Ethical Standards And Conduct, Regulatory Compliance
Infosec
Skills you'll gain: Microsoft Windows, Data Analysis Software, User Accounts, USB, Systems Analysis, File Systems, System Configuration, Software Installation, Operating Systems, File Management
In summary, here are 10 of our most popular criminal+investigation+and+forensics courses
- Technical Deep Dive with Incident Response Tools: Infosec
- Cybersecurity and Its Ten Domains: Kennesaw State University
- Stages of Incident Response: Infosec
- AI for Cybersecurity: Johns Hopkins University
- 刑法å¦æ€»è®º Criminal Law: Peking University
- International Cyber Conflicts: The State University of New York
- Surveillance Systems: Analysis, Dissemination, and Special Systems: Johns Hopkins University
- Detecting and Mitigating Cyber Threats and Attacks: University of Colorado System
- Information Gathering and Vetting: Arizona State University
- Threat Investigation: Cisco Learning and Certifications