Filter by
The language used throughout the course, in both instruction and assessments.
Results for "criminal+investigation+and+forensics"
Skills you'll gain: Security Testing, Vulnerability Assessments, Cyber Security Assessment, Vulnerability Scanning, Penetration Testing, Threat Modeling, Security Controls, Test Planning, Simulations
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Computer Security Incident Management, Cyber Threat Intelligence, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Continuous Monitoring, System Monitoring, Network Analysis, Virtual Machines, Network Security, Information Systems Security, Network Monitoring, NIST 800-53, Applied Machine Learning, Machine Learning Algorithms
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Cybersecurity, Virtual Private Networks (VPN), Remote Access Systems, Network Protocols, Vulnerability Assessments, Encryption, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Institut Mines-Télécom
Skills you'll gain: Image Analysis, Computer Vision, Systems Of Measurement, Computer Programming, Python Programming, Algorithms, Data Validation, Applied Mathematics
- Status: Free
Ball State University
Skills you'll gain: Application Security, Cryptography, Authentications, Encryption, Cybersecurity, Information Systems Security, Email Security, Network Security, Advanced Encryption Standard (AES), Data Encryption Standard, Secure Coding, Application Development, Key Management, Public Key Infrastructure, Network Protocols, Data Integrity
Skills you'll gain: Anomaly Detection, Image Analysis, Google Cloud Platform, Computer Vision, Data Import/Export, Applied Machine Learning, Quality Assurance, Predictive Modeling
Skills you'll gain: Cybersecurity, Network Security, Cloud Security, Application Security, Information Systems Security, Data Security, Cryptography, Endpoint Security, OSI Models, Encryption, Wireless Networks, Malware Protection, Public Key Infrastructure, Mobile Security, Network Protocols, Virtualization
Skills you'll gain: Cybersecurity, Network Security, Cyber Attacks, Cryptography, Threat Modeling, Information Systems Security, Identity and Access Management, Firewall, Encryption, Threat Detection, Public Key Infrastructure, Infrastructure Security, Security Controls, Authentications, Risk Management Framework, Authorization (Computing)
Johns Hopkins University
Skills you'll gain: Email Security, Malware Protection, Mobile Security, Cybersecurity, Network Security, Internet Of Things, Open Web Application Security Project (OWASP), Network Monitoring, Security Controls, TCP/IP, Threat Detection, Network Analysis, Network Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Border Gateway Protocol, Infrastructure Security, Application Security, Information Systems Security, Threat Modeling, Network Routing
Kennesaw State University
Skills you'll gain: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Personally Identifiable Information, Threat Detection, Information Privacy, Safety and Security, Multi-Factor Authentication
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Cybersecurity, Information Systems Security, Network Monitoring, Network Analysis
Skills you'll gain: Hardware Troubleshooting, Information Systems Security, Malware Protection, Firewall, Security Controls, Data Security, Computer Security Awareness Training, Network Security, Cybersecurity, Technical Support, Encryption, Problem Management, Authorization (Computing), Data Integrity, Authentications
In summary, here are 10 of our most popular criminal+investigation+and+forensics courses
- Security Assessment and Testing: Packt
- Intrusion Detection: Johns Hopkins University
- Security & Ethical Hacking: Attacking the Network: University of Colorado Boulder
- Traitement d'images : segmentation et caractérisation: Institut Mines-Télécom
- CS 647: Cybersecurity and Secure Software Design. (2024): Ball State University
- Create a Cosmetic Anomaly Detection Model using Visual Inspection AI: Google Cloud
- Cryptography, Network Security, and Application Security: Packt
- Security Foundations, Threats, and Network Protection: Packt
- Information Assurance Analysis: Johns Hopkins University
- Cybersecurity: What to Do When You Are a Victim: Kennesaw State University