Filter by
The language used throughout the course, in both instruction and assessments.
Results for "forensic+investigations"
- Status: Free
Coursera Project Network
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Anomaly Detection, Network Security, General Networking, Network Monitoring, Real Time Data, Network Analysis
Johns Hopkins University
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Intrusion Detection and Prevention, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Threat Detection, Threat Modeling, Network Analysis, Network Security, Network Monitoring, NIST 800-53, Cloud Security
Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, Threat Detection, TCP/IP, Network Analysis, Network Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Application Security, Wireless Networks, Splunk, Information Privacy
Skills you'll gain: Threat Detection, Threat Management, Cloud Security, Google Cloud Platform, Vulnerability Management, Vulnerability Assessments, Security Information and Event Management (SIEM), Public Cloud
Skills you'll gain: Incident Response, Email Security, Cloud Security, Computer Security Incident Management, Threat Management, Vulnerability Management, Threat Modeling, Risk Management Framework, Malware Protection, Security Management, Information Systems Security, Network Security, Vulnerability Assessments, Cybersecurity, Incident Management, Threat Detection, Information Assurance, Intrusion Detection and Prevention, Cyber Security Policies, Security Information and Event Management (SIEM)
Skills you'll gain: Anomaly Detection, Google Cloud Platform, Application Deployment, Image Analysis, Cloud Computing, Applied Machine Learning, Computer Vision
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Attacks, Security Management, Cybersecurity, Risk Management, Cyber Security Assessment, Incident Management, Risk Analysis, Cyber Governance, Threat Management, Secure Coding, Malware Protection, Cyber Risk, Governance, Security Strategy, Enterprise Risk Management (ERM), Intrusion Detection and Prevention, Cyber Threat Intelligence, Governance Risk Management and Compliance
Skills you'll gain: Application Deployment, Image Analysis, Google Cloud Platform, Computer Vision, Anomaly Detection, Applied Machine Learning, MLOps (Machine Learning Operations), Predictive Analytics
Skills you'll gain: Hardening, Public Key Infrastructure, Security Engineering, Cryptographic Protocols, Information Systems Security, Infrastructure Security, Network Security, Cybersecurity, Cloud Security, System Configuration, Cryptography, Encryption, Key Management, Enterprise Security, Mobile Security
Skills you'll gain: Hardware Troubleshooting, Information Systems Security, Malware Protection, Firewall, Security Controls, Data Security, Computer Security Awareness Training, Network Security, Cybersecurity, Technical Support, Encryption, Problem Management, Authorization (Computing), Data Integrity, Authentications
Skills you'll gain: Email Security, Incident Response, Computer Security Incident Management, Malware Protection, Security Management, Network Security, Cybersecurity, Incident Management, Intrusion Detection and Prevention, Cyber Threat Hunting, Security Controls, Distributed Denial-Of-Service (DDoS) Attacks, Digital Communications, Data Integrity
Skills you'll gain: Cloud Security, Incident Response, Computer Security Incident Management, Threat Management, Threat Detection, Intrusion Detection and Prevention, Security Information and Event Management (SIEM), Application Security, Web Applications, Malware Protection, Network Monitoring
In summary, here are 10 of our most popular forensic+investigations courses
- Wireshark for Security: Detect Network Anomalies: Coursera Project Network
- Advanced Network Analysis and Incident Response: Johns Hopkins University
- Advanced Network Security and Analysis: Johns Hopkins University
- Detect and Investigate Threats with Security Command Center: Google Cloud
- Certified Incident Handler (ECIH) v2: Packt
- Deploy and Test a Visual Inspection AI Cosmetic Anomaly Detection Solution: Google Cloud
- Incident Response, Risk Management, and Compliance: Packt
- Deploy and Test a Visual Inspection AI Component Anomaly Detection Solution: Google Cloud
- Security Engineering and Cryptography: Packt
- Security and Troubleshooting Essentials: Packt