Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "computer+forensics"
Skills you'll gain: Desktop Support, Hardware Troubleshooting, Operating Systems, Network Troubleshooting, Command-Line Interface, System Support, Computer Hardware, Network Security, Mobile Security, Microsoft Windows, General Networking, Unix Commands, Technical Support, Mac OS, Network Administration, Linux, System Configuration, Infrastructure Security, Computer Networking, Computer Displays
- Status: Free
Nanyang Technological University, Singapore
Skills you'll gain: Criminal Investigation and Forensics, Scientific Methods, Chemistry, Investigation, Biochemistry, Pharmacology, Laboratory Testing, Pathology, Microbiology
Skills you'll gain: Penetration Testing, Network Security, Mobile Security, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Threat Detection, Cybersecurity, Authorization (Computing), Security Awareness, Encryption, Malware Protection, Identity and Access Management, Wireless Networks, Data Security, Intrusion Detection and Prevention, Computer Security Awareness Training, Cyber Threat Intelligence
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Computer Security Incident Management, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Cloud Security, Security Strategy, Computer Security Awareness Training, Malware Protection, Risk Management, Vulnerability Assessments, Enterprise Security
Skills you'll gain: Continuous Monitoring, Incident Response, NIST 800-53, Risk Management Framework, Computer Security Incident Management, Business Continuity, Security Management, Disaster Recovery, Security Controls, Authorization (Computing), Crisis Management, Operational Risk, Risk Management, Event Monitoring, System Monitoring, Threat Management, Security Strategy, Cyber Security Policies, Cybersecurity, Cyber Risk
What brings you to Coursera today?
University of Colorado System
Skills you'll gain: Windows Servers, Linux Administration, Contingency Planning, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, OSI Models, User Accounts, Group Policy, Security Management, Cyber Security Policies, Systems Administration, Virtualization, Red Hat Enterprise Linux, Information Technology, Information Systems Security
Infosec
Skills you'll gain: File Systems, Microsoft Windows, Cybersecurity, TCP/IP, Network Protocols, Data Security, Information Systems Security, Litigation Support, Network Security, Operating Systems, Data Structures, General Networking, Data Validation, Record Keeping, Data Integrity, Data Storage, Data Analysis Software, User Accounts, USB, System Configuration
University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls, Software Design Patterns
Skills you'll gain: Malware Protection, Cyber Threat Hunting, Cyber Security Assessment, Application Security, Threat Detection, Network Analysis, Virtual Machines, Code Review, Debugging, System Programming, Microsoft Windows, Windows PowerShell, Programming Principles, Computer Architecture, Excel Macros, Linux
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Cyber Security Policies, Cyber Security Strategy, Cyber Governance, Threat Detection, Human Factors (Security), Business Risk Management, Cybersecurity, Threat Management, Security Awareness, Enterprise Risk Management (ERM), Information Management, Mobile Security, Business Ethics, Performance Measurement, Network Security
Skills you'll gain: Network Security, Hardening, Network Protocols, Cloud Security, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, Cyber Attacks, Network Infrastructure, Firewall, Cloud Computing, Virtual Private Networks (VPN)
In summary, here are 10 of our most popular computer+forensics courses
- Preparation for CompTIA A+ Certification: IBM
- Introduction to Forensic Science: Nanyang Technological University, Singapore
- Cybersecurity Attack and Defense Fundamentals: EC-Council
- Cybersecurity for Business: University of Colorado System
- NIST Cybersecurity and Risk Management Frameworks: Packt
- Computer Security and Systems Management: University of Colorado System
- Computer Forensics: Infosec
- Fundamentals of Computer Network Security: University of Colorado System
- Malware Analysis and Introduction to Assembly Language: IBM
- Cybersecurity: Developing a Program for Your Business: Kennesaw State University