Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "criminal investigation and forensics"
Status: Free TrialInfosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Threat Management, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Intrusion Detection and Prevention, Security Management, Cyber Threat Intelligence, Threat Detection, Cyber Attacks, Cyber Security Assessment, Event Monitoring, Network Security, Network Monitoring, Data Security, Business Continuity, Network Analysis, Analysis
Status: NewStatus: Free TrialSkills you'll gain: System Monitoring, Computer Security Incident Management, Network Analysis, Data Integrity
Status: Free TrialSkills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Open Web Application Security Project (OWASP), Vulnerability Assessments, Exploitation techniques, Test Planning
Status: NewStatus: Free TrialSkills you'll gain: Cybersecurity, Malware Protection, Data Security, Intrusion Detection and Prevention, Network Security, Cyber Attacks, Cyber Threat Intelligence, Threat Detection, Operating System Administration, Computer Security Awareness Training, Network Monitoring, Network Analysis, Operating Systems, Data Integrity, Microsoft Windows, Mac OS, File Systems, Linux, Linux Commands, Email Security
Status: Free TrialUniversity of Michigan
Skills you'll gain: Sampling (Statistics), Sample Size Determination, Surveys, Survey Creation, Data Collection, Statistical Analysis, Interviewing Skills, Research Design, STATA (Software), R (Software), Data Integration, Data Validation, Data Ethics, Data Analysis, Stata, Data Quality, Statistical Modeling, Qualitative Research, Data Cleansing, R Programming
Status: NewStatus: Free TrialMacquarie University
Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Security, Threat Detection, Threat Modeling, Vulnerability Assessments, Cybersecurity, Vulnerability, Data Ethics, General Data Protection Regulation (GDPR), Cyber Risk, Data Governance, Data Encryption Standard, Security Management, Security Software, Compliance Management, Risk Management, Data Access, Security Strategy, NIST 800-53
Status: Free TrialWesleyan University
Skills you'll gain: Regression Analysis, Data Storytelling, Classification And Regression Tree (CART), Statistical Hypothesis Testing, Descriptive Statistics, Statistical Analysis, Statistical Software, Correlation Analysis, Exploratory Data Analysis, Data Manipulation, Decision Tree Learning, Data Presentation, Data Management, Data Analysis, Predictive Modeling, Data Visualization, Data Literacy, Statistical Modeling, Machine Learning, Statistics
Status: NewStatus: Free TrialMacquarie University
Skills you'll gain: Mobile Security, Investigation, Mobile Development, Apple iOS, Criminal Investigation and Forensics, Android (Operating System), Application Security, Legal Proceedings, Cybersecurity, File Systems, Malware Protection, Computer Security, Secure Coding, Computer Security Incident Management, Cloud Security, Security Strategy, Analysis, Encryption, Debugging, Disaster Recovery
Status: NewStatus: Free TrialSkills you'll gain: Computer Security Incident Management, Vulnerability Assessments, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Security Management, Cyber Threat Hunting, Information Systems Security, Threat Detection, Data Security, Network Security, Application Security, Cyber Security Strategy, DevSecOps, Malware Protection, Cloud Security, Cyber Security Assessment, Risk Management Framework, Encryption, Authentications
Status: Free TrialUniversity of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science
Status: Free TrialSkills you'll gain: Operating System Administration, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux Commands, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Linux Administration, Network Security, Network Protocols, Linux Servers, Computer Security Incident Management, Cloud Security, Data Ethics, Cyber Attacks
Status: Free TrialSkills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Modeling, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Security Management, Cybersecurity, Vulnerability Scanning, Vulnerability Assessments, Open Web Application Security Project (OWASP), Security Information and Event Management (SIEM)
In summary, here are 10 of our most popular criminal investigation and forensics courses
- Cyber Incident Response: Infosec
- Network Traffic and Logs Using IDS and SIEM Tools: Google
- Penetration Testing, Threat Hunting, and Cryptography: IBM
- Digital Forensics Essentials: Hands-On Edition: EC-Council
- Survey Data Collection and Analytics: University of Michigan
- Cyber Security: Data Security and Information Privacy: Macquarie University
- Data Analysis and Interpretation: Wesleyan University
- Cyber Security: Mobile Security: Macquarie University
- CompTIA Cybersecurity Analyst (CySA+) CS0-003: Pearson
- Introduction to Applied Cryptography: University of Colorado System










