• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
Log In
Join for Free
Coursera
  • Browse
  • Criminal Investigation And Forensics
Skip to search results

Filter by

Subject
Required
 *

Language
Required
 *

The language used throughout the course, in both instruction and assessments.

Learning Product
Required
 *

Build job-relevant skills in under 2 hours with hands-on tutorials.
Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn career credentials while taking courses that count towards your Master’s degree.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.
Complete graduate-level learning without committing to a full degree program.
Earn a university-issued career credential in a flexible, interactive format.
Graduate level learning within reach.

Level
Required
 *

Duration
Required
 *

Skills
Required
 *

Subtitles
Required
 *

Educator
Required
 *

Results for "criminal investigation and forensics"

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Cyber Incident Response

    Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Threat Management, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Intrusion Detection and Prevention, Security Management, Cyber Threat Intelligence, Threat Detection, Cyber Attacks, Cyber Security Assessment, Event Monitoring, Network Security, Network Monitoring, Data Security, Business Continuity, Network Analysis, Analysis

    4.7
    Rating, 4.7 out of 5 stars
    ·
    265 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    G

    Google

    Network Traffic and Logs Using IDS and SIEM Tools

    Skills you'll gain: System Monitoring, Computer Security Incident Management, Network Analysis, Data Integrity

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    IBM

    Penetration Testing, Threat Hunting, and Cryptography

    Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Open Web Application Security Project (OWASP), Vulnerability Assessments, Exploitation techniques, Test Planning

    4.6
    Rating, 4.6 out of 5 stars
    ·
    2.5K reviews

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    EC-Council

    Digital Forensics Essentials: Hands-On Edition

    Skills you'll gain: Cybersecurity, Malware Protection, Data Security, Intrusion Detection and Prevention, Network Security, Cyber Attacks, Cyber Threat Intelligence, Threat Detection, Operating System Administration, Computer Security Awareness Training, Network Monitoring, Network Analysis, Operating Systems, Data Integrity, Microsoft Windows, Mac OS, File Systems, Linux, Linux Commands, Email Security

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Michigan

    Survey Data Collection and Analytics

    Skills you'll gain: Sampling (Statistics), Sample Size Determination, Surveys, Survey Creation, Data Collection, Statistical Analysis, Interviewing Skills, Research Design, STATA (Software), R (Software), Data Integration, Data Validation, Data Ethics, Data Analysis, Stata, Data Quality, Statistical Modeling, Qualitative Research, Data Cleansing, R Programming

    4.4
    Rating, 4.4 out of 5 stars
    ·
    1.4K reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Data Security and Information Privacy

    Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Security, Threat Detection, Threat Modeling, Vulnerability Assessments, Cybersecurity, Vulnerability, Data Ethics, General Data Protection Regulation (GDPR), Cyber Risk, Data Governance, Data Encryption Standard, Security Management, Security Software, Compliance Management, Risk Management, Data Access, Security Strategy, NIST 800-53

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    W

    Wesleyan University

    Data Analysis and Interpretation

    Skills you'll gain: Regression Analysis, Data Storytelling, Classification And Regression Tree (CART), Statistical Hypothesis Testing, Descriptive Statistics, Statistical Analysis, Statistical Software, Correlation Analysis, Exploratory Data Analysis, Data Manipulation, Decision Tree Learning, Data Presentation, Data Management, Data Analysis, Predictive Modeling, Data Visualization, Data Literacy, Statistical Modeling, Machine Learning, Statistics

    4.4
    Rating, 4.4 out of 5 stars
    ·
    1.4K reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Mobile Security

    Skills you'll gain: Mobile Security, Investigation, Mobile Development, Apple iOS, Criminal Investigation and Forensics, Android (Operating System), Application Security, Legal Proceedings, Cybersecurity, File Systems, Malware Protection, Computer Security, Secure Coding, Computer Security Incident Management, Cloud Security, Security Strategy, Analysis, Encryption, Debugging, Disaster Recovery

    4.6
    Rating, 4.6 out of 5 stars
    ·
    8 reviews

    Beginner · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Pearson

    CompTIA Cybersecurity Analyst (CySA+) CS0-003

    Skills you'll gain: Computer Security Incident Management, Vulnerability Assessments, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Security Management, Cyber Threat Hunting, Information Systems Security, Threat Detection, Data Security, Network Security, Application Security, Cyber Security Strategy, DevSecOps, Malware Protection, Cloud Security, Cyber Security Assessment, Risk Management Framework, Encryption, Authentications

    4.4
    Rating, 4.4 out of 5 stars
    ·
    8 reviews

    Intermediate · Specialization · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Introduction to Applied Cryptography

    Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science

    4.6
    Rating, 4.6 out of 5 stars
    ·
    1K reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    I

    IBM

    IT Fundamentals for Cybersecurity

    Skills you'll gain: Operating System Administration, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux Commands, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Linux Administration, Network Security, Network Protocols, Linux Servers, Computer Security Incident Management, Cloud Security, Data Ethics, Cyber Attacks

    4.6
    Rating, 4.6 out of 5 stars
    ·
    22K reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    I

    IBM

    Security Analyst Fundamentals

    Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Modeling, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Security Management, Cybersecurity, Vulnerability Scanning, Vulnerability Assessments, Open Web Application Security Project (OWASP), Security Information and Event Management (SIEM)

    4.7
    Rating, 4.7 out of 5 stars
    ·
    4.5K reviews

    Beginner · Specialization · 3 - 6 Months

1234…834

In summary, here are 10 of our most popular criminal investigation and forensics courses

  • Cyber Incident Response: Infosec
  • Network Traffic and Logs Using IDS and SIEM Tools: Google
  • Penetration Testing, Threat Hunting, and Cryptography: IBM
  • Digital Forensics Essentials: Hands-On Edition: EC-Council
  • Survey Data Collection and Analytics: University of Michigan
  • Cyber Security: Data Security and Information Privacy: Macquarie University
  • Data Analysis and Interpretation: Wesleyan University
  • Cyber Security: Mobile Security: Macquarie University
  • CompTIA Cybersecurity Analyst (CySA+) CS0-003: Pearson
  • Introduction to Applied Cryptography: University of Colorado System

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Manage Cookie Preferences
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok