Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "criminal investigation and forensics"
Skills you'll gain: Penetration Testing, Network Protocols, Network Security, Network Analysis, Malware Protection, Cyber Security Assessment, Cyber Threat Intelligence, Vulnerability Assessments, System Configuration, Image Analysis, Open Source Technology, Virtual Machines, Linux, Software Installation, Microsoft Windows
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Network Analysis, Document Management, Technical Documentation, Record Keeping
Skills you'll gain: Cloud Infrastructure, Kubernetes, Google Cloud Platform, Identity and Access Management, Infrastructure As A Service (IaaS), Application Deployment, Containerization, Cloud Applications, Cloud Computing, CI/CD, Cloud Computing Architecture, Cloud Security, Cloud Management, Load Balancing, Service Level Agreement, Infrastructure as Code (IaC), Virtual Machines, Microservices, Service Level, Network Planning And Design
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
Kennesaw State University
Skills you'll gain: Cyber Security Strategy, Cybersecurity, Mobile Security, Cyber Threat Intelligence, Network Security, Internet Of Things, Data Security, Cyber Risk, Emerging Technologies, Business Technologies, Identity and Access Management, Business
DeepLearning.AI
Skills you'll gain: Supervised Learning, Applied Machine Learning, Jupyter, Scikit Learn (Machine Learning Library), Machine Learning, NumPy, Predictive Modeling, Feature Engineering, Artificial Intelligence, Classification And Regression Tree (CART), Python Programming, Regression Analysis, Unsupervised Learning, Statistical Modeling, Data-Driven Decision-Making, Algorithms
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Management, Security Information and Event Management (SIEM), Data Integrity
- Status: Free
Stanford University
Skills you'll gain: Cooking, Preventative Care, Food and Beverage, Behavioral Health, Socioeconomics, Education and Training, Culture, Environmental Issue
- Status: AI skills
Skills you'll gain: NoSQL, Data Warehousing, SQL, Apache Hadoop, Extract, Transform, Load, Apache Airflow, Web Scraping, Linux Commands, Database Design, IBM Cognos Analytics, MySQL, Apache Spark, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Jupyter, Generative AI, Professional Networking
Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Cyber Threat Hunting, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Network Security, Network Monitoring, Data Security, Network Analysis, Malware Protection, Vulnerability Assessments, Operating Systems, OS Process Management
- Status: Free
Infosec
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Detection, Threat Modeling, MITRE ATT&CK Framework, Endpoint Detection and Response, Cybersecurity, Malware Protection, Security Information and Event Management (SIEM), Anomaly Detection, Generative AI, Network Analysis
Kennesaw State University
Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Cryptography, Cyber Security Assessment, Cyber Risk, Secure Coding, Systems Development Life Cycle, Security Controls, Cyber Security Policies, Infrastructure Security, Security Awareness, Identity and Access Management
In summary, here are 10 of our most popular criminal investigation and forensics courses
- Digital Forensics for Pentesters - Hands-On Learning: Packt
- Sound the Alarm: Detection and Response: Google
- Preparing for Google Cloud Certification: Cloud Architect: Google Cloud
- Penetration Testing, Threat Hunting, and Cryptography: IBM
- Cybersecurity and Mobility: Kennesaw State University
- Supervised Machine Learning: Regression and Classification : DeepLearning.AI
- Incident Response and Digital Forensics: IBM
- Stanford Introduction to Food and Health: Stanford University
- IBM Data Engineering: IBM
- Technical Deep Dive with Incident Response Tools: Infosec