Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "criminal investigation and forensics"
University of Illinois Urbana-Champaign
Skills you'll gain: Medical Science and Research, Criminal Investigation and Forensics, Law, Regulation, and Compliance, Information Privacy, Life Sciences, General Science and Research, Health Care Procedure and Regulation, Ethical Standards And Conduct, Regulatory Compliance
Skills you'll gain: SQL, Web Scraping, Database Design, MySQL, Data Transformation, IBM DB2, Extract, Transform, Load, Relational Databases, Data Architecture, Jupyter, Data Pipelines, Big Data, Database Management, Data Warehousing, Data Governance, Databases, Stored Procedure, Data Manipulation, Automation, Python Programming
Kennesaw State University
Skills you'll gain: Cyber Security Strategy, Cybersecurity, Mobile Security, Cyber Threat Intelligence, Network Security, Internet Of Things, Data Security, Cyber Risk, Emerging Technologies, Business Technologies, Identity and Access Management, Business
Skills you'll gain: Computer Networking, Network Troubleshooting, TCP/IP, Network Architecture, Routing Protocols, Network Protocols, OSI Models, Network Infrastructure, Dynamic Host Configuration Protocol (DHCP), Virtual Private Networks (VPN), Network Security, Wireless Networks
Johns Hopkins University
Skills you'll gain: Epidemiology, Infectious Diseases, Risk Analysis, Investigation, Biostatistics, Emergency Response, Research, Statistical Analysis, Mathematical Modeling, Report Writing
Skills you'll gain: Data Storytelling, Data Presentation, Data Visualization, Interactive Data Visualization, Big Data, Data Visualization Software, Data Analysis, IBM Cognos Analytics, Statistical Analysis, Data Mining, Dashboard, Apache Hadoop, Data Collection, Tree Maps, Excel Formulas, Apache Hive, Microsoft Excel, Data Quality, Data Cleansing, Data Import/Export
Skills you'll gain: Spreadsheet Software, Stakeholder Communications, Dashboard, Stakeholder Management, Data-Driven Decision-Making, Data Analysis, Analytical Skills, Data Presentation, Business Analysis, Quantitative Research, Systems Thinking
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
- Status: Free
West Virginia University
Skills you'll gain: Internal Controls, Financial Controls, Threat Detection, Anomaly Detection, Financial Auditing, Cybersecurity, Financial Data, Investigation, Analytics, Specialized Accounting, Advanced Analytics, Security Awareness, Big Data, Business Ethics, Analysis, Compliance Reporting, Data Analysis Software, Ethical Standards And Conduct
- Status: Free
Infosec
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Detection, Threat Modeling, MITRE ATT&CK Framework, Endpoint Detection and Response, Cybersecurity, Malware Protection, Security Information and Event Management (SIEM), Anomaly Detection, Generative AI, Network Analysis
- Status: Free
Yale University
Skills you'll gain: Investment Banking, Risk Management, Financial Market, Financial Regulation, Financial Services, Finance, Business Risk Management, Securities (Finance), Financial Policy, Capital Markets, Behavioral Economics, Banking, Corporate Finance, Governance, Insurance, Underwriting, Equities, Derivatives, Mortgage Loans, Decision Making
- Status: Free
The State University of New York
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Policies, Cybersecurity, International Relations, Cyber Risk, Cyber Operations, Cyber Governance, Infrastructure Security, Law, Regulation, and Compliance, Security Management, Political Sciences, Media and Communications, Computer Networking, Psychology
In summary, here are 10 of our most popular criminal investigation and forensics courses
- Genomics for Law: University of Illinois Urbana-Champaign
- Data Engineering Foundations: IBM
- Cybersecurity and Mobility: Kennesaw State University
- The Bits and Bytes of Computer Networking: Google
- Outbreaks and Epidemics: Johns Hopkins University
- Data Analysis and Visualization Foundations: IBM
- Ask Questions to Make Data-Driven Decisions: Google
- Penetration Testing, Threat Hunting, and Cryptography: IBM
- Forensic Accounting and Fraud Examination: West Virginia University
- Cyber Threat Hunting: Infosec