Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "forensic investigations"
Skills you'll gain: Malware Protection, Cyber Threat Hunting, Application Security, Cybersecurity, Threat Detection, Virtual Machines, Code Review, Debugging, System Programming, Windows PowerShell, Virtualization, Operating Systems, Programming Principles, Computer Architecture, Linux
- Status: Free
University of Manchester
Skills you'll gain: Experimentation, Quantitative Research, Vibrations, General Science and Research, Simulation and Simulation Software, Physical Science, Systems Of Measurement
Google Cloud
Skills you'll gain: Looker (Software), Dashboard, Data Visualization Software, Data Analysis, Data Sharing, Data Presentation, Data Storytelling, Data Manipulation, Data Import/Export
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Security Management, Penetration Testing, Cybersecurity, Authentications, Vulnerability Assessments, Encryption, Firewall, Identity and Access Management, Hardening, Threat Detection, Disaster Recovery, Multi-Factor Authentication, Public Key Infrastructure, Mobile Security, Wireless Networks
Infosec
Skills you'll gain: Criminal Investigation and Forensics, Cybersecurity, TCP/IP, Network Protocols, Information Systems Security, Data Ethics, General Networking, Record Keeping, Data Integrity, File Management, Ethical Standards And Conduct, Encryption, Technical Writing, Linux Commands
Skills you'll gain: Incident Response, Disaster Recovery, Computer Security Incident Management, Business Continuity, Cybersecurity, Cyber Security Policies, Investigation, Event Monitoring, Threat Detection, Contingency Planning, Communication Planning
Johns Hopkins University
Skills you'll gain: Exploratory Data Analysis, Data Visualization, Ggplot2, Dimensionality Reduction, Data Visualization Software, R Programming, Graphing, Data Storytelling, Data Analysis, Statistical Analysis, Unsupervised Learning, Statistical Methods
Wesleyan University
Skills you'll gain: Regression Analysis, Data Storytelling, Classification And Regression Tree (CART), Statistical Hypothesis Testing, Descriptive Statistics, Data Presentation, Statistical Analysis, Statistical Software, Correlation Analysis, Exploratory Data Analysis, Data Manipulation, Decision Tree Learning, Data Management, Statistical Machine Learning, Statistical Programming, Data Analysis, Random Forest Algorithm, Research Reports, SAS (Software), Statistical Modeling
Johns Hopkins University
Skills you'll gain: Anatomy, Radiology, Experimentation, Research Design, Psychology, Image Analysis, Science and Research, Scientific Methods, Qualitative Research, Medical Science and Research, Medical Terminology, Quantitative Research, Statistical Analysis
Skills you'll gain: Splunk, Dashboard, Data Transformation, Data Analysis, Statistical Analysis, Pivot Tables And Charts, Query Languages, Data Visualization Software, Stored Procedure, Ad Hoc Reporting, Event Monitoring, Continuous Monitoring
Skills you'll gain: Incident Response, Penetration Testing, Computer Security Incident Management, Cybersecurity, Security Management, Threat Detection, Vulnerability Assessments, Threat Modeling, Security Awareness, Cyber Attacks, Malware Protection, Email Security, Vulnerability Management, Artificial Intelligence
In summary, here are 10 of our most popular forensic investigations courses
- Malware Analysis and Introduction to Assembly Language:Â IBM
- Introduction to Molecular Spectroscopy:Â University of Manchester
- Analyzing and Visualizing Data in Looker:Â Google Cloud
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM
- Introduction to IT Security:Â Akamai Technologies, Inc.
- Digital Forensics Concepts:Â Infosec
- Incident Response and Recovery:Â ISC2
- Exploratory Data Analysis:Â Johns Hopkins University
- Data Analysis and Interpretation:Â Wesleyan University
- Fundamental Neuroscience for Neuroimaging:Â Johns Hopkins University