Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "criminal investigation and forensics"
- Status: NewStatus: Free Trial
Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Threat Management, Cloud Security, MITRE ATT&CK Framework, Cybersecurity, Cyber Attacks, Real-Time Operating Systems, Internet Of Things, Infrastructure Security, Network Security
- Status: Free Trial
Skills you'll gain: Operating System Administration, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux Commands, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Linux Administration, Network Security, Network Protocols, Linux Servers, Computer Security Incident Management, Cloud Security, Data Ethics, Cyber Attacks
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Network Security, Network Analysis, Network Protocols, Open Source Technology
- Status: NewStatus: Free Trial
Skills you'll gain: MITRE ATT&CK Framework, Incident Response, Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Computer Security Incident Management, Threat Detection, Cybersecurity, Mobile Security
- Status: Free Trial
Skills you'll gain: Penetration Testing, Network Security, Threat Modeling, Mobile Security, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Threat Detection, Cybersecurity, Authorization (Computing), Security Awareness, Cloud Computing, Encryption, Malware Protection, Intrusion Detection and Prevention, Identity and Access Management, Cyber Attacks, Data Integrity
- Status: NewStatus: Preview
Skills you'll gain: Investigation, Fraud detection, Auditing, Litigation Support, Accounting, Report Writing, Threat Detection, Employee Training, Financial Statements, Internal Controls, Risk Analysis, International Finance, Compliance Training, Case Studies
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Responsible AI, Network Routing, Infrastructure Security, Application Security, Information Systems Security
- Status: NewStatus: Free Trial
Skills you'll gain: Computer Security Incident Management, Security Management, Data Security, Data Integrity
- Status: Preview
University of Pennsylvania
Skills you'll gain: Civil Procedures, Civil Law, Commercial Laws, Lawsuits, Court Systems, Legal Proceedings, Legal Strategy, Legal Research, Case Law, Law, Regulation, and Compliance, Criminal Investigation and Forensics, Case Studies, Governance
- Status: NewStatus: Free Trial
Skills you'll gain: Network Monitoring, Network Troubleshooting, Network Security, Incident Response, Anomaly Detection, Network Analysis, Cyber Security Assessment, Network Protocols, Threat Detection, Technical Communication, Distributed Denial-Of-Service (DDoS) Attacks, Computer Security, Cybersecurity, Vulnerability Assessments
- Status: Free Trial
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Cybersecurity, Cyber Threat Hunting, Continuous Monitoring, Network Security, Network Monitoring, Document Management, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
- Status: NewStatus: Preview
Skills you'll gain: Data Mapping, Extract, Transform, Load, Data Validation, Workflow Management, JSON, Fraud detection, Extensible Markup Language (XML), Metadata Management, Process Design, Data Integration, Data Cleansing, Data Warehousing, Data Transformation, Data Pipelines, Data Processing, Data Integrity, Anomaly Detection, Data Modeling
In summary, here are 10 of our most popular criminal investigation and forensics courses
- Cybersecurity Prevention and Detection: Unit 1: Pearson
- IT Fundamentals for Cybersecurity: IBM
- Certified Ethical Hacker (CEH): Unit 2: Pearson
- Practical Cybersecurity Fundamentals: Unit 2: Pearson
- Cybersecurity Attack and Defense Fundamentals: EC-Council
- Forensic Accounting: Detect, Investigate & Prevent Fraud: EDUCBA
- Information Assurance Analysis: Johns Hopkins University
- CompTIA Cybersecurity Analyst (CySA+) CS0-003: Unit 3: Pearson
- An Introduction to American Law: University of Pennsylvania
- Network Traffic Analysis with Wireshark: SkillUp