Filter by
The language used throughout the course, in both instruction and assessments.
39 results for "computer forensics"
Skills you'll gain: Planning, User Experience, User Research
Akamai Technologies, Inc.
Skills you'll gain: Computer Security Incident Management, Mobile Security, Network Security, Risk Management
Skills you'll gain: Computer Security Incident Management, Cyberattacks, Leadership and Management, Security Engineering, System Security
Universidad de los Andes
Skills you'll gain: Cryptography, Computer Security Incident Management, Software Security, System Software, Computer Programming, Network Architecture, Network Security, Operating Systems, Software-Defined Networking, Computer Security Models, Critical Thinking, User Experience, Exploratory Data Analysis, System Security
Skills you'll gain: Computer Security Incident Management, Leadership and Management, Security Engineering, System Security, Network Security, Risk Management, Software Security, Cyberattacks, Security Software, Security Strategy
Skills you'll gain: Computer Security Incident Management
Georgia Institute of Technology
Skills you'll gain: Leadership and Management, Supply Chain Systems, Supply Chain and Logistics, Operations Management, Strategy and Operations, Inventory Management, Planning, Transportation Operations Management, Business Analysis, Procurement, Supplier Relationship Management, Warehouse Management
Royal Holloway, University of London
Technical University of Denmark (DTU)
The University of Sydney
Skills you'll gain: Data Analysis, Data Management, Databases, Clinical Data Management, Data Visualization, Probability & Statistics, General Statistics, Human Computer Interaction, Interactive Data Visualization, Statistical Visualization
- Status: Free
Check Point Software Technologies Ltd.
Johns Hopkins University
In summary, here are 10 of our most popular computer forensics courses
- Conduct UX Research and Test Early Concepts:Â Google
- Introduction to IT Security:Â Akamai Technologies, Inc.
- In the Trenches: Security Operations Center:Â EC-Council
- Ciberseguridad:Â Universidad de los Andes
- Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery:Â ISC2
- Incident Detection and Response:Â ISC2
- Supply Chain Principles:Â Georgia Institute of Technology
- Security Management and Governance:Â Royal Holloway, University of London
- Introduction to advanced tomography:Â Technical University of Denmark (DTU)
- Using clinical health data for better healthcare:Â The University of Sydney