Digital forensics courses can help you learn data recovery, evidence analysis, and incident response techniques. You can build skills in analyzing digital footprints, conducting forensic investigations on various devices, and understanding legal implications of digital evidence. Many courses introduce tools like EnCase, FTK, and Autopsy, that support examining hard drives and mobile devices, as well as methods for documenting findings and presenting evidence in a clear, concise manner.

Skills you'll gain: Cyber Threat Intelligence, Vulnerability Assessments, Incident Response, Cybersecurity, Threat Modeling, Cyber Threat Hunting, Threat Detection, Application Security, Security Management, Intrusion Detection and Prevention, Security Controls, Malware Protection, Network Analysis
Intermediate · Course · 3 - 6 Months

Skills you'll gain: Key Management, Network Security, Digital Communications, Hardware Architecture
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Vulnerability Assessments, Vulnerability Management, Cyber Threat Intelligence, MITRE ATT&CK Framework, Cybersecurity, Endpoint Detection and Response, Intrusion Detection and Prevention, Cyber Attacks, Security Information and Event Management (SIEM), Event Monitoring, Cyber Engineering, Patch Management, Network Security, Malware Protection, Continuous Monitoring, Security Management, Cyber Risk, Digital Forensics, Risk Analysis
Intermediate · Specialization · 1 - 3 Months

Macquarie University
Skills you'll gain: AI Security, Responsible AI, Information Privacy, Personally Identifiable Information, Data Security, Anomaly Detection, Threat Modeling, Vulnerability Assessments, Cyber Security Strategy, Cyber Threat Hunting, Cybersecurity, Cyber Risk, Security Strategy, Cyber Governance, Security Awareness, Artificial Intelligence and Machine Learning (AI/ML), Security Management, Security Software, AI Product Strategy, Generative AI
Beginner · Specialization · 3 - 6 Months

LearnKartS
Skills you'll gain: Vulnerability Management, Cyber Governance, Threat Modeling, Network Security, Cyber Threat Intelligence, Malware Protection, Cyber Attacks, Governance Risk Management and Compliance, Incident Management, Hardening, Threat Detection, Security Strategy, Application Security, Mobile Security, Business Risk Management, Cyber Security Policies, Vulnerability, Security Awareness, Vulnerability Assessments, Vulnerability Scanning
Beginner · Specialization · 1 - 3 Months

Macquarie University
Skills you'll gain: Cryptography, Identity and Access Management, Information Privacy, Encryption, Personally Identifiable Information, Data Security, Authentications, User Provisioning, Cybersecurity, Threat Modeling, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Vulnerability Assessments, Cyber Attacks, Computer Security, Cyber Security Strategy, Data Management, Security Management, Cyber Risk, Security Awareness
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Operating System Administration, IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux Commands, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Linux Administration, Network Security, Network Protocols, Linux Servers, Cloud Security, Operating Systems, Responsible AI, Cyber Attacks
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Endpoint Detection and Response, Endpoint Security, Cyber Threat Hunting, Threat Detection, Malware Protection, Exploitation techniques, Cyber Security Strategy, Cybersecurity, Incident Response, AI Security, Security Engineering, Cyber Attacks, Network Security, Cyber Security Assessment, Mobile Security, ChatGPT
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Cyber Threat Hunting, Endpoint Detection and Response, Intrusion Detection and Prevention, Threat Detection, Threat Management, Cybersecurity, Security Information and Event Management (SIEM), Event Monitoring, Cyber Attacks, Cyber Security Assessment, Continuous Monitoring, Security Management, Malware Protection, Cyber Engineering, Security Testing, Cyber Governance, Linux
Intermediate · Course · 1 - 4 Weeks

Coursera
Skills you'll gain: Record Keeping, Document Management, Accounting Records, Records Management, File Management, Compliance Management, Document Control, Regulatory Requirements, Regulation and Legal Compliance, Information Architecture, Auditing, Financial Regulations, Data Security
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Computer Security Incident Management, Mitigation, Cyber Threat Hunting, Digital Forensics, Cybersecurity, Security Information and Event Management (SIEM), Intrusion Detection and Prevention, Incident Management, Criminal Investigation and Forensics, Information Systems Security, Continuous Monitoring, Cyber Attacks, Computer Security, Network Security, Analysis, Network Analysis, Linux Commands, Bash (Scripting Language), Windows PowerShell
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Digital Forensics, Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Modeling, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Security Management, Cybersecurity, Vulnerability Scanning, Cyber Security Assessment, Endpoint Detection and Response, Vulnerability Assessments
Beginner · Specialization · 3 - 6 Months