Computer forensics courses can help you learn data recovery techniques, digital evidence analysis, and incident response strategies. You can build skills in identifying cyber threats, conducting forensic investigations, and preserving digital evidence for legal proceedings. Many courses introduce tools like EnCase, FTK, and Autopsy, that support analyzing hard drives, recovering deleted files, and examining network traffic.

Skills you'll gain: File Management, OS Process Management, Linux, Linux Servers, Data Security, Linux Commands, Information Systems Security, System Monitoring, Data Storage Technologies, Network Security, Vulnerability Scanning, Data Storage, Encryption, Network Analysis
Intermediate · Course · 1 - 4 Weeks
Skills you'll gain: Microsoft Copilot, Generative AI, Cloud Management, Data Ethics, Microsoft Azure, Responsible AI, Cloud Computing Architecture, OpenAI, Business Process Automation, Cloud Security, Cloud Deployment, Scalability, Azure DevOps, AI Workflows, DevOps, Automation, Artificial Intelligence, Anomaly Detection
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Threat Management, MITRE ATT&CK Framework, Cybersecurity, Google Gemini, AI Security, Incident Response, Continuous Monitoring, Vulnerability Assessments, Digital Forensics, Real Time Data
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Large Language Modeling, Natural Language Processing, Model Evaluation, Recurrent Neural Networks (RNNs), Transfer Learning, PyTorch (Machine Learning Library), Artificial Neural Networks, Artificial Intelligence and Machine Learning (AI/ML), Deep Learning, Machine Learning
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Kubernetes, Containerization, Test Case, YAML, Scenario Testing, Command-Line Interface, Linux Commands, Solution Design, Scalability, Network Infrastructure
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Multi-Factor Authentication, Network Security, Application Security, Patch Management, Network Monitoring, Data Security, Authentications, Malware Protection, Mobile Security, Authorization (Computing), Identity and Access Management
Intermediate · Course · 1 - 4 Weeks

University of Virginia
Skills you'll gain: Model View Controller, Debugging, Software Design, User Interface and User Experience (UI/UX) Design, User Interface (UI), UI Components, Web Applications, Algorithms, JSON, Program Development, User Story, Javascript, Event-Driven Programming, Automation, Data Structures
Beginner · Course · 1 - 4 Weeks
Skills you'll gain: Amazon Bedrock, Cloud Computing Architecture, AI Workflows, Generative AI, Amazon Web Services, Cloud Computing, Applied Machine Learning, Amazon CloudWatch, AWS Identity and Access Management (IAM), Performance Tuning, Scalability
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Exploitation techniques, Brute-force attacks, Cyber Security Assessment, Intrusion Detection and Prevention, Network Security, Remote Access Systems, Network Protocols, Command-Line Interface, Network Analysis
Mixed · Course · 1 - 4 Weeks

Skills you'll gain: Apache Hadoop, Apache Hive, Big Data, Database Design, Extensible Markup Language (XML), Databases, JSON, Data Processing, Data Warehousing, Distributed Computing, Data Analysis, Scalability, Case Studies, Analytics, Data Pipelines, Query Languages, Social Media, Data Cleansing, Data Integration, Social Media Content
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Google Gemini, Generative AI, Multimodal Prompts, Google Cloud Platform, Image Analysis, Analysis, Unstructured Data, Data Analysis
Beginner · Project · Less Than 2 Hours

Skills you'll gain: Cloud Security, Oracle Cloud, Identity and Access Management, Encryption, Infrastructure Security, Network Security, Data Security, Continuous Monitoring, Cloud Computing, Cloud Infrastructure, Security Strategy, Threat Detection, Data Encryption Standard, Cloud Computing Architecture, Authorization (Computing), Authentications
Intermediate · Course · 1 - 4 Weeks