Computer forensics courses can help you learn data recovery techniques, digital evidence analysis, and incident response strategies. You can build skills in identifying cyber threats, conducting forensic investigations, and preserving digital evidence for legal proceedings. Many courses introduce tools like EnCase, FTK, and Autopsy, that support analyzing hard drives, recovering deleted files, and examining network traffic.

Skills you'll gain: Bash (Scripting Language), Operating Systems, File Systems, Linux Commands, Linux, SQL, Unix, Database Management, Command-Line Interface, Relational Databases, Authorization (Computing), Authentications, User Accounts
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Malware Protection, Exploitation techniques, Exploit development, Cyber Threat Hunting, Cyber Security Assessment, Application Security, Threat Detection, Virtual Machines, Code Review, Debugging, System Programming, Scripting, Windows PowerShell, Virtual Environment, Linux, File Management
Intermediate · Course · 1 - 3 Months

Royal Holloway, University of London
Skills you'll gain: Human Factors (Security), Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Cyber Risk, Security Awareness, Social Sciences, Culture, Psychology, Survey Creation, Research
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Cybersecurity, Cyber Threat Intelligence, Security Management, Security Awareness, Data Ethics, Data Security, Personally Identifiable Information, Technical Communication, Artificial Intelligence
Beginner · Course · 1 - 3 Months

Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Threat Detection, Event Monitoring, Threat Management, Security Information and Event Management (SIEM), Security Management, Continuous Monitoring, Document Management, NIST 800-53
Beginner · Course · 1 - 4 Weeks

University of Illinois Urbana-Champaign
Skills you'll gain: C++ (Programming Language), Data Structures, Object Oriented Programming (OOP), Object Oriented Design, Graph Theory, Development Environment, Data Storage, Engineering Software, Unstructured Data, Computer Programming, Algorithms, Data Storage Technologies, Debugging, Program Development, Database Systems, Database Theory, Network Routing, Theoretical Computer Science
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Threat Modeling, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Microsoft Windows, Exploitation techniques, Data Loss Prevention, Cyber Security Strategy, Event Monitoring, Cyber Attacks, Cybersecurity, Cyber Security Policies, Network Security, Anomaly Detection, Cyber Risk, Information Technology
Beginner · Course · 3 - 6 Months

University of Colorado Boulder
Skills you'll gain: Computer Vision, Image Analysis, Computer Graphics, Visualization (Computer Graphics), Artificial Intelligence, Data Ethics, Generative AI, Deep Learning, Applied Machine Learning, Linear Algebra, Microsoft Excel, Data Transformation, Feature Engineering, Data Manipulation
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Campus BBVA
Skills you'll gain: Computer Security Incident Management, Security Management, Cyber Risk, Data Security, Security Information and Event Management (SIEM), Cybersecurity, Cyber Attacks, Cyber Threat Intelligence, Security Strategy, Incident Management, Security Awareness, Threat Detection, Data Processing, Event Monitoring, Network Security, Data Science, Anomaly Detection, Encryption, Time Series Analysis and Forecasting
Intermediate · Course · 1 - 3 Months

Skills you'll gain: System Monitoring, Computer Security Incident Management, Network Analysis, Data Integrity
Beginner · Course · 1 - 4 Weeks

Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Cyber Security Policies, Cyber Security Strategy, Cyber Governance, Threat Detection, Human Factors (Security), Business Risk Management, Cybersecurity, Security Awareness, Enterprise Risk Management (ERM), Information Management, Computer Security Awareness Training, Mobile Security, Business Ethics, Performance Measurement, Cyber Risk
Beginner · Specialization · 3 - 6 Months

Peking University
Skills you'll gain: Microarchitecture, Computer Architecture, Computer Systems, Hardware Architecture, Computer Hardware, Data Storage, Data Storage Technologies, Computational Logic, Peripheral Devices, System Programming
Mixed · Course · 1 - 3 Months