Computer forensics courses can help you learn data recovery techniques, digital evidence analysis, and incident response strategies. You can build skills in identifying cyber threats, conducting forensic investigations, and preserving digital evidence for legal proceedings. Many courses introduce tools like EnCase, FTK, and Autopsy, that support analyzing hard drives, recovering deleted files, and examining network traffic.

Macquarie University
Skills you'll gain: Mobile Security, Criminal Investigation and Forensics, Investigation, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Attacks, Intrusion Detection and Prevention, Cybersecurity, Mobile Development, Cyber Security Policies, Apple iOS, Artificial Intelligence and Machine Learning (AI/ML), Cyber Governance, Data Security, Threat Modeling, Android (Operating System), Application Security, Computer Security, Legal Proceedings, Machine Learning Methods
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Digital Forensics, Penetration Testing, Network Security, Threat Management, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Vulnerability Assessments, Public Key Infrastructure, Cryptography, Security Controls, Vulnerability Scanning, Cybersecurity, Authorization (Computing), Malware Protection, Authentications, Identity and Access Management, Cyber Attacks, Threat Detection, Data Integrity
Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Incident Response, Computer Security Incident Management, Mitigation, Cyber Threat Hunting, Digital Forensics, Cybersecurity, Security Information and Event Management (SIEM), Intrusion Detection and Prevention, Incident Management, Criminal Investigation and Forensics, Information Systems Security, Continuous Monitoring, Cyber Attacks, Computer Security, Network Security, Analysis, Network Analysis, Linux Commands, Bash (Scripting Language), Windows PowerShell
Mixed · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Image Analysis, Computer Vision, Autoencoders, Convolutional Neural Networks, Vision Transformer (ViT), Generative Adversarial Networks (GANs), Recurrent Neural Networks (RNNs), Deep Learning, Multimodal Prompts, Artificial Intelligence and Machine Learning (AI/ML), Computer Graphics, Visualization (Computer Graphics), Machine Learning Methods, Model Deployment, Embeddings, Artificial Intelligence, Data Ethics, Data Processing, Applied Machine Learning, Linear Algebra
Build toward a degree
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Information Systems Security, Intrusion Detection and Prevention, Endpoint Security, Network Infrastructure, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
Intermediate · Course · 1 - 3 Months

Packt
Skills you'll gain: Incident Response, Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Threat Detection, Risk Management, Cybersecurity, Computer Security Incident Management, Secure Coding, Cyber Security Assessment, Incident Management, Security Testing, Cyber Governance, Intrusion Detection and Prevention, Risk Management Framework, Cyber Threat Intelligence, Network Infrastructure, Network Security, Security Information and Event Management (SIEM)
Intermediate · Specialization · 1 - 4 Weeks

Princeton University
Skills you'll gain: Microarchitecture, Computer Architecture, Hardware Architecture, Computer Systems, Computer Engineering, Distributed Computing, Operating Systems, Performance Tuning, Scalability
Advanced · Course · 3 - 6 Months

University of Cambridge
Skills you'll gain: Criminal Investigation and Forensics, Investigation, Laboratory Testing, Statistical Analysis, Molecular Biology, Specimen Collection, Scientific Methods, Medical Science and Research, General Science and Research, Data Collection, Case Studies, Biology, Ethical Standards And Conduct
Beginner · Course · 1 - 3 Months

Skills you'll gain: Bash (Scripting Language), Operating Systems, File Systems, Linux Commands, Linux, SQL, Unix, Database Management, Command-Line Interface, Relational Databases, Authorization (Computing), Authentications, User Accounts
Beginner · Course · 1 - 4 Weeks

University of California, Irvine
Skills you'll gain: Systems Development, Systems Development Life Cycle, Agile Methodology, Productivity Software, digital literacy, Network Security, Computer Hardware, Computer Systems, Data Security, Risk Management, System Design and Implementation, TCP/IP, Information Technology, Software Development Methodologies, Data Ethics, Cybersecurity, General Networking, Productivity, Safety and Security, Process Design
Beginner · Specialization · 1 - 3 Months

University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques, Software Design Patterns
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Threat Detection, Event Monitoring, Security Information and Event Management (SIEM), Incident Management, Security Management, Continuous Monitoring, Network Security, Network Monitoring, Splunk, Network Analysis, TCP/IP, Network Protocols, Query Languages
Beginner · Course · 1 - 4 Weeks