Computer forensics courses can help you learn data recovery techniques, digital evidence analysis, and incident response strategies. You can build skills in identifying cyber threats, conducting forensic investigations, and preserving digital evidence for legal proceedings. Many courses introduce tools like EnCase, FTK, and Autopsy, that support analyzing hard drives, recovering deleted files, and examining network traffic.

Packt
Skills you'll gain: Incident Response, Threat Modeling, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Threat Detection, Risk Management, Cybersecurity, Computer Security Incident Management, Secure Coding, Cyber Security Assessment, Incident Management, Security Testing, MITRE ATT&CK Framework, Systems Development Life Cycle, Cyber Governance, Intrusion Detection and Prevention, Cyber Threat Intelligence, Cyber Attacks, Network Infrastructure
★ 4.6 (16) · Intermediate · Specialization · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Identity and Access Management, Cryptography, AWS Identity and Access Management (IAM), Data Security, Authentications, Threat Detection, Cybersecurity, Encryption, Network Security, Data Management, Azure Active Directory, Security Controls, Cyber Attacks, Cyber Security Strategy, Cyber Governance, Key Management, Security Management, Cyber Risk, Computer Security, Security Awareness
★ 4.4 (11) · Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Incident Response, Security Information and Event Management (SIEM), Threat Management, Cybersecurity, Computer Security Incident Management, IT Security Architecture, Cloud Security, Security Architecture Review, Cyber Risk, Cyber Security Policies, Data Security, Network Security, Cyber Security Strategy, Personally Identifiable Information, Malware Protection, Risk Management
★ 4.7 (6) · Beginner · Specialization · 1 - 4 Weeks

Skills you'll gain: Incident Response, Vulnerability Assessments, Vulnerability Management, Cyber Threat Intelligence, MITRE ATT&CK Framework, Cyber Security Strategy, Cybersecurity, Endpoint Detection and Response, Intrusion Detection and Prevention, Security Testing, IT Security Architecture, Cyber Attacks, Security Information and Event Management (SIEM), Cyber Engineering, Patch Management, Network Security, Malware Protection, Security Management, Digital Forensics, Risk Analysis
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Digital Forensics, Penetration Testing, Network Security, Threat Management, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Security Testing, Cryptography, Security Controls, Cryptographic Protocols, Cyber Security Assessment, Cybersecurity, Authorization (Computing), Cloud Computing, Malware Protection, Cyber Attacks, Data Integrity
★ 4.6 (804) · Beginner · Specialization · 3 - 6 Months

MathWorks
Skills you'll gain: Computer Vision, Model Evaluation, Image Analysis, Model Deployment, Anomaly Detection, Convolutional Neural Networks, Transfer Learning, Model Training, Fine-tuning, Deep Learning, Machine Learning Methods, Image Quality, Generative AI, Data Preprocessing, Artificial Neural Networks, Matlab, Applied Machine Learning, Machine Learning, Classification Algorithms, Software Visualization
★ 4.7 (365) · Beginner · Professional Certificate · 3 - 6 Months

Skills you'll gain: Bash (Scripting Language), Operating Systems, File Systems, Linux Commands, Linux, SQL, Linux Administration, Unix Commands, File Management, Unix Shell, Query Languages, Database Management, Command-Line Interface, Relational Databases, Authorization (Computing), Authentications, User Accounts
★ 4.8 (6.2K) · Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Risk Analysis, Computer Security Incident Management, Metasploit, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Data Security, Authentications, Security Testing, Cloud Security, Security Strategy, Threat Management, Endpoint Detection and Response, Incident Management, Risk Management, Cyber Attacks
★ 4.7 (1.9K) · Beginner · Specialization · 3 - 6 Months

Skills you'll gain: Networking Hardware, Network Security, TCP/IP, Network Protocols, Network Administration, Endpoint Security, Routing Protocols, Network Routing, Cybersecurity, Endpoint Detection and Response, Cyber Threat Intelligence, Firewall, Network Infrastructure, Network Architecture, Intrusion Detection and Prevention, Local Area Networks, General Networking, Dynamic Host Configuration Protocol (DHCP), Network Routers, Data Loss Prevention
★ 4.7 (3.5K) · Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Information Systems Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Encryption, Exploit development, Advanced Encryption Standard (AES), Cryptographic Protocols, Intrusion Detection and Prevention, Metasploit, Application Security, Security Testing, Cyber Security Policies, Security Controls
★ 4 (599) · Intermediate · Specialization · 3 - 6 Months

University of California, Irvine
Skills you'll gain: Systems Development, Systems Development Life Cycle, Agile Methodology, Software Development Life Cycle, Productivity Software, Risk Management Framework, digital literacy, Systems Design, Network Security, Computer Hardware, Agile Project Management, Hardware Architecture, Agile Software Development, Computer Systems, Data Security, Risk Management, System Design and Implementation, TCP/IP, Information Technology, Productivity
★ 4.6 (340) · Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Threat Detection, Event Monitoring, Security Information and Event Management (SIEM), Incident Management, Cyber Threat Intelligence, Continuous Monitoring, Security Controls, Network Security, Network Monitoring, Splunk, Network Analysis, TCP/IP, Network Protocols, Document Management, Query Languages
★ 4.8 (3.4K) · Beginner · Course · 1 - 4 Weeks