• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Computer Forensics

Computer Forensics Courses

Computer forensics courses can help you learn data recovery techniques, digital evidence analysis, and incident response strategies. You can build skills in identifying cyber threats, conducting forensic investigations, and preserving digital evidence for legal proceedings. Many courses introduce tools like EnCase, FTK, and Autopsy, that support analyzing hard drives, recovering deleted files, and examining network traffic.


Popular Computer Forensics Courses and Certifications


  • Status: Free Trial
    Free Trial
    I

    Infosec

    Digital Forensics Concepts

    Skills you'll gain: Digital Forensics, Cybersecurity, TCP/IP, Network Protocols, Information Systems Security, General Networking, Record Keeping, Data Integrity, File Management, Ethical Standards And Conduct, Encryption

    4.7
    Rating, 4.7 out of 5 stars
    ·
    267 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Essentials

    4.7
    Rating, 4.7 out of 5 stars
    ·
    26 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Windows Registry Forensics

    Skills you'll gain: Digital Forensics, Microsoft Windows, Data Analysis Software, User Accounts, USB, File Systems, System Configuration, Software Installation, Operating Systems, System Support

    4.7
    Rating, 4.7 out of 5 stars
    ·
    67 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Mobile Security

    4.6
    Rating, 4.6 out of 5 stars
    ·
    14 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Preview
    Preview
    S

    Starweaver

    Legal and Ethical Cyber Investigations

    Skills you'll gain: Digital Forensics, Electronic Discovery, Investigation, Criminal Investigation and Forensics, Incident Response, Cyber Threat Intelligence, Technical Communication, Computer Security Incident Management, Report Writing, Cybersecurity, Cyber Security Policies, Fraud detection, Legal Proceedings, Law, Regulation, and Compliance, Ethical Standards And Conduct, Business Ethics, Compliance Reporting, Data Collection, Analysis, Management Reporting

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Incident Response - Theory to Practice

    4.9
    Rating, 4.9 out of 5 stars
    ·
    10 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of California, Irvine

    Computer Hardware and Software

    Skills you'll gain: Network Security, Computer Hardware, Computer Systems, TCP/IP, Information Technology, General Networking, Computer Literacy, Network Protocols, Operating Systems, Computer Networking, Software Systems, File Systems

    4.6
    Rating, 4.6 out of 5 stars
    ·
    271 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Essential Aspects of Software, Hardware, and Data Backup

    Skills you'll gain: Cybersecurity, Application Security, Information Systems Security, Software Installation, System Configuration, Data Management, Computer Hardware, Data Security, Hardware Architecture, Data Storage, Information Technology Operations, Microsoft Windows, Firewall, Disaster Recovery, Encryption, Role-Based Access Control (RBAC), Identity and Access Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    157 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    R

    Royal Holloway, University of London

    Cyber Security – Technology and Governance

    Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, IT Security Architecture, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Computer Networking, Cybersecurity, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks

    4.8
    Rating, 4.8 out of 5 stars
    ·
    206 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Introduction to Intrusion Detection Systems (IDS)

    Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Endpoint Detection and Response, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Anomaly Detection, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Network Analysis

    4.9
    Rating, 4.9 out of 5 stars
    ·
    7 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    R

    Royal Holloway, University of London

    Cybercrime

    Skills you'll gain: Human Factors (Security), Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Security Awareness, Social Sciences, Exploitation techniques, Culture, Psychology, Survey Creation, Research

    4.8
    Rating, 4.8 out of 5 stars
    ·
    118 reviews

    Beginner · Course · 1 - 4 Weeks

  • I

    ISC2

    Incident Response and Recovery

    Skills you'll gain: Incident Response, Disaster Recovery, Computer Security Incident Management, Business Continuity, Security Management, Cybersecurity, Investigation, Threat Detection, Contingency Planning, Digital Forensics

    4.6
    Rating, 4.6 out of 5 stars
    ·
    50 reviews

    Beginner · Course · 1 - 4 Weeks

1…456…680

In summary, here are 10 of our most popular computer forensics courses

  • Digital Forensics Concepts: Infosec
  • Cyber Security: Essentials: Macquarie University
  • Windows Registry Forensics: Infosec
  • Cyber Security: Mobile Security: Macquarie University
  • Legal and Ethical Cyber Investigations : Starweaver
  • Cyber Security: Incident Response - Theory to Practice: Macquarie University
  • Computer Hardware and Software: University of California, Irvine
  • Essential Aspects of Software, Hardware, and Data Backup: Microsoft
  • Cyber Security – Technology and Governance: Royal Holloway, University of London
  • Introduction to Intrusion Detection Systems (IDS): Johns Hopkins University

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok