• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Computer Forensics

Computer Forensics Courses

Computer forensics courses can help you learn data recovery techniques, digital evidence analysis, and incident response strategies. You can build skills in identifying cyber threats, conducting forensic investigations, and preserving digital evidence for legal proceedings. Many courses introduce tools like EnCase, FTK, and Autopsy, that support analyzing hard drives, recovering deleted files, and examining network traffic.


Popular Computer Forensics Courses and Certifications


  • U

    University of Colorado System

    Introduction to Cybersecurity for Business

    Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Risk Management, Enterprise Security, Cyber Security Assessment, Vulnerability Assessments, Encryption, Data Security, Information Assurance, Authentications, Network Protocols

    4.7
    Rating, 4.7 out of 5 stars
    ·
    1.1K reviews

    Beginner · Course · 1 - 3 Months

  • U

    University of London

    Introduction to Computer Security

    Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Vulnerability Assessments, Hardware Architecture, Application Security, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, Authentications, Network Monitoring, TCP/IP, Network Analysis

    4.8
    Rating, 4.8 out of 5 stars
    ·
    44 reviews

    Beginner · Course · 1 - 4 Weeks

  • I

    Infosec

    Stages of Incident Response

    Skills you'll gain: Incident Response, Computer Security Incident Management, Threat Management, Incident Management, Disaster Recovery, Cybersecurity, Cyber Threat Hunting, Threat Detection, Event Monitoring, Digital Forensics, Business Continuity, Verification And Validation, Technical Communication

    4.6
    Rating, 4.6 out of 5 stars
    ·
    73 reviews

    Beginner · Course · 1 - 3 Months

  • P

    Packt

    Incident Response, Risk Management, and Compliance

    Skills you'll gain: Digital Forensics, Risk Management, Incident Response, Threat Management, Risk Analysis, Business Risk Management, Cyber Security Policies, Secure Coding, Cybersecurity, Computer Security Incident Management, Cyber Security Assessment, Application Security, ISO/IEC 27001, Data Security, Malware Protection, Penetration Testing, Security Controls, Threat Detection, Compliance Management, Governance

    4.3
    Rating, 4.3 out of 5 stars
    ·
    8 reviews

    Intermediate · Course · 1 - 3 Months

  • P

    Packt

    Information Technology and Security Principles

    4.9
    Rating, 4.9 out of 5 stars
    ·
    19 reviews

    Intermediate · Course · 1 - 4 Weeks

  • C

    Coursera

    Wireshark for Security: Detect Network Anomalies

    Skills you'll gain: Threat Detection, Anomaly Detection, Network Security, General Networking, Network Monitoring, Network Troubleshooting, Real Time Data, Security Strategy, Network Analysis, Network Protocols, Data Capture

    4.1
    Rating, 4.1 out of 5 stars
    ·
    8 reviews

    Intermediate · Guided Project · Less Than 2 Hours

  • U

    Universidades Anáhuac

    Digital Shield: Cybersecurity for Data and System Protection

    Skills you'll gain: Cybersecurity, Cyber Attacks, Information Systems Security, Data Security, Malware Protection, Computer Security Awareness Training, Security Controls, Intrusion Detection and Prevention, Vulnerability Assessments, Threat Detection, Network Security, Security Awareness, Security Strategy, Encryption

    Intermediate · Course · 1 - 3 Months

  • P

    Packt

    Handling Security Incidents Across Domains

    Skills you'll gain: Email Security, Incident Response, Computer Security Incident Management, Malware Protection, Cybersecurity, Network Security, Intrusion Detection and Prevention, Cyber Security Strategy, Threat Detection, Distributed Denial-Of-Service (DDoS) Attacks, Wireless Networks

    Intermediate · Course · 1 - 4 Weeks

  • K

    Kennesaw State University

    Cybersecurity: Protecting your Information on the Go

    Skills you'll gain: Wireless Networks, Mobile Security, General Networking, Proxy Servers, Network Security, Cybersecurity, Virtual Private Networks (VPN), Security Awareness, Information Privacy, Emerging Technologies

    4.9
    Rating, 4.9 out of 5 stars
    ·
    9 reviews

    Beginner · Course · 1 - 3 Months

  • P

    Packt

    Advanced Incident Handling and Analysis Techniques

    Skills you'll gain: Cloud Security, Intrusion Detection and Prevention, Email Security, Incident Response, Application Security, Computer Security Incident Management, Cyber Attacks, Infrastructure Security, Cyber Threat Intelligence, Threat Detection, Web Applications, Malware Protection, Network Security, Threat Management, Security Information and Event Management (SIEM), Network Monitoring, Data Security, Digital Forensics

    Intermediate · Course · 1 - 4 Weeks

  • P

    Packt

    Systems Acquisition, Development and Implementation

    Skills you'll gain: Systems Development Life Cycle, Software Development Life Cycle, Systems Development, Software Development Methodologies, Change Management, Project Management, System Implementation, Compliance Auditing, Software Testing, Auditing, Development Testing, Information Technology, Verification And Validation, Project Management Office (PMO), Internal Controls, Governance, Agile Methodology, Software Development, Data Integrity, Risk Management

    4.9
    Rating, 4.9 out of 5 stars
    ·
    7 reviews

    Intermediate · Course · 1 - 4 Weeks

  • U

    University of Colorado Boulder

    Security & Ethical Hacking: Attacking Unix and Windows

    Skills you'll gain: Penetration Testing, Exploitation techniques, Cyber Security Assessment, Unix, Vulnerability Assessments, Unix Commands, Unix Shell, System Programming, Shell Script, Linux, Debugging, Linux Commands, Computer Architecture, Authentications

    Build toward a degree

    Intermediate · Course · 1 - 3 Months

1…789…672

In summary, here are 10 of our most popular computer forensics courses

  • Introduction to Cybersecurity for Business: University of Colorado System
  • Introduction to Computer Security: University of London
  • Stages of Incident Response: Infosec
  • Incident Response, Risk Management, and Compliance: Packt
  • Information Technology and Security Principles: Packt
  • Wireshark for Security: Detect Network Anomalies: Coursera
  • Digital Shield: Cybersecurity for Data and System Protection: Universidades Anáhuac
  • Handling Security Incidents Across Domains: Packt
  • Cybersecurity: Protecting your Information on the Go: Kennesaw State University
  • Advanced Incident Handling and Analysis Techniques: Packt

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok