Computer forensics courses can help you learn data recovery techniques, digital evidence analysis, and incident response strategies. You can build skills in identifying cyber threats, conducting forensic investigations, and preserving digital evidence for legal proceedings. Many courses introduce tools like EnCase, FTK, and Autopsy, that support analyzing hard drives, recovering deleted files, and examining network traffic.

Skills you'll gain: Data Loss Prevention, Security Testing, Network Security, Cryptography, Cyber Security Assessment, Cryptographic Protocols, Security Controls, Cloud Security, Encryption, Data Security, Network Administration, Information Assurance, Identity and Access Management, Penetration Testing, Cloud Computing, Cyber Risk, Authorization (Computing), Information Privacy
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Computer Security Incident Management, Incident Management, Security Management, Digital Forensics, Disaster Recovery, Risk Management Framework, Cybersecurity, Risk Management, Continuous Monitoring, Cyber Security Policies, Security Controls, Cloud Security, Virtualization and Virtual Machines, Cloud Computing, Scenario Testing
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Threat Detection, Cyber Threat Hunting, Anomaly Detection, Network Security, General Networking, Network Monitoring, Real Time Data, Security Strategy, Network Analysis, Network Protocols, Data Capture
Intermediate · Guided Project · Less Than 2 Hours

University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Computer Security Incident Management, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Endpoint Detection and Response, Incident Management, Endpoint Security, Network Security, Firewall, Security Software, Anomaly Detection, System Monitoring
Beginner · Course · 1 - 3 Months

Skills you'll gain: Cryptography, Cybersecurity, Network Security, Cryptographic Protocols, Cyber Attacks, Encryption, IT Security Architecture, Identity and Access Management, Threat Management, Threat Detection, Firewall, Key Management, Security Management, Infrastructure Security, Security Controls, Network Planning And Design, Authorization (Computing), Public Key Infrastructure, Authentications, Risk Management Framework
Beginner · Course · 1 - 3 Months

Skills you'll gain: Systems Development Life Cycle, Software Development Life Cycle, Systems Development, Software Development Methodologies, Project Management Life Cycle, Change Management, Project Management, System Implementation, Compliance Auditing, Internal Auditing, Software Testing, Auditing, Development Testing, Project Management Office (PMO), Internal Controls, Governance, Agile Methodology, Software Development, Software Development Tools, Risk Management
Intermediate · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Metasploit, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Information Systems Security, Exploitation techniques, Data Sharing
Beginner · Course · 1 - 3 Months

Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Application Security, Vulnerability Management, Event Monitoring, Security Controls, Exploitation techniques, Data Integrity, Continuous Monitoring, System Monitoring, Patch Management, Identity and Access Management, Multi-Factor Authentication, Incident Response, Server Side, CI/CD
Intermediate · Course · 1 - 3 Months

Universidades Anáhuac
Skills you'll gain: Cybersecurity, Cyber Attacks, Information Systems Security, Data Security, Malware Protection, Security Controls, Vulnerability Assessments, Threat Detection, Network Security, Security Awareness, Security Strategy, Human Factors (Security), Network Protocols
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Cyber Threat Intelligence, Exploitation techniques, Threat Management, Brute-force attacks, Network Security, Information Systems Security, Security Awareness, Human Factors (Security), Authentications, Network Protocols
Intermediate · Course · 1 - 3 Months

Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Threat Management, Incident Management, Cybersecurity, Threat Detection, Digital Forensics, Business Continuity
Beginner · Course · 1 - 3 Months

University of London
Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Cyber Attacks, Vulnerability Assessments, Hardware Architecture, Information Systems Security, Application Security, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, VPN Clients, Systems Architecture, Authentications
Beginner · Course · 1 - 4 Weeks