• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Computer Forensics

More to explore:

Results for "computer forensics"


  • Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Mobile Security

    Skills you'll gain: Mobile Security, Investigation, Mobile Development, Apple iOS, Criminal Investigation and Forensics, Android (Operating System), Application Security, Legal Proceedings, Cybersecurity, File Systems, Malware Protection, Computer Security, Secure Coding, Computer Security Incident Management, Cloud Security, Security Strategy, Analysis, Encryption, Debugging, Disaster Recovery

    4.5
    Rating, 4.5 out of 5 stars
    ·
    13 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of London

    How Computers Work

    Skills you'll gain: Computer Science, Computer Systems, Web Applications, Computer Literacy, Network Security, Computer Networking, Computational Thinking, Debugging, Web Design and Development, Cybersecurity, Problem Management, Software Architecture, Data Storage

    4.6
    Rating, 4.6 out of 5 stars
    ·
    579 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    G

    Google

    Sound the Alarm: Detection and Response

    Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Threat Detection, Event Monitoring, Security Information and Event Management (SIEM), Incident Management, Security Management, Continuous Monitoring, Network Security, Network Monitoring, Splunk, Network Analysis, TCP/IP, Network Protocols, Query Languages

    4.8
    Rating, 4.8 out of 5 stars
    ·
    3.3K reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    Edureka

    Cyber Threat Intelligence and Incident Response

    Skills you'll gain: Incident Response, Vulnerability Assessments, Vulnerability Management, Cyber Threat Intelligence, MITRE ATT&CK Framework, Cybersecurity, Endpoint Detection and Response, Intrusion Detection and Prevention, Cyber Attacks, Security Information and Event Management (SIEM), Event Monitoring, Cyber Engineering, Patch Management, Network Security, Malware Protection, Continuous Monitoring, Security Management, Cyber Risk, Digital Forensics, Risk Analysis

    Intermediate · Specialization · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Windows OS Forensics

    Skills you'll gain: File Systems, Digital Forensics, Microsoft Windows, File Management, Operating Systems, Data Structures, Data Validation, Data Storage

    4.7
    Rating, 4.7 out of 5 stars
    ·
    80 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of California, Irvine

    Computer Hardware and Software

    Skills you'll gain: Network Security, Computer Hardware, Computer Systems, TCP/IP, Information Technology, General Networking, Computer Literacy, Network Protocols, Operating Systems, Computer Networking, Software Systems, File Systems

    4.6
    Rating, 4.6 out of 5 stars
    ·
    268 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Preview
    Preview
    S

    Starweaver

    Cyber Espionage and Counterintelligence

    Skills you'll gain: Endpoint Detection and Response, Threat Detection, MITRE ATT&CK Framework, Cyber Threat Hunting, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Modeling, Security Information and Event Management (SIEM), Cyber Security Strategy, Cyber Operations, Cybersecurity, Malware Protection, Incident Response, Data Loss Prevention, Anomaly Detection, Data Security, System Implementation, Open Source Technology

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Essential Aspects of Software, Hardware, and Data Backup

    Skills you'll gain: Cybersecurity, Application Security, Information Systems Security, Software Installation, System Configuration, Data Management, Computer Hardware, Data Security, Hardware Architecture, Data Storage, Information Technology Operations, Microsoft Windows, Firewall, Disaster Recovery, Encryption, Role-Based Access Control (RBAC), Identity and Access Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    157 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    T

    The University of Tokyo

    Interactive Computer Graphics

    Skills you'll gain: Graphical Tools, Computer-Aided Design, Interaction Design, Digital Design, Visual Design, Technical Design, Computer Programming

    4
    Rating, 4 out of 5 stars
    ·
    316 reviews

    Intermediate · Course · 1 - 3 Months

  • P

    Packt

    Digital Forensics for Pentesters - Hands-On Learning

    Skills you'll gain: Penetration Testing, Vulnerability Assessments, Network Security, Network Analysis, Cyber Threat Hunting, Cyber Security Assessment, Virtual Machines, Open Source Technology, Malware Protection, Command-Line Interface, Software Installation

    4.6
    Rating, 4.6 out of 5 stars
    ·
    14 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Preview
    Preview
    S

    Starweaver

    Legal and Ethical Cyber Investigations

    Skills you'll gain: Digital Forensics, Electronic Discovery, Investigation, Criminal Investigation and Forensics, Incident Response, Cyber Threat Intelligence, Technical Communication, Computer Security Incident Management, Report Writing, Cybersecurity, Cyber Security Policies, Fraud detection, Legal Proceedings, Law, Regulation, and Compliance, Ethical Standards And Conduct, Business Ethics, Compliance Reporting, Data Collection, Analysis, Management Reporting

    Beginner · Course · 1 - 3 Months

  • Status: Preview
    Preview
    U

    University of Michigan

    Internet History, Technology, and Security

    Skills you'll gain: Network Security, Network Protocols, Network Architecture, TCP/IP, Web Applications, Computer Networking, Encryption, Network Infrastructure, Innovation, Hypertext Markup Language (HTML)

    4.8
    Rating, 4.8 out of 5 stars
    ·
    2.8K reviews

    Beginner · Course · 1 - 3 Months

1…456…659

In summary, here are 10 of our most popular computer forensics courses

  • Cyber Security: Mobile Security: Macquarie University
  • How Computers Work: University of London
  • Sound the Alarm: Detection and Response: Google
  • Cyber Threat Intelligence and Incident Response: Edureka
  • Windows OS Forensics: Infosec
  • Computer Hardware and Software: University of California, Irvine
  • Cyber Espionage and Counterintelligence: Starweaver
  • Essential Aspects of Software, Hardware, and Data Backup: Microsoft
  • Interactive Computer Graphics: The University of Tokyo
  • Digital Forensics for Pentesters - Hands-On Learning: Packt

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok