Copyright

List of Free Online Computer Forensics Courses and Classes

Learn about computer forensics with these free online courses. See the full list of free computer forensics courses and find the course or class that's right for you.

Online Course Requirements and Information

Students considering entering the field of computer forensics or enhancing their career training may take advantage of these free online computer forensic courses and tutorials available through OpenCourseWare (OCW) programs. Learners may access or download lessons, reading lists, assignments, videos and related materials; however, there is no instructor access or feedback. There's also no opportunity to interact with other students. In most cases, students need to obtain their own course reading materials. OCW programs do not confer course credits or grades.

Free Online Computer Forensics Course List

Basic Steps in Forensic Analysis of Unix Systems at the University of Washington

This Web tutorial instructs learners on forensic analysis of machines running the Unix operating system. It covers steps used for analysis and includes graphics, illustrations and references. The tutorial also provides sample Unix scripts and protocols. In addition, the materials demonstrate how to run analysis using standard Unix tools, specifically The Coroner's Toolkit (TCT), which includes the specialized programs grave-robber, unrm, lazarus and mactime. No other course materials are available, although students are expected to have access to a Unix workstation.

Cryptography and Cryptanalysis at Massachusetts Institute of Technology (MIT)

Students who are comfortable with elementary number theory, algorithms and discrete probability can use these graduate course materials on introductory cryptography and cryptanalysis. Problem sets, study materials and a template for completing problem assignments can also be downloaded; however, course readings may need to be purchased.

Emerging Security Vulnerabilities & the Impact to Business through YouTube

This informational video examines what information technology professionals and Web programmers need to know about security, what security is needed and how to implement appropriate security. The web video examines the most common security vulnerabilities, as well as which software programs are most vulnerable. The video also focuses on specific cyber attacks, such as SQL injection and XSRF (Cross-Site-Request Forgery), as well as emerging trends in software security. Also included are various types of security education available today.

Introduction to Computer Forensics and Investigations at The Open University

This introductory course covers the general principles of computer forensics and how they're used in public and private spheres. Lessons include how to locate passwords and use the Windows File Analyzer to examine files, shortcuts, the Internet cache and the recycle bin on a machine running a Windows operating system. Accompanying activity assignments with transcripts, videos and screen snapshots provide examples. Brief course discussion text is also available, along with suggestions for further learning.

Intrusion Detection System at Korea University

For students with experience in data mining and statistics, this class covers traditional types of intrusion and detection methods. Lecture materials are available for download and explore geospatial and physical intrusion detection, the lifecycle of vulnerability, visual data communications and Web application firewalls. Students can also access an assigned project; however, there isn't any opportunity for collaboration with or feedback from fellow learners or instructors. Reading assignments are also available, although students need to obtain the texts independently.

Living with the Internet: Keeping it Safe at The Open University

This free online course teaches computer users how to identify and prevent computer crashes and cyber threats. Students learn the difference between viruses, trojans and worms. Other topics explored include email attachments, antivirus software, firewalls, hijackers and malware.

Network and Computer Security at MIT

This undergraduate/graduate course teaches students the importance of a secure computer and network system, software protection and electronic commerce. Students learn through assignments and exams with solutions. The site also offers recommended reading. Topics covered include cryptography, authentication, firewalls, risk assessment, electronic mail, viruses and intrusion detection.

Network Security at The Open University

This graduate-level course provides users with the information necessary to ensure a computer network is free from cyber attacks and security threats. Students investigate the meanings of vulnerability, threats and attacks. The course focuses on identifying computer/Internet threats and implementing appropriate security and firewalls. Authentication certification is also covered.

Selected Topics in Cryptography at MIT

This free online course focuses on specific areas of cryptography and the role it plays in our daily lives. Students learn to identify various cryptographic procedures available and choose appropriate methods based on the type of network system. The course offers a section on electronic voting systems and ways of making them secure. Students have access to various lecture notes.

Show me popular schools

Related to List of Free Online Computer Forensics Courses and Classes

  • Related
  • Recently Updated
  • Popular
List of the Best Computer Forensics Schools in the U.S.

Computer forensics is the recovery, analysis and presentation of computer data for use as evidence in criminal investigations....

Colleges With a Masters in Computer Forensics: How to Choose

Students who want to work with government or commercial digital forensics may want to pursue a master's degree in either...

Become a Computer Forensics Investigator: Career Roadmap

Learn how to become a computer forensics investigator. Research the career requirements, training information, and experience...

Computer Forensics Analyst: Job Description, Duties and Requirements

Computer forensic analysts use their computer science background and forensic skills to recover information from computers and...

Computer and Digital Forensics Training and Education Programs

Popular Schools

The schools in the listing below are not free but are popular choices among our users. Tuition and costs will vary across programs and locations. Be sure to always request tuition information before starting a program.

Other Schools:

  • Areas of study you may find at University of Miami include:
      • Graduate: Doctorate, First Professional Degree, Master
      • Non-Degree: Certificate
      • Undergraduate: Bachelor
    • Computer Sciences
      • Computer and Information Sciences, General
      • Computer Systems Analysis
      • Data Entry Processing
      • Information Technology Management
        • Information Systems Security
  • Areas of study you may find at Iowa State University include:
      • Graduate: Doctorate, First Professional Degree, Master
      • Undergraduate: Bachelor
    • Computer Sciences
      • Computer and Information Sciences, General
      • Information Technology Management
        • Information Systems Security

Popular Schools

The schools in the listing below are not free but are popular choices among our users. Tuition and costs will vary across programs and locations. Be sure to always request tuition information before starting a program.

Avg. Wages For Related Jobs

Source: Bureau of Labor Statistics