"Computer Forensics Degrees" on Amazon.com

FREE SEARCH

Wednesday, August 15, 2018

List of Free Online Computer Forensics Courses and Classes

Learn about computer forensics with these free online courses. See the full list of free computer forensics courses and find the course or class that's right for you.

Online Course Requirements and Information

Students considering entering the field of computer forensics or enhancing their career training may take advantage of these free online computer forensic courses and tutorials available through OpenCourseWare (OCW) programs. Learners may access or download lessons, reading lists, assignments, videos and related materials; however, there is no instructor access or feedback. There's also no opportunity to interact with other students. In most cases, students need to obtain their own course reading materials. OCW programs do not confer course credits or grades.

Free Online Computer Forensics Course List

Basic Steps in Forensic Analysis of Unix Systems at the University of Washington:
http://staff.washington.edu/dittrich/misc/forensics/

This Web tutorial instructs learners on forensic analysis of machines running the Unix operating system. It covers steps used for analysis and includes graphics, illustrations and references. The tutorial also provides sample Unix scripts and protocols. In addition, the materials demonstrate how to run analysis using standard Unix tools, specifically The Coroner's Toolkit (TCT), which includes the specialized programs grave-robber, unrm, lazarus and mactime. No other course materials are available, although students are expected to have access to a Unix workstation.

Cryptography and Cryptanalysis at Massachusetts Institute of Technology (MIT):
http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-875-cryptography-and-cryptanalysis-spring-2005/

Students who are comfortable with elementary number theory, algorithms and discrete probability can use these graduate course materials on introductory cryptography and cryptanalysis. Problem sets, study materials and a template for completing problem assignments can also be downloaded; however, course readings may need to be purchased.

Emerging Security Vulnerabilities & the Impact to Business through YouTube:
http://www.youtube.com/watch?v=QTfFCr4G0qA&feature=relmfu

This informational video examines what information technology professionals and Web programmers need to know about security, what security is needed and how to implement appropriate security. The web video examines the most common security vulnerabilities, as well as which software programs are most vulnerable. The video also focuses on specific cyber attacks, such as SQL injection and XSRF (Cross-Site-Request Forgery), as well as emerging trends in software security. Also included are various types of security education available today.

Introduction to Computer Forensics and Investigations at The Open University:
http://openlearn.open.ac.uk/mod/oucontent/view.php?id=401626

This introductory course covers the general principles of computer forensics and how they're used in public and private spheres. Lessons include how to locate passwords and use the Windows File Analyzer to examine files, shortcuts, the Internet cache and the recycle bin on a machine running a Windows operating system. Accompanying activity assignments with transcripts, videos and screen snapshots provide examples. Brief course discussion text is also available, along with suggestions for further learning.

Intrusion Detection System at Korea University:
http://ocw.korea.edu/ocw/college-of-engineering/ce68c785d0d0c9c0c2dcc2a4d15c/lecture-notes

For students with experience in data mining and statistics, this class covers traditional types of intrusion and detection methods. Lecture materials are available for download and explore geospatial and physical intrusion detection, the lifecycle of vulnerability, visual data communications and Web application firewalls. Students can also access an assigned project; however, there isn't any opportunity for collaboration with or feedback from fellow learners or instructors. Reading assignments are also available, although students need to obtain the texts independently.

Living with the Internet: Keeping it Safe at The Open University:
http://labspace.open.ac.uk/course/view.php?id=6239

This free online course teaches computer users how to identify and prevent computer crashes and cyber threats. Students learn the difference between viruses, trojans and worms. Other topics explored include email attachments, antivirus software, firewalls, hijackers and malware.

Network and Computer Security at MIT:
http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-857-network-and-computer-security-fall-2003/

This undergraduate/graduate course teaches students the importance of a secure computer and network system, software protection and electronic commerce. Students learn through assignments and exams with solutions. The site also offers recommended reading. Topics covered include cryptography, authentication, firewalls, risk assessment, electronic mail, viruses and intrusion detection.

Network Security at The Open University:
http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-857-network-and-computer-security-fall-2003/

This graduate-level course provides users with the information necessary to ensure a computer network is free from cyber attacks and security threats. Students investigate the meanings of vulnerability, threats and attacks. The course focuses on identifying computer/Internet threats and implementing appropriate security and firewalls. Authentication certification is also covered.

Selected Topics in Cryptography at MIT:
http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-897-selected-topics-in-cryptography-spring-2004/

This free online course focuses on specific areas of cryptography and the role it plays in our daily lives. Students learn to identify various cryptographic procedures available and choose appropriate methods based on the type of network system. The course offers a section on electronic voting systems and ways of making them secure. Students have access to various lecture notes.