Free Online

Infosec Courses

Show filters

Level

Duration

Subject

Language

Digital Forensics Concepts

Digital Forensics Concepts

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeIn the Digital Forensics Concepts course, you will learn about legal considerations applicable to computer forensics and how to identify, collect and preserve digital evidence. This course dives into the scientific principles relating to digital forensics and gives you a close look at on-scene triaging, keyword lists, grep, file hashing, report writing and the profession of digital forensic examination.

Coursera
11 weeks long, 6-7 hours worth of material
upcoming
view all
JavaScript Security Part 2

JavaScript Security Part 2

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeThis course covers Expressions, Prototype Pollution and Ecosystem Modules (npm) and Supply Chain.

Coursera
3 weeks long, 3-4 hours worth of material
upcoming
view all
Computer Forensics

Computer Forensics

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeThis three part InfoSec Specialization covers a wide variety of Computer Forensics topics. In the Digital Forensics Concepts course, you will learn about legal considerations applicable to computer forensics and how to identify, collect and preserve digital evidence. This course dives into the scientific principles relating to digital forensics and gives you a close look at on-scene triaging, keyword lists, grep, file hashing, report writing and the profession of digital forensic examination. The Windows Registry Forensics course shows you how to examine the live registry, the location of the registry files on the forensic image, and how to extract files. Finally, the Windows OS Forensics course covers windows file systems, Fat32, ExFat, and NTFS. You will learn how these systems store data, what happens when a file gets written to disc, what happens when a file gets deleted from disc, and how to recover deleted files. You will also learn how to correctly interpret the information in the file system data structures, giving the student a better understanding of how these file systems work. This knowledge will enable you to validate the information from multiple forensic tools properly.

Coursera
30 weeks long, 1 hour a week
view all
Windows OS Forensics

Windows OS Forensics

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeThe Windows OS Forensics course covers windows file systems, Fat32, ExFat, and NTFS. You will learn how these systems store data, what happens when a file gets written to disc, what happens when a file gets deleted from disc, and how to recover deleted files. You will also learn how to correctly interpret the information in the file system data structures, giving the student a better understanding of how these file systems work. This knowledge will enable you to validate the information from multiple forensic tools properly.

Coursera
6 weeks long, 7-8 hours worth of material
upcoming
view all
Introduction to Python for Cybersecurity

Introduction to Python for Cybersecurity

5

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeThis course it the first part of the Python for Cybersecurity Specialization. Learners will get an introduction and overview of the course format and learning objectives.

Coursera
3 weeks long, 3-4 hours worth of material
ongoing
view all
Technical Deep Dive with Incident Response Tools

Technical Deep Dive with Incident Response Tools

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeThe Cyber Incident Response course will give students an understanding of how incidents are responded to at a high level, as well as allow them to build important technical skills through the hands-on labs and projects.This course starts with a high-level discussion of what happens at each phase of responding to an incident, followed by a technical deep dive into some of the more exciting parts of memory, network, and host analysis and forensics. This course is for anyone wishing to apply learned forensics and offensive knowledge such as ethical hacking to the incident response process.

Coursera
5 weeks long, 4-5 hours worth of material
ongoing
view all
Python for Active Defense

Python for Active Defense

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeThis course covers Python for active defense.

Coursera
3 weeks long, 4-5 hours worth of material
ongoing
view all
Defensive Python

Defensive Python

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeThis course demonstrates the use of Python for network analysis to detect and hijack suspicious connections.

Coursera
1 week long, 2-3 hours worth of material
upcoming
view all
Fundamental Privacy Acts and Laws

Fundamental Privacy Acts and Laws

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeIn this path we will explore The US Federal Government Branch and Information Privacy. We will also cover US healthcare privacy related laws and privacy compliance including HIPAA, HITECH, GINA and more.

Coursera
3 weeks long, 9-10 hours worth of material
ongoing
view all
JavaScript Security Refreshers

JavaScript Security Refreshers

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeThis course is a Secure Javascript Programming Overview. It gives the student an introduction to JavaScript security and covers important topics like authentication best practices and refreshers onJavaScript, Web browsers and Node.js.Secure JavaScript Programming OverviewAn exploration of Java and its runtime environments. In this course, we will cover some base concepts of JavaScript and its runtime environments. We will start by doing a few refreshers on the languages and its history; then we will look at an overview of web browsers and Node.js as JavaScript runtimes.Authentication Best PracticesThis course explores web authentication and best practices. Here, we will go through refreshers on authentication and a bit of cryptography. We will cover the case of cookies and non-cookies-based front-end authentication. We will also cover best practices in term of front-end identity management.

Coursera
2 weeks long, 2-3 hours worth of material
upcoming
view all
Introduction to Privacy - Part 2

Introduction to Privacy - Part 2

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreePart 2 of the Privacy Fundamentals course will cover data assessments, documentation and privacy rights. We will also explore different training methods including competency based training.

Coursera
4 weeks long, 3-4 hours worth of material
ongoing
view all
Windows Registry Forensics

Windows Registry Forensics

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeThe Windows Registry Forensics course shows you how to examine the live registry, the location of the registry files on the forensic image, and how to extract files.

Coursera
8 weeks long, 8-9 hours worth of material
upcoming
view all
Stages of Incident Response

Stages of Incident Response

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeThe Cyber Incident Response course will give students an understanding of how incidents are responded to at a high level, as well as allow them to build important technical skills through the hands-on labs and projects.This course starts with a high-level discussion of what happens at each phase of responding to an incident, followed by a technical deep dive into some of the more exciting parts of memory, network, and host analysis and forensics. This course is for anyone wishing to apply learned forensics and offensive knowledge such as ethical hacking to the incident response process.

Coursera
7 weeks long, 4-5 hours worth of material
past
view all
NIST 800-171

NIST 800-171

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeNIST SP 800-171 is a cybersecurity framework of 110 controls in 14 families published by the National Institute of Standards and Technology (NIST). This learning path will teach you how to comply with the requirements of NIST 800-171. You will understand what CUI is and how to identify it; what a nonfederal information systems is; how to understand each of the 110 requirements in the framework and satisfy each of them if necessary; how to create a Body of Evidence (BOE) including Organizational Policy or Procedures; a System Security Plan (SSP) and Plans of Action and Milestones (POAM). Upon completion of this course, you will have the knowledge and skills to implement the controls required by the NIST 800-171 framework and build your BOE.

Coursera
7 weeks long, 5-6 hours worth of material
ongoing
view all
Leadership

Leadership

0

Class Central TipsLearn How to Sign up to Coursera courses for free1600+ Coursera Courses That Are Still Completely FreeThis course is an introduction and an overview to the basic principles of cybersecurity leadership and management.It explores and dissects the correlation between security, trust and stability (STS) and the Confidentiality, Integrity and Availability CIA Triad, while integrating information security governance (ISG) and the McKinsey 7S Change Model as guidance for cybersecurity leadership and management.Information Security and Senior Governance OverviewCybersecurity senior management and Information Security GovernanceCybersecurity aligning information security to the business model

Coursera
3 weeks long, 5-6 hours worth of material
upcoming
view all
Load more

Level

Duration

Language