Courses
Discover thousands of courses from top institutions and platforms worldwide
Level
Course Type
Duration

Udemy
Enhance your knowledge What you'll learn: Investigation processes in Computer forensicsLegal issues involved in investigationsSearching evidence and digital handprintsMethodologies of Acquisition and seizingRecover deleted files and hard disk partitions and Many More.. Computer Security and Computer Investigations are changing terms. Many systems are built on a regular basis for computer investigations, be it cyber fraud, forensic analysis, cyber audits, or even basic electronic data recovery. The methods and techniques discussed in this class will train students to conduct computer investigations using revolutionary digital forensics technology.Get certified in using forensically sound investigative techniques in order to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of custody, and write a findings report on various levels of computer attacks.With this course, a professional can feel confident about his knowledge and ability to analyze any security flaws that may arise in the system. REGISTER TODAY!

FutureLearn
Put what you have learned into practice to develop your digital forensics skills Almost every investigation: criminal, civil, corporate, HR, or security will include a digital element. It is vital that the investigator can correctly interpret and present the complex digital evidence so that it can withstand scrutiny – it may be the key that proves or disproves an investigation. Once you have completed the courses on the Digital Forensics and Incident Response (DFIR) Expert Track, this four-week practical course will help you gain hands-on experience in using digital evidence. You’ll learn how to put the five-phase investigation model into practice, with a focus on the identification and preservation of digital evidence. Learn how to carry out data interpretation The course will help you develop an understanding of the requirements for a digital investigation. You’ll explore different scenarios to learn how to examine, recover, extract, and interpret data. This understanding will help you collect data in a forensically sound manner, translate raw data from sources that are compressed, encoded, or encrypted, and provide investigational context to the data. You’ll also learn how to present your interpreted data in a way that can be understood by others. Learn practical skills for dealing with digital evidence alongside PA Consulting By the end of the course, you’ll be able to explain the importance of evidential and forensic integrity. You’ll know how data can be hidden from the investigator and be able to present complex digital matters that can withstand scrutiny. Learning from Jim Metcalfe, a digital forensic investigator, cyber security incident responder, and expert witness at PA Consulting, you’ll finish the course with practical knowledge on how to handle digital evidence required for legal or disciplinary proceedings. This course is designed for anyone who has completed the Digital Forensics and Incident Response (DFIR) Expert Track. It will help you gain practical experience in digital investigation and forensics.

YouTube
Discover the work of scleroderma researcher Dr. Suzanne C. Li in this 27-minute video from the National Scleroderma Foundation. Gain insights into Dr. Li's investigations, her approach to studying scleroderma, and the potential impact of her research on understanding and treating this complex autoimmune disease. Learn about the latest developments in scleroderma research and the challenges faced by investigators in this field. Explore the importance of collaborative efforts in advancing scientific knowledge and improving patient care for those affected by scleroderma.

YouTube
Explore real-world network intrusion detection scenarios through practical examples in this 34-minute video lecture. Delve into various types of intrusions, including P2P communications, viruses, and different scanning techniques such as TCP scans, ARP sweeps, OS scans, user account scans, and Tet scans. Learn how to identify and analyze suspicious network activities, interpret logging data, and understand the importance of monitoring for potential security threats. Gain valuable insights into the digital investigator's role in detecting and responding to network intrusions, enhancing your cybersecurity skills and knowledge.

Coursera
Welcome to 'Fundamentals of Good Clinical Practice: Prep and Personnel'! This course is designed to introduce you to preparing for a clinical trial. This is Course Two in the Clinical Trial Teams series - the first course 'Introduction to Good Clinical Practice' provides background on what clinical trials are as well as the basic principles and practices of GCP. If you are new to the world of clinical research, we suggest starting your journey with Course One. In Course Two, we turn our attention to the conduct of clinical trials, exploring in detail the role of the Investigator and site staff throughout a study. Whether you are new to the field or seeking to refresh your knowledge, this course will equip you with the necessary understanding to begin to navigate the complex world of clinical research. The course is divided into several modules, each covering specific stages of a clinical trial. The modules include a variety of videos, a fictional case study and interactive quizzes to reinforce your learning. We are excited to embark on this learning journey with you as we delve into the world of Good Clinical Practice. Enroll now and start building a strong foundation in the conduct of clinical research!

YouTube
Discover the groundbreaking Renée Fleming Neuroarts Investigator Awards in this informative 25-minute webinar presented by the NeuroArts Blueprint team. Learn about this innovative research program designed to foster cutting-edge studies in the emerging field of neuroarts. Explore how the arts and aesthetic experiences measurably impact the body, brain, and behavior, and how this knowledge can be applied to advance health and wellbeing. Gain insights into the one-year grant opportunities available for both basic and applied research, aimed at expanding the evidence base in neuroarts. Hear a special welcome from Renée Fleming herself as she kicks off this exciting initiative. Get answers to frequently asked questions about the program and application process, and discover how you can contribute to this pioneering field of study.

YouTube
Explore the fundamentals of Intrusion Detection Systems (IDS) in this comprehensive 31-minute video lecture. Delve into network security terminology, threat detection methods, and various types of IDS, with a focus on network-based systems. Learn how to create a simple Snort rule and analyze logs for effective security monitoring. Gain valuable insights into the world of digital investigation and cybersecurity from expert Bill Buchanan OBE.

YouTube
Explore the fundamentals of digital investigation in this pre-introductory video lecture. Gain an overview of key networking concepts essential for digital forensics, including user types, communication modes like simplex and full duplex, network topologies such as point-to-point, star, and mesh, and technologies like Ethernet and coaxial cables. Examine the components of wide area networks, application protocols, data packets, network devices, and infrastructure. Learn to recognize network symbols and understand the importance of network addresses in digital investigations. Prepare for a comprehensive digital investigator course by building a strong foundation in these crucial networking principles.

Udemy
Learn a new career using just your computer and a desire for justice. What you'll learn: install and manage autopsylearn to become a digital forensics expertfind hidden data in fileslearn forensics for law enforcement Have you always wanted to help law enforcement catch the bad guys? I bet you do, and you probably just need a good place to start. You also need a good paying job and want to use your computer to do it. I have great news for you. Digital forensics is a growing field and you can become a part of it by becoming an investigator yourself. Also, if you already work for law enforcement, but you need to add to your skills, then this course is for you. You don’t need to be a computer expert to be an investigator. You just need to know how to use the free tools that are already available.Autopsy is a free forensics software application you can install on your Windows computer. If you're looking for a new career, or just want to brush up on your digital forensics skills, then this course can help you achieve those goals.You'll learn how to install and investigate a case from beginning to conclusion by finding hidden hacks inside data, website history, picture file hidden messages, and creating reports for legal cases. Join me in your journey for becoming a digital forensics investigator using the best free forensics software in the business.

YouTube
Explore the transformative potential of mixed reality in crime scene investigation through this insightful 54-minute talk by Dr. Jurrien Bijhold. Gain a deeper understanding of how mixed reality technologies can revolutionize CSI applications, enhance training and education in forensic science, and improve courtroom presentations. Discover the stark differences between common perceptions and the actual reality faced by crime scene investigators. Learn about innovative approaches that leverage mixed reality to overcome challenges in forensic investigations and evidence presentation. Delve into practical applications and real-world examples that demonstrate the power of this technology in solving crimes and ensuring justice.

YouTube
Explore "The Investigators Labyrinth: A Data-Driven Perspective" in this 30-minute conference talk by Chris Sanders at Security Onion Conference 2016. Delve into the economics of security, the evolution of Network Security Monitoring (NSM), and the cognitive revolution in Digital Forensics and Incident Response (DFIR). Examine investigations as mental labyrinths and learn how to navigate them effectively. Discover a scenario-based approach to investigation analysis, including key data sources and their impact on analysis speed and efficiency. Analyze patterns in analyst behavior, such as initial data focus, disposition judgement steps, and the tendency to prove or disprove alerts. Gain insights into key phrase mapping and its role in enhancing investigative processes.

YouTube
Explore the Dynatrace Security Investigator App in this 27-minute spotlight video featuring Tiit Hallas, Principal Product Manager. Discover how this innovative tool, announced at Perform 2024 and set for GA release in April 2024, accelerates evidence-driven security investigations and threat hunting. Learn about the app's unique branch-based analysis approach, which preserves data context and enhances investigation speed and accuracy. Gain insights into the threat-hunting process, from theoretical linear progression to practical branched reality, and understand how the Security Investigator addresses common tooling challenges. Watch a live demo showcasing the app's capabilities and learn where to find additional resources, including the announcement blog and Dynatrace Hub. Perfect for security professionals seeking to streamline their investigative processes and improve threat detection efficiency.

CourseHorse
EC-Council’s Certified Hacking Forensic Investigator (CHFI) is the only comprehensive ANSI accredited, lab-focused program in the market that gives organizations vendor-neutral training in digital forensics. CHFI provides its attendees with a firm grasp of digital forensics, presenting a detailed and methodological approach to digital forensics and evidence analysis that also pivots around Dark Web, IoT, and Cloud Forensics. The tools and techniques covered in this program will prepare the learner for conducting digital investigations using ground-breaking digital forensics technologies.Course ObjectivesThe program is designed for IT professionals involved with information system security, computer forensics, and incident response. It will help fortify the application knowledge in digital forensics for forensic analysts, cybercrime investigators, cyber defense forensic analysts, incident responders, information technology auditors, malware analysts, security consultants, and chief security officers.The program equips candidates with the necessary skills to proactively investigate complex security threats, allowing them to investigate, record, and report cybercrimes to prevent future attacks.Who Should Attend?The CHFI program is designed for all IT professionals involved with information system security, computer forensics, and incident response.Course PrerequisitesEC-Council Certified Ethical Hacker (CEH) v11Course Outline1 - Computer Forensics in Today’s WorldUnderstand the Fundamentals of Computer ForensicsUnderstand Cybercrimes and their Investigation ProceduresUnderstand Digital EvidenceUnderstand Forensic Readiness, Incident Response and the Role of SOC (SecurityOperations Center) in Computer ForensicsIdentify the Roles and Responsibilities of a Forensic InvestigatorUnderstand the Challenges Faced in Investigating CybercrimesUnderstand Legal Compliance in Computer Forensics2 - Computer Forensics Investigation ProcessUnderstand the Forensic Investigation Process and its ImportanceUnderstand the Pre-investigation PhaseUnderstand First ResponseUnderstand the Investigation PhaseUnderstand the Post-investigation Phase3 - Understanding Hard Disks and File SystemsDescribe Different Types of Disk Drives and their CharacteristicsExplain the Logical Structure of a DiskUnderstand Booting Process of Windows, Linux and Mac Operating SystemsUnderstand Various File Systems of Windows, Linux and Mac Operating SystemsExamine File System Using Autopsy and The Sleuth Kit ToolsUnderstand Storage SystemsUnderstand Encoding Standards and Hex EditorsAnalyze Popular File Formats Using Hex Editor4 - Data Acquisition and DuplicationUnderstand Data Acquisition FundamentalsUnderstand Data Acquisition MethodologyPrepare an Image File for Examination5 - Defeating Anti-forensics TechniquesUnderstand Anti-forensics TechniquesDiscuss Data Deletion and Recycle Bin ForensicsIllustrate File Carving Techniques and Ways to Recover Evidence from Deleted PartitionsExplore Password Cracking/Bypassing TechniquesDetect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension MismatchUnderstand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and EncryptionDetect Program Packers and Footprint Minimizing TechniquesUnderstand Anti-forensics Countermeasures6 - Windows ForensicsCollect Volatile and Non-volatile InformationPerform Windows Memory and Registry AnalysisExamine the Cache, Cookie and History Recorded in Web BrowsersExamine Windows Files and MetadataUnderstand ShellBags, LNK Files, and Jump ListsUnderstand Text-based Logs and Windows Event Logs7 - Linux and Mac ForensicsUnderstand Volatile and Non-volatile Data in LinuxAnalyze Filesystem Images Using The Sleuth KitDemonstrate Memory Forensics Using Volatility & PhotoRecUnderstand Mac Forensics8 - Network ForensicsUnderstand Network ForensicsExplain Logging Fundamentals and Network Forensic ReadinessSummarize Event Correlation ConceptsIdentify Indicators of Compromise (IoCs) from Network LogsInvestigate Network TrafficPerform Incident Detection and Examination with SIEM ToolsMonitor and Detect Wireless Network Attacks9 - Investigating Web AttacksUnderstand Web Application ForensicsUnderstand Internet Information Services (IIS) LogsUnderstand Apache Web Server LogsUnderstand the Functionality of Intrusion Detection System (IDS)Understand the Functionality of Web Application Firewall (WAF)Investigate Web Attacks on Windows-based ServersDetect and Investigate Various Attacks on Web Applications10 - Dark Web ForensicsUnderstand the Dark WebDetermine How to Identify the Traces of Tor Browser during InvestigationPerform Tor Browser Forensics11 - Database ForensicsUnderstand Database Forensics and its ImportanceDetermine Data Storage and Database Evidence Repositories in MSSQL ServerCollect Evidence Files on MSSQL ServerPerform MSSQL ForensicsUnderstand Internal Architecture of MySQL and Structure of Data DirectoryUnderstand Information Schema and List MySQL Utilities for Performing Forensic Analysis12 - Cloud ForensicsUnderstand the Basic Cloud Computing ConceptsUnderstand Cloud ForensicsUnderstand the Fundamentals of Amazon Web Services (AWS)Determine How to Investigate Security Incidents in AWSUnderstand the Fundamentals of Microsoft AzureDetermine How to Investigate Security Incidents in AzureUnderstand Forensic Methodologies for Containers and Microservices13 - Investigating Email CrimesUnderstand Email BasicsUnderstand Email Crime Investigation and its StepsU.S. Laws Against Email Crime14 - Malware ForensicsDefine Malware and Identify the Common Techniques Attackers Use to Spread MalwareUnderstand Malware Forensics Fundamentals and Recognize Types of Malware AnalysisUnderstand and Perform Static Analysis of MalwareAnalyze Suspicious Word and PDF DocumentsUnderstand Dynamic Malware Analysis Fundamentals and ApproachesAnalyze Malware Behavior on System Properties in Real-timeAnalyze Malware Behavior on Network in Real-timeDescribe Fileless Malware Attacks and How they HappenPerform Fileless Malware Analysis - Emotet15 - Mobile ForensicsUnderstand the Importance of Mobile Device ForensicsIllustrate Architectural Layers and Boot Processes of Android and iOS DevicesExplain the Steps Involved in Mobile Forensics ProcessInvestigate Cellular Network DataUnderstand SIM File System and its Data Acquisition MethodIllustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS DevicesPerform Logical Acquisition on Android and iOS DevicesPerform Physical Acquisition on Android and iOS DevicesDiscuss Mobile Forensics Challenges and Prepare Investigation Report16 - IoT ForensicsUnderstand IoT and IoT Security ProblemsRecognize Different Types of IoT ThreatsUnderstand IoT ForensicsPerform Forensics on IoT Devices

YouTube
Explore groundbreaking research on health inequities and immigrant health in this Stanford Department of Medicine Grand Rounds presentation. Delve into two compelling studies: "Cutting Health Inequities: A Barbershop Based Hypertension Care Model" and "The Association between Local Area Immigrant Fraction and Prevalence of Cardiovascular Diseases in the United States." Join Clinical Assistant Professor Dr. Tem Woldeyesus and Instructor Dr. Robert Huang as they share insights from their Chair Diversity Investigator Award-winning research. Gain valuable knowledge about innovative approaches to addressing hypertension in barbershop settings and understand the relationship between immigrant populations and cardiovascular disease prevalence across the United States.

Coursera
Our course series on ICH Good Clinical Practice equips trial investigators and clinical researchers with the essential knowledge required to conduct reliable and ethical clinical trials. Whether you are new to the field or an experienced professional, this course series provides the background needed to ensure participant safety, data integrity, and compliance with international regulations.

YouTube
Explore the groundbreaking contributions of Stanford investigators to Hodgkin's Disease research in this 58-minute Grand Rounds presentation. Join Dr. Richard Hoppe, the Henry S. Kaplan-Harry Lebeson Professor of Cancer Biology and Professor of Radiation Oncology, as he delves into the significant advancements made by Stanford researchers in understanding and treating Hodgkin's Disease. Gain valuable insights into the historical context, key discoveries, and innovative approaches that have shaped the field of Hodgkin's lymphoma treatment. This informative session, presented by the Stanford Department of Medicine, offers a unique opportunity to learn about the pivotal role Stanford has played in improving outcomes for patients with this form of cancer.

XuetangX
Clinical Histology aims to provide a compact, thorough course of clinical histology for learners in the health care professions and related disciplines. It helps learners to integrate basic medical knowledge with clinical medicine by presenting an appropriate amount of clinically relevant histological materials in an interesting form. This course also adopts case-based questions and related clinical cases for formative assessment.

XuetangX
The continuous increase in the incidence of allergic diseases is a global trend, which involves multiple organs (mainly rhinoconjunctivitis, asthma, dermatitis, food and drug allergies), has affected 1/3 of the world's population, and is listed by the World Health Organization as one of the three major diseases that need to be focused on prevention and treatment in the 21st century.The prominent characteristics of allergic diseases are "three highs and two lows", that is, the high number of patients, the high impact on work and life, the high involvement of various organs, the scarcity of allergy specialists, and the public's limited awareness.The Department of Allergy of the Third Affiliated Hospital of Sun Yat-sen University brings together allergy professionals from multiple disciplines such as Otorhinolaryngology, Pediatrics, Dermatology, Respiratory, Gastroenterology and Traditional Chinese Medicine, builds a high-quality "Clinical Allergology" MOOC, conducts online and offline mixed teaching, cultivates Clinical Allergology specialists, and popularizes the scientific knowledge of allergy.This course systematically synthesizes the basic knowledge and basic theories of clinical allergology, focusing on the characteristics of the discipline and the problems of clinical universality, so that students can master the basic theories of allergology, understand the relevant influencing factors of allergic diseases, and be familiar with the traditional Chinese and Western medicine diagnosis and treatment methods of common allergic diseases, especially allergic rhinoconjunctivitis, sinusitis and nasal polyps, allergic bronchial asthma, skin allergic diseases, food and drug allergic diseases, etc. In the future, students will be able to apply the clinical thinking of allergology to analyze and deal with clinical problems related to allergic diseases, and make a certain contribution to the popularization and development of Clinical Allergology.

XuetangX
Clinical Oncology is taught in the fall semester of each year at Jilin University for five-year and “5+3” clinical medical students, with a student population of about 120. The course has been well received by students in the past teaching process. According to the characteristics of the diversified knowledge system of oncology, the course dilutes the disciplinary boundaries, broadens the disciplinary fields, and cultivates students to establish a perfect knowledge system. Based on the existing multidisciplinary working oncology model, the course takes international clinical guidelines as the cornerstone and compares the similarities and differences between international treatment and Chinese specific treatment to cultivate students' clinical practice ability with a global vision. Taking advantage of the international cooperation of the teaching team, we focus on the future development of students. We integrate the frontiers of scientific research in oncology, and guide students to form a diversified view of career development and understand the scientific logic in different cultural backgrounds.This course is mainly in the form of complete knowledge points, each knowledge point according to the content of the corresponding video length of 5-10 minutes. The content is concise, to prevent students from fatigue while watching. At the same time, this online course can be closely integrated with classroom teaching. The content of the course is selected from the key contents of the syllabus and the frontier of development so that students can acquire the knowledge and develop an international perspective simultaneously. Through Mooc, the course is available to more medical students, clinicians, and medical enthusiasts. Advanced computer production technology is used to create the course. Multimedia means such as animation, video, and audio are integrated into explaining knowledge points to make the knowledge framework more vivid and easy to understand, facilitating students' understanding and deepening impressions. The teaching objectives of this course are to grasp the characteristics of diverse knowledge composition of clinical oncology disciplines, cultivate students' ability to translate systematic knowledge into practical clinical thinking, and develop a teaching concept of professional quality education with a sense of mission and responsibility. At the same time, we promote the sharing of high-quality courses through modern information technology, establish a competency-oriented knowledge framework with knowledge points as the core and the "form of dispersion and concentration" as the characteristics, and explore a new direction for the reform of clinical oncology teaching mode.

XuetangX
Clinical reasoning is the cornerstone of effective healthcare practice. It is what allows clinicians to gather information, analyze patient presentations, and make informed decisions that lead to the best possible outcomes. Whether you are working with patients in rehabilitation, acute care, or community settings, mastering clinical reasoning will enhance your ability to assess, plan, and adapt interventions based on real-world challenges.In this module, we will explore:What clinical reasoning is and why it matters in patient careThe different types of clinical reasoning and how they apply in various clinical settingsThe step-by-step clinical reasoning process, from initial assessment to treatment planningHow to develop critical thinking skills to navigate complex cases with confidenceThrough case studies, interactive discussions, and practical applications, this course will equip you with the tools to think like a clinician, ensuring that your decisions are patient-centered, evidence-based, and clinically sound.By the end of this module, you will not only understand how to approach patient cases systematically, but you will also gain the confidence to make independent, well-reasoned clinical decisions in your future practice.