Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "malware protection"
- Status: Preview
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Data Integrity, Secure Coding, Algorithms
- Status: Preview
Universiteit Leiden
Skills you'll gain: Legal Proceedings, International Relations, Conflict Management, Child Welfare, Ethical Standards And Conduct, Working With Children, Legal Research, Case Law, Investigation
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Vulnerability Management, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Management, Vulnerability Assessments, Cyber Security Strategy, Network Security, Threat Management, Threat Detection, Security Controls, Cyber Governance, Firewall, Virtual Private Networks (VPN), Intrusion Detection and Prevention, Continuous Improvement Process
- Status: Preview
The University of North Carolina at Chapel Hill
Skills you'll gain: Environmental Laws, Environmental Policy, Environmental Regulations, Law, Regulation, and Compliance, Case Law, Pollution Prevention, Environment and Resource Management, Water Resources, Risk Control, Legal Research, Legal Proceedings
- Status: Free Trial
New York University
Skills you'll gain: Network Security, Firewall, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
- Status: Free Trial
Skills you'll gain: Application Performance Management, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Kubernetes, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Load Balancing, System Monitoring, Prompt Engineering, Network Monitoring, Cloud Computing Architecture, Containerization, Network Architecture, Role-Based Access Control (RBAC), Network Security, OAuth, Network Routing, Cloud Security, Virtual Private Networks (VPN)
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Risk Management Framework, Continuous Monitoring, Cyber Security Assessment, Security Controls, Information Privacy
- Status: Free Trial
Skills you'll gain: Encryption, Cybersecurity, Cyber Attacks, Threat Management, Security Strategy, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
- Status: Free Trial
Macquarie University
Skills you'll gain: Excel Formulas, Microsoft Excel, Excel Macros, Data Validation, Spreadsheet Software, Data Modeling, Financial Forecasting, Workflow Management, Data Integrity, Business Modeling, Automation
- Status: Free Trial
Palo Alto Networks
Skills you'll gain: Cybersecurity, Zero Trust Network Access, Cyber Threat Intelligence, Malware Protection, Network Security, Firewall, Threat Detection, Cloud Security, Endpoint Security, Security Controls, Enterprise Security, Software As A Service, Cloud Computing, Cryptography
- Status: Free Trial
New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
- Status: Preview
Erasmus University Rotterdam
Skills you'll gain: Email Security, Human Factors (Security), Cyber Security Policies, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Risk, Computer Security Awareness Training, Patient Safety, Malware Protection, Encryption, Health Technology, Data Security, Safety and Security, Telehealth, Information Privacy, General Data Protection Regulation (GDPR)
In summary, here are 10 of our most popular malware protection courses
- Cryptography I:Â Stanford University
- International Humanitarian Law in Theory and Practice :Â Universiteit Leiden
- The Foundations of Cybersecurity:Â Kennesaw State University
- Introduction to Environmental Law and Policy:Â The University of North Carolina at Chapel Hill
- Real-Time Cyber Threat Detection and Mitigation:Â New York University
- Preparing for Google Cloud Certification: Cloud Security Engineer:Â Google Cloud
- The GRC Approach to Managing Cybersecurity:Â Kennesaw State University
- Cybersecurity Threat Vectors and Mitigation:Â Microsoft
- Excel Skills for Business: Intermediate II:Â Macquarie University
- Palo Alto Networks Cybersecurity Foundation:Â Palo Alto Networks