Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "malware protection"
- Status: Free Trial
University of Colorado System
Skills you'll gain: Digital Communications, OSI Models, Network Architecture, TCP/IP, Network Planning And Design, Network Protocols, Network Infrastructure, Computer Networking, General Networking, Application Programming Interface (API), Data Integrity
- Status: Free Trial
Skills you'll gain: Security Controls, Information Assurance, Cyber Governance, Cybersecurity, Threat Management, Governance, Risk Management Framework, Security Awareness, Data Ethics, Data Integrity, Vulnerability Assessments
- Status: Free Trial
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Google Cloud Platform, Threat Management, Application Security, Personally Identifiable Information, Data Loss Prevention, Malware Protection, Infrastructure Security, Data Security, Security Controls, IT Automation, Continuous Monitoring, Security Information and Event Management (SIEM), Identity and Access Management
- Status: Preview
The University of North Carolina at Chapel Hill
Skills you'll gain: Data Sharing, Data Management, Metadata Management, Data Strategy, Data Governance, Records Management, Data Storage, Data Integrity, Data Access, Data Security, Information Privacy, Version Control
- Status: Free Trial
Fortinet, Inc.
Skills you'll gain: Firewall, Virtual Private Networks (VPN), Intrusion Detection and Prevention, Network Security, Authentications, Network Administration, Network Routing, Lightweight Directory Access Protocols, Network Monitoring, Security Controls, System Configuration, Application Performance Management
Skills you'll gain: Endpoint Security, Incident Response, Public Key Infrastructure, Security Controls, Cryptography, Continuous Monitoring, Risk Management Framework, Malware Protection, Network Security, Key Management, Computer Security Incident Management, Risk Management, Vulnerability Assessments, Data Security, Authentications, Authorization (Computing), OSI Models, Encryption, Disaster Recovery, Security Management
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Threat Detection, Anomaly Detection, Malware Protection, Cybersecurity, Network Security, Network Analysis, Machine Learning Algorithms, Machine Learning Methods, Microsoft Windows, Supervised Learning, Machine Learning
- Status: Free Trial
Skills you'll gain: Azure Active Directory, Penetration Testing, Generative AI, Threat Management, Intrusion Detection and Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Security Information and Event Management (SIEM), Authentications, Records Management, Microsoft Azure, Data Management, Cyber Security Policies, Identity and Access Management, Authorization (Computing), Security Testing, Cyber Threat Intelligence, Cybersecurity, System Monitoring, Data Ethics
- Status: Free Trial
Skills you'll gain: Cybersecurity, Cyber Operations, Cyber Threat Hunting, Persistence, Intrusion Detection and Prevention, Scripting, Python Programming, Authorization (Computing), Command-Line Interface, Operating Systems
- Status: Free Trial
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Intrusion Detection and Prevention, Cybersecurity, Security Management, Threat Detection, Security Information and Event Management (SIEM), Cyber Attacks, Cyber Threat Hunting, Event Monitoring, Data Analysis Software, Technical Communication, Data Integrity, Technical Documentation
- Status: Free Trial
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cryptography, Data Encryption Standard, Public Key Cryptography Standards (PKCS), Information Systems Security, Cryptographic Protocols, Encryption, Application Security, Cybersecurity, Key Management, Computer Security, Advanced Encryption Standard (AES), Security Engineering, Data Integrity, Secure Coding, Authentications, Security Requirements Analysis, Threat Modeling, Scalability, Data Security
- Status: Free Trial
University of Colorado System
Skills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Threat Detection, Cyber Security Strategy, Threat Management, Data Security, Cybersecurity, Endpoint Detection and Response, Firewall, Cyber Attacks, Security Controls, Network Security, Cyber Security Assessment, System Monitoring
In summary, here are 10 of our most popular malware protection courses
- Fundamentals of Network Communication:Â University of Colorado System
- Security Principles:Â ISC2
- Mitigating Security Vulnerabilities on Google Cloud:Â Google Cloud
- Research Data Management and Sharing:Â The University of North Carolina at Chapel Hill
- FortiGate Administrator:Â Fortinet, Inc.
- ISC2 Systems Security Certified Practitioner (SSCP):Â ISC2
- Advanced Malware and Network Anomaly Detection:Â Johns Hopkins University
- Microsoft Azure Cybersecurity Tools and Solutions:Â Microsoft
- Execution, persistence, privilege escalation and evasion:Â Infosec
- Incident Response and Digital Forensics:Â IBM