Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "malware protection"
- Status: Preview
Vanderbilt University
Skills you'll gain: Clinical Data Management, Data Capture, Clinical Research, Data Management, Data Collection, Data Sharing, Data Strategy, Data Quality, Sampling (Statistics), Data Integrity, Data Validation, Regulatory Compliance
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Database Design, SQL, Database Management Systems, NoSQL, Relational Databases, Data Warehousing, Database Theory, Database Administration, Databases, Database Architecture and Administration, Database Systems, Database Management, Data Modeling, Query Languages, MongoDB, Big Data, Data Architecture, Database Application, Data Integrity, Data Access
- Status: Free Trial
Skills you'll gain: Data Cleansing, Sampling (Statistics), Data Integrity, Data Quality, Data Processing, Data Analysis, Data Transformation, Data Validation, Sample Size Determination, SQL, Spreadsheet Software
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Risk Management Framework, Continuous Monitoring, Cyber Security Assessment, Security Controls, Information Privacy
- Status: Preview
University of Virginia
Skills you'll gain: Branding, Brand Strategy, Brand Management, Personal Attributes, Digital Assets, Social Media, Personally Identifiable Information, Computer Security Awareness Training, Self-Awareness, Social Media Strategy, Information Privacy, Constructive Feedback
- Status: Preview
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Data Integrity, Secure Coding, Algorithms
- Status: Preview
The University of North Carolina at Chapel Hill
Skills you'll gain: Environmental Laws, Environmental Policy, Environmental Regulations, Law, Regulation, and Compliance, Case Law, Pollution Prevention, Environment and Resource Management, Water Resources, Risk Control, Legal Research, Legal Proceedings
- Status: Preview
Universiteit Leiden
Skills you'll gain: Legal Proceedings, International Relations, Conflict Management, Child Welfare, Ethical Standards And Conduct, Working With Children, Legal Research, Case Law, Investigation
- Status: Free Trial
Palo Alto Networks
Skills you'll gain: Cybersecurity, Zero Trust Network Access, Cyber Threat Intelligence, Malware Protection, Network Security, Firewall, Threat Detection, Cloud Security, Endpoint Security, Security Controls, Enterprise Security, Software As A Service, Cloud Computing, Cryptography
- Status: Free Trial
New York University
Skills you'll gain: Network Security, Firewall, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
- Status: Preview
Erasmus University Rotterdam
Skills you'll gain: Email Security, Human Factors (Security), Cyber Security Policies, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Risk, Computer Security Awareness Training, Patient Safety, Malware Protection, Encryption, Health Technology, Data Security, Safety and Security, Telehealth, Information Privacy, General Data Protection Regulation (GDPR)
- Status: Free Trial
University of Colorado System
Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, Data Validation
In summary, here are 10 of our most popular malware protection courses
- Data Management for Clinical Research:Â Vanderbilt University
- Databases for Data Scientists:Â University of Colorado Boulder
- Process Data from Dirty to Clean:Â Google
- The GRC Approach to Managing Cybersecurity:Â Kennesaw State University
- Introduction to Personal Branding:Â University of Virginia
- Cryptography I:Â Stanford University
- Introduction to Environmental Law and Policy:Â The University of North Carolina at Chapel Hill
- International Humanitarian Law in Theory and Practice :Â Universiteit Leiden
- Palo Alto Networks Cybersecurity Foundation:Â Palo Alto Networks
- Real-Time Cyber Threat Detection and Mitigation:Â New York University