Filter by
The language used throughout the course, in both instruction and assessments.
Results for "malware mitigation"
- Status: Free
University of Cape Town
Skills you'll gain: Water Resources, Adaptability, Land Management, Mitigation, Environmental Issue, Civil Engineering, Environment, Capacity Planning, Finance, Natural Resource Management, Environment and Resource Management, Risk Management, Stakeholder Engagement, Food and Beverage, Vulnerability, Governance
Skills you'll gain: Incident Response, Security Controls, Cryptography, Malware Protection, Key Management, Vulnerability Assessments, Risk Management, Continuous Monitoring, Public Key Infrastructure, Endpoint Security, Disaster Recovery, Computer Security Incident Management, OSI Models, Network Security, Encryption, Authentications, Mobile Security, Operational Risk, Security Awareness, Authorization (Computing)
- Status: Free
Universiteit Leiden
Skills you'll gain: Environmental Issue, Environment, Pollution Prevention, Environmental Policy, Systems Thinking, Socioeconomics, Natural Resource Management, Environmental Monitoring, Community Organizing, Complex Problem Solving, Student Engagement, Mitigation, Risk Analysis
University of Colorado System
Skills you'll gain: Application Security, Vulnerability Assessments, Software Design, Threat Modeling, Vulnerability Management, Secure Coding, Software Design Patterns, Software Architecture, Software Visualization, Cryptography, Cybersecurity, Blockchain
- Status: Free
Campus BBVA
Skills you'll gain: Incident Response, Computer Security Incident Management, Cybersecurity, Cyber Attacks, Security Management, Security Information and Event Management (SIEM), Information Systems Security, Data Security, Incident Management, Cyber Threat Intelligence, Application Security, Computer Security Awareness Training, Intrusion Detection and Prevention, Information Technology Operations, Threat Management, Security Controls, Threat Detection, Malware Protection, Loss Prevention, Continuous Monitoring
University of California, Irvine
Skills you'll gain: Vendor Management, Security Management, Risk Analysis, Security Awareness, Cyber Security Strategy, Risk Management, Threat Management, Security Controls, Human Factors (Security), Asset Protection, Due Diligence
Kennesaw State University
Skills you'll gain: Cyber Governance, Vulnerability Management, Cyber Attacks, Cybersecurity, Cyber Risk, Threat Management, Cyber Threat Intelligence, Security Management, Vulnerability Assessments, Threat Detection, Cyber Security Strategy, Risk Management, Security Awareness, Information Systems Security, Cyber Operations, Cyber Security Policies, Incident Response, Computer Security Incident Management, Network Security, Risk Analysis
Skills you'll gain: Data Governance, Database Management, Incident Management, Problem Management, Disaster Recovery, Service Management, Asset Management, Business Continuity, Service Level Agreement, Information Technology Operations, Information Systems, IT Infrastructure, Security Controls, Data Integrity, Compliance Auditing, Auditing, System Implementation, Business Risk Management, Change Control, Computer Hardware
Skills you'll gain: Cyber Risk, Risk Management, Enterprise Risk Management (ERM), Risk Analysis, Risk Modeling, Security Management, Operational Risk, Cybersecurity, Business Risk Management, Compliance Management, Stakeholder Communications, Continuous Improvement Process, Compliance Reporting, Decision Making, Financial Analysis
Universidade de São Paulo
Skills you'll gain: Project Performance, Project Risk Management, Communication Planning, Risk Analysis, Project Controls, Risk Mitigation, Change Control, Scope Management, Change Management, Stakeholder Management, Communication, Knowledge Transfer
Duke University
Skills you'll gain: Microsoft Azure, OpenAI, Risk Management Framework, MLOps (Machine Learning Operations), Cloud Computing, Artificial Intelligence and Machine Learning (AI/ML), Software Architecture, Platform As A Service (PaaS), Semantic Web, Generative AI, Application Deployment, Cloud Services, Information Architecture, Artificial Intelligence, Systems Architecture, Query Languages, Natural Language Processing, Containerization, Application Programming Interface (API), Python Programming
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Cybersecurity, Virtual Private Networks (VPN), Remote Access Systems, Network Protocols, Vulnerability Assessments, Encryption, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
In summary, here are 10 of our most popular malware mitigation courses
- Climate Adaptation in Africa:Â University of Cape Town
- ISC2 Systems Security Certified Practitioner (SSCP):Â ISC2
- The Great Sustainability Transition: Global challenges, Local actions:Â Universiteit Leiden
- Software Design Threats and Mitigations:Â University of Colorado System
- Cybersecurity for Tech Professionals:Â Campus BBVA
- Personnel & Third-Party Security:Â University of California, Irvine
- Cybersecurity Foundations for Risk Management:Â Kennesaw State University
- Information Systems Operations and Business Resiliency:Â Packt
- Practical Applications of FAIRâ„¢ for Cyber Risk Management:Â FAIR Institute
- Gestão de Riscos e de Mudanças em Projetos: Universidade de São Paulo