Filter by
The language used throughout the course, in both instruction and assessments.
Results for "malware protection"
Skills you'll gain: Incident Response, Cyber Threat Hunting, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Computer Security Incident Management, Endpoint Security, Malware Protection, Linux, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Intrusion Detection and Prevention, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Fortinet, Inc.
Skills you'll gain: Virtual Private Networks (VPN), Firewall, Network Routing, Intrusion Detection and Prevention, Authentications, Lightweight Directory Access Protocols, Network Security, Network Administration, Security Controls, System Configuration, Network Monitoring
Infosec
Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Cybersecurity, Network Security, Cyber Security Strategy, System Monitoring, Cyber Operations, Threat Management, Continuous Monitoring, Cyber Threat Intelligence, Incident Response, Cyber Attacks, Scripting, IT Automation, Network Monitoring, Command-Line Interface, Python Programming, Data Access, Intrusion Detection and Prevention
Kennesaw State University
Skills you'll gain: Network Security, Security Engineering, System Security, Computer Security Incident Management, Computer Security Models, Software Security, Cryptography, Risk Management, Security Software, Security Strategy
Microsoft
Skills you'll gain: Microsoft Azure, Application Security, Cloud Security, Infrastructure Security, Kubernetes, Network Security, Security Engineering, Firewall, Endpoint Security, Identity and Access Management, Infrastructure As A Service (IaaS), Role-Based Access Control (RBAC), Cloud Services, Virtual Machines, Containerization, Distributed Denial-Of-Service (DDoS) Attacks, Virtual Private Networks (VPN), Encryption
University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Risk Management Framework, Infrastructure Security, Cyber Attacks, Cyber Risk, Cyber Threat Intelligence, Cyber Security Policies, Public Safety and National Security, Cyber Security Assessment, Cyber Governance, Continuous Monitoring, Security Management, Incident Response, Security Strategy, Technology Roadmaps, Network Infrastructure, Technology Solutions, Transportation Operations, Infrastructure Architecture
- Status: Free
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Data Integrity, Mathematical Software, Algorithms
New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Information Systems Security, Network Security, Computer Security, Malware Protection, Data Integrity
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Cybersecurity, Cyber Operations, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Security Information and Event Management (SIEM), Threat Detection, Cloud Security, Threat Management, System Monitoring, Automation
Edureka
Skills you'll gain: Cybersecurity, Secure Coding, Cyber Security Strategy, Threat Detection, Network Security, Application Security, IT Security Architecture, Generative AI, Endpoint Security, Incident Response, Artificial Intelligence, Automation
University of Pennsylvania
Skills you'll gain: Compliance Training, Compliance Management, Regulatory Compliance, General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Compliance Auditing, Information Privacy, Governance Risk Management and Compliance, Personally Identifiable Information, Regulatory Requirements, Communication Planning, Risk Management, Internal Communications, Procedure Development, Data Security, Continuous Monitoring, Business Ethics, Governance, Internal Controls, Risk Analysis
- Status: Free
Coursera Project Network
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Security Testing, Network Security, Network Monitoring, Operating Systems
In summary, here are 10 of our most popular malware protection courses
- IBM Cybersecurity Analyst:Â IBM
- FortiGate Administrator:Â Fortinet, Inc.
- Python for Cybersecurity:Â Infosec
- Cybersecurity and Its Ten Domains:Â Kennesaw State University
- Implement Platform Protection:Â Microsoft
- Homeland Security and Cybersecurity:Â University of Colorado System
- Cryptography I:Â Stanford University
- Introduction to Cyber Attacks:Â New York University
- Detect, Respond, and Recover from Cloud Cybersecurity Attacks:Â Google Cloud
- Gen AI in Cybersecurity:Â Edureka