Filter by
The language used throughout the course, in both instruction and assessments.
Results for "malware protection"
Macquarie University
Skills you'll gain: Microsoft Excel, Dashboard, Excel Formulas, Spreadsheet Software, Data Visualization, Excel Macros, Data Validation, Data Analysis Expressions (DAX), Data Cleansing, Data Modeling, Microsoft 365, Business Intelligence, Financial Modeling, Workflow Management, Data Management, Consolidation, Data Integrity, Productivity Software, Data Entry, Business Reporting
Skills you'll gain: Business Intelligence, Data Modeling, Dashboard, Database Design, Extract, Transform, Load, Data Integration, Stakeholder Engagement, Data Warehousing, Databases, Data Presentation, Performance Tuning, Data Pipelines, Database Systems, Data Visualization Software, Business Reporting, Data Integrity, Business Analytics, Real Time Data, Requirements Elicitation, Scalability
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
Skills you'll gain: Cloud Infrastructure, Application Performance Management, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Kubernetes, Identity and Access Management, Data Loss Prevention, Load Balancing, System Monitoring, Infrastructure As A Service (IaaS), Network Monitoring, Cloud Applications, Cloud Computing Architecture, Network Architecture, Role-Based Access Control (RBAC), Network Security, Cloud Computing, Network Routing, Cloud Security, Virtual Private Networks (VPN)
University of Michigan
Skills you'll gain: Database Design, SQL, MySQL, Relational Databases, Database Management, Databases, Data Modeling, Data Integrity, Development Environment, Software Installation
- Status: [object Object]
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Cloud Security, Threat Management, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
University of Colorado System
Skills you'll gain: Cryptography, Theoretical Computer Science, BlockChain, Security Engineering
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
- Status: Free
Michigan State University
Microsoft
Skills you'll gain: Penetration Testing, Security Testing, System Testing, Vulnerability Management, Cloud Security, Cybersecurity, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Microsoft Azure, Firewall, Virtual Private Networks (VPN)
LearnKartS
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Penetration Testing, Cloud Computing, Cybersecurity, Mobile Security, Application Security, Cyber Threat Intelligence, Virtualization, Encryption, Cryptography, Vulnerability Assessments, SQL
- Status: [object Object]
Skills you'll gain: Data Storytelling, Business Metrics, Key Performance Indicators (KPIs), Data Management, Data Collection, Data Governance, Bayesian Statistics, Data Analysis, Descriptive Statistics, Statistical Hypothesis Testing, Information Privacy, Data Cleansing, Pandas (Python Package), Data Visualization Software, Statistical Inference, Spreadsheet Software, Correlation Analysis, Google Sheets, Exploratory Data Analysis, Data Manipulation
In summary, here are 10 of our most popular malware protection courses
- Excel Skills for Business:Â Macquarie University
- Google Business Intelligence:Â Google
- Cybersecurity Threat Vectors and Mitigation:Â Microsoft
- Preparing for Google Cloud Certification: Cloud Security Engineer:Â Google Cloud
- Introduction to Structured Query Language (SQL):Â University of Michigan
- Microsoft Cybersecurity Analyst:Â Microsoft
- Cryptographic Hash and Integrity Protection:Â University of Colorado System
- IT Fundamentals for Cybersecurity:Â IBM
- Write Your First Novel:Â Michigan State University
- Cybersecurity Tools and Technologies:Â Microsoft