Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "malware protection"
Skills you'll gain: Security Management, Threat Management, Cybersecurity, Cyber Risk, Risk Management, Incident Response, Risk Mitigation, Security Information and Event Management (SIEM), Security Controls, Threat Modeling, Security Strategy, Continuous Monitoring, Data Security, Information Systems Security, Computer Security, Enterprise Security, Risk Analysis, Information Assurance, Open Web Application Security Project (OWASP), Auditing
Google
Skills you'll gain: Generative AI, Artificial Intelligence and Machine Learning (AI/ML), Productivity Software, Artificial Intelligence, Data Ethics, Security Awareness, Business Workflow Analysis, Innovation, Automation, Workflow Management, Information Privacy, Human Computer Interaction, Content Creation, Natural Language Processing, Complex Problem Solving
University of Colorado Boulder
Skills you'll gain: SQL, Database Design, Database Management Systems, NoSQL, Data Warehousing, Database Theory, Relational Databases, Database Architecture and Administration, Database Management, Database Administration, Databases, Query Languages, Data Modeling, Data Analysis, Big Data, Data Architecture, Data Integrity, Data Manipulation, Transaction Processing, Scalability
Cisco Learning and Certifications
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Malware Protection, Network Monitoring, Network Administration, TCP/IP, Network Infrastructure, Infrastructure Security, Intrusion Detection and Prevention, Network Protocols, Load Balancing, Firewall, Cybersecurity, General Networking, Authorization (Computing), Web Applications, Security Controls, Web Servers, Authentications
Berklee
Skills you'll gain: Entrepreneurship, Contract Negotiation, Team Building, Design Thinking, Creativity, Ideation, Innovation, Creative Problem-Solving, Creative Thinking, Negotiation, Law, Regulation, and Compliance, Ethical Standards And Conduct, Business Ethics, Revenue Management, Income Statement, Contract Review, Regulatory Compliance, Performance Analysis, Asset Protection, Decision Making
University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Cybersecurity, Computer Networking, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks, Cyber Risk
University of Pennsylvania
Skills you'll gain: Compliance Training, Compliance Management, Regulatory Compliance, General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Compliance Auditing, Information Privacy, Governance Risk Management and Compliance, Personally Identifiable Information, Regulatory Requirements, Communication Planning, Risk Management, Internal Communications, Procedure Development, Data Security, Continuous Monitoring, Compliance Reporting, Business Ethics, Internal Controls, Risk Analysis
Vanderbilt University
Skills you'll gain: ChatGPT, Generative AI, OpenAI, Artificial Intelligence, Personalized Service, Data Ethics, Expense Management, Artificial Intelligence and Machine Learning (AI/ML), Creative Thinking, Productivity Software, Creativity, Digital Transformation, Business Process Automation, Expense Reports, Innovation, Natural Language Processing, Law, Regulation, and Compliance, Test Case, Scenario Testing, Information Privacy
University of Michigan
Skills you'll gain: Database Design, SQL, MySQL, Relational Databases, Database Management, Databases, Data Modeling, Data Integrity, Development Environment, Software Installation
- Status: Free
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Data Integrity, Mathematical Software, Algorithms
Skills you'll gain: Threat Modeling, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Vulnerability Assessments, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Personally Identifiable Information, Encryption
Skills you'll gain: Contract Negotiation, Post-Production, Active Listening, Negotiation, Constructive Feedback, Law, Regulation, and Compliance, Ethical Standards And Conduct, Business Ethics, Empathy, Emotional Intelligence, Business Management, Media Production, Contract Review, Data Import/Export, Editing, Multimedia, Regulatory Compliance, File Management, Asset Protection, Decision Making
In summary, here are 10 of our most popular malware protection courses
- Play It Safe: Manage Security Risks:Â Google
- Google AI Essentials:Â Google
- Databases for Data Scientists:Â University of Colorado Boulder
- Network Security:Â Cisco Learning and Certifications
- Music Business:Â Berklee
- Cyber Security – Technology and Governance: University of London
- Regulatory Compliance:Â University of Pennsylvania
- Prompt Engineering for Law:Â Vanderbilt University
- Introduction to Structured Query Language (SQL):Â University of Michigan
- Cryptography I:Â Stanford University