Filter by
The language used throughout the course, in both instruction and assessments.
Results for "malware protection"
Skills you'll gain: Cloud Infrastructure, Application Performance Management, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Kubernetes, Identity and Access Management, Data Loss Prevention, Load Balancing, System Monitoring, Infrastructure As A Service (IaaS), Network Monitoring, Cloud Applications, Cloud Computing Architecture, Network Architecture, Role-Based Access Control (RBAC), Network Security, Cloud Computing, Network Routing, Cloud Security, Virtual Private Networks (VPN)
University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Cybersecurity, Computer Networking, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks, Cyber Risk
University of Colorado System
Skills you'll gain: Risk Management Framework, Infrastructure Security, Cyber Security Policies, Continuous Monitoring, Security Management, Cyber Governance, Cybersecurity, Cyber Security Strategy, Security Strategy, Cyber Risk
Vanderbilt University
Skills you'll gain: ChatGPT, Generative AI, Crisis Management, Incident Response, OpenAI, Data Ethics, Computer Security Incident Management, Artificial Intelligence, Personalized Service, Business Ethics, Information Privacy, Personally Identifiable Information, Cross-Functional Collaboration, Threat Detection, Threat Management, Expense Management, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Creative Thinking, Creative Problem-Solving
University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Threat Detection, Data Sharing
Skills you'll gain: Contract Negotiation, Peer Review, Active Listening, Negotiation, Media Production, Law, Regulation, and Compliance, Ethical Standards And Conduct, Constructive Feedback, Content Creation, Writing, Business Management, Contract Review, Data Import/Export, Editing, Multimedia, Regulatory Compliance, File Management, Asset Protection, Decision Making, Creativity
- Status: Free
Check Point Software Technologies Ltd.
University of California, Davis
Skills you'll gain: Security Engineering, Software Security, Security Software, System Security, Java Programming
Skills you'll gain: Penetration Testing, Network Protocols, Network Security, Network Analysis, Malware Protection, Cyber Security Assessment, Cyber Threat Intelligence, Vulnerability Assessments, System Configuration, Image Analysis, Open Source Technology, Virtual Machines, Linux, Software Installation, Microsoft Windows
Imperial College London
Skills you'll gain: Sanitation, Infection Control, Infectious Diseases, Environment Health And Safety, Epidemiology, Preventative Care, Emergency Response, Water Resources, Health And Safety Standards, Health Care, Public Safety and National Security, Pollution Prevention, Medical Science and Research, Environmental Issue, Environmental Monitoring, Ethical Standards And Conduct
University of Colorado System
Skills you'll gain: Network Security, Security Engineering, Security Software, Software Security, System Security, Computer Programming, Computer Security Incident Management, Operating Systems, SQL, Software Testing
Skills you'll gain: Cybersecurity, Cyber Operations, Cyber Threat Hunting, Intrusion Detection and Prevention, Scripting, Python Programming, Unix Commands, Command-Line Interface, Microsoft Windows, User Accounts
In summary, here are 10 of our most popular malware protection courses
- Preparing for Google Cloud Certification: Cloud Security Engineer: Google Cloud
- Cyber Security – Technology and Governance: University of London
- Cybersecurity Policy for Water and Electricity Infrastructures: University of Colorado System
- Generative AI Cybersecurity & Privacy for Leaders: Vanderbilt University
- Proactive Computer Security: University of Colorado System
- The Business of Music Production: Berklee
- Check Point Jump Start: Harmony Endpoint Security: Check Point Software Technologies Ltd.
- Exploiting and Securing Vulnerabilities in Java Applications: University of California, Davis
- Digital Forensics for Pentesters - Hands-On Learning: Packt
- Foundations of Public Health Practice: Health Protection: Imperial College London