Filter by
The language used throughout the course, in both instruction and assessments.
Results for "malware mitigation"
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Management, Cybersecurity, Zero Trust Network Access, Application Deployment, Network Protocols, Identity and Access Management, Software Installation, Infrastructure Architecture, Solution Architecture, Linux
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Cyber Governance, Incident Management, Incident Response, Security Management, Cyber Security Strategy, Cyber Security Policies, Human Factors (Security), Security Awareness, ISO/IEC 27001, Computer Security Awareness Training, Cyber Risk, Information Assurance
University of Colorado Boulder
Skills you'll gain: Risk Management, Enterprise Risk Management (ERM), Mitigation, Business Risk Management, Risk Mitigation, Crisis Management, Environmental Policy, Natural Resource Management, Environmental Issue, Pollution Prevention, Environment and Resource Management, Corporate Sustainability, Community Development, Vulnerability, Adaptability, Decision Making, Policy Analysis, Economics
New York University
Skills you'll gain: Cyber Attacks, Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cybersecurity, IT Security Architecture, Cloud Security, NIST 800-53, Cyber Threat Intelligence, Hybrid Cloud Computing, Cloud Computing Architecture, Payment Card Industry (PCI) Data Security Standards, Security Controls, Risk Management Framework, Blockchain, Internet Of Things, Data Integrity
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Threat Detection, Network Analysis, Cybersecurity, System Design and Implementation, Network Security, Machine Learning Software, Machine Learning Methods, Performance Testing, Machine Learning Algorithms, Machine Learning, Artificial Intelligence, Supervised Learning, Microsoft Windows
University of Pennsylvania
Skills you'll gain: Regulatory Compliance, Compliance Management, Compliance Training, Law, Regulation, and Compliance, Governance Risk Management and Compliance, Regulatory Requirements, Compliance Auditing, Risk Management, Governance, Risk Mitigation, Business Ethics
University of Colorado System
Skills you'll gain: Infrastructure Security, Cyber Risk, Cyber Security Policies, Cyber Security Assessment, Cybersecurity, Cyber Security Strategy, Risk Management Framework, Technology Roadmaps, Network Infrastructure, Transportation Operations, Infrastructure Architecture
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Verification And Validation, Code Review, Linux, Vulnerability Assessments, Security Engineering, C++ (Programming Language), User Accounts, Data Validation, Debugging, Cryptography, File Systems, Authorization (Computing), C (Programming Language), Encryption, OS Process Management
Coursera Project Network
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Vulnerability Management, Cybersecurity, Information Systems Security, Data Ethics, Command-Line Interface, Technical Documentation
University of California, Irvine
Skills you'll gain: Cyber Governance, Threat Management, Security Management, Cyber Risk, Compliance Management, Risk Management, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Data Governance, Information Assurance, Program Standards, Computer Security
Skills you'll gain: Intrusion Detection and Prevention, Continuous Monitoring, Threat Management, Firewall, Incident Response, Network Security, Threat Detection, Network Monitoring, Infrastructure Security, Real Time Data
Kennesaw State University
Skills you'll gain: Network Security, Security Management, Firewall, Cyber Attacks, Network Monitoring, Cybersecurity, Cyber Security Assessment, Network Protocols, Computer Networking, Virtual Private Networks (VPN), Wireless Networks, Vulnerability Assessments, Cloud Security, Continuous Monitoring, TCP/IP, Intrusion Detection and Prevention, Threat Detection, Mobile Security, Cryptography, Encryption
In summary, here are 10 of our most popular malware mitigation courses
- Check Point Jump Start: Harmony Endpoint Security:Â Check Point Software Technologies Ltd.
- Security Management and Governance:Â Royal Holloway, University of London
- How Do We Manage Climate Change?:Â University of Colorado Boulder
- Enterprise and Infrastructure Security:Â New York University
- Advanced Malware and Network Anomaly Detection:Â Johns Hopkins University
- What is Compliance?:Â University of Pennsylvania
- Cybersecurity Policy for Aviation and Internet Infrastructures:Â University of Colorado System
- Identifying Security Vulnerabilities in C/C++Programming:Â University of California, Davis
- Metasploit for Beginners: Ethical Penetration Testing:Â Coursera Project Network
- Security Governance & Compliance:Â University of California, Irvine