Filter by
The language used throughout the course, in both instruction and assessments.
Results for "malware mitigation"
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Threat Detection, Network Analysis, Cybersecurity, System Design and Implementation, Network Security, Machine Learning Software, Machine Learning Methods, Performance Testing, Machine Learning Algorithms, Machine Learning, Artificial Intelligence, Supervised Learning, Microsoft Windows
University of Pennsylvania
Skills you'll gain: Regulatory Compliance, Compliance Management, Compliance Training, Law, Regulation, and Compliance, Governance Risk Management and Compliance, Regulatory Requirements, Compliance Auditing, Risk Management, Governance, Risk Mitigation, Business Ethics
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Verification And Validation, Code Review, Linux, Vulnerability Assessments, Security Engineering, C++ (Programming Language), User Accounts, Data Validation, Debugging, Cryptography, File Systems, Authorization (Computing), C (Programming Language), Encryption, OS Process Management
University of California, Irvine
Skills you'll gain: Cyber Governance, Threat Management, Security Management, Cyber Risk, Compliance Management, Risk Management, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Data Governance, Information Assurance, Program Standards, Computer Security
Kennesaw State University
Skills you'll gain: Vulnerability Management, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Management, Vulnerability Assessments, Cyber Security Strategy, Network Security, Cyber Risk, Threat Detection, Security Controls, Firewall, Virtual Private Networks (VPN), Intrusion Detection and Prevention, Continuous Improvement Process
Royal Holloway, University of London
Skills you'll gain: Human Factors (Security), Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Cyber Risk, Threat Modeling, Security Awareness, Social Sciences, Culture, Psychology, Survey Creation
Skills you'll gain: Security Controls, Incident Response, Cyber Risk, Vulnerability Management, Cyber Security Strategy, Vulnerability Scanning, Vulnerability Assessments, Threat Management, Security Management, IT Management, Risk Management, Cyber Security Policies, Threat Detection, Penetration Testing, Cyber Security Assessment, Business Risk Management, Data Security, Disaster Recovery, Business Continuity Planning
Kennesaw State University
Skills you'll gain: Network Security, Security Management, Firewall, Cyber Attacks, Network Monitoring, Cybersecurity, Cyber Security Assessment, Network Protocols, Computer Networking, Virtual Private Networks (VPN), Wireless Networks, Vulnerability Assessments, Cloud Security, Continuous Monitoring, TCP/IP, Intrusion Detection and Prevention, Threat Detection, Mobile Security, Cryptography, Encryption
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Malware Protection, Network Security, Threat Detection, Firewall, Code Review, Routing Protocols, Proxy Servers, Linux, Internet Of Things, Servers
Skills you'll gain: Intrusion Detection and Prevention, Continuous Monitoring, Threat Management, Firewall, Incident Response, Network Security, Threat Detection, Network Monitoring, Infrastructure Security, Real Time Data
Johns Hopkins University
Skills you'll gain: Malware Protection, Cybersecurity, Internet Of Things, Network Monitoring, TCP/IP, Network Security, Network Analysis, Border Gateway Protocol, Threat Detection, Network Routing, Network Protocols, Vulnerability Assessments, Docker (Software)
University of Illinois Urbana-Champaign
Skills you'll gain: Land Management, Water Resources, Risk Management, Food and Beverage, Risk Mitigation, Business Risk Management, Environment and Resource Management, Insurance, Lease Contracts, Marketing, Real Estate, Loans, Inventory and Warehousing
In summary, here are 10 of our most popular malware mitigation courses
- Advanced Malware and Network Anomaly Detection:Â Johns Hopkins University
- What is Compliance?:Â University of Pennsylvania
- Identifying Security Vulnerabilities in C/C++Programming:Â University of California, Davis
- Security Governance & Compliance:Â University of California, Irvine
- The Foundations of Cybersecurity:Â Kennesaw State University
- Cybercrime:Â Royal Holloway, University of London
- Risk Management for Cyber Security Managers:Â Packt
- Managing Network Security:Â Kennesaw State University
- DDoS Attacks and Defenses:Â University of Colorado System
- Next-Generation Firewalls and Intrusion Prevention:Â LearnQuest