Filter by
The language used throughout the course, in both instruction and assessments.
Results for "malware protection"
Macquarie University
Skills you'll gain: Excel Formulas, Microsoft Excel, Excel Macros, Data Validation, Spreadsheet Software, Data Modeling, Financial Modeling, Workflow Management, Data Integrity, Automation, Data Security
The Hong Kong University of Science and Technology
Skills you'll gain: E-Commerce, Global Marketing, Brand Management, Business Strategies, Branding, Brand Strategy, Innovation, Strategic Partnership, Price Negotiation, Corporate Strategy, New Business Development, Mergers & Acquisitions, Business Process, Business Strategy, Business Software, Commercialization, New Product Development, Entrepreneurship, Creativity, Law, Regulation, and Compliance
Infosec
Skills you'll gain: Network Analysis, Network Security, Intrusion Detection and Prevention, Cybersecurity, Threat Detection, Network Monitoring, Cyber Threat Hunting, Anomaly Detection
Skills you'll gain: Cybersecurity, Cyber Operations, Cyber Threat Hunting, Intrusion Detection and Prevention, Scripting, Python Programming, Unix Commands, Command-Line Interface, Microsoft Windows, User Accounts
Universidad de los Andes
Skills you'll gain: Penetration Testing, Threat Detection, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Risk Management Framework, Cyber Attacks, Security Testing, Information Technology, Cyber Risk, Application Security, Human Factors (Security), Web Servers, Servers, Web Applications
Johns Hopkins University
Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Email Security, Threat Detection, Jupyter, Authentications, Machine Learning Algorithms, Artificial Intelligence, Multi-Factor Authentication, Threat Management, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning
Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Cybersecurity, Threat Modeling, Malware Protection, Penetration Testing, Threat Detection, Cyber Attacks, Network Security, Intrusion Detection and Prevention, Information Systems Security, Security Awareness, Lightweight Directory Access Protocols, Network Protocols
Skills you'll gain: Encryption, Identity and Access Management, Public Key Infrastructure, Endpoint Security, Cryptography, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Cryptographic Protocols, Data Security, Email Security, Computer Security Awareness Training, Advanced Encryption Standard (AES), Security Awareness, Key Management, Secure Coding, Technical Support and Services, Information Technology, Cyber Security Strategy
Kennesaw State University
Skills you'll gain: Cyber Governance, Vulnerability Management, Cyber Attacks, Cybersecurity, Cyber Risk, Threat Management, Cyber Threat Intelligence, Security Management, Vulnerability Assessments, Threat Detection, Cyber Security Strategy, Risk Management, Security Awareness, Information Systems Security, Cyber Operations, Cyber Security Policies, Incident Response, Computer Security Incident Management, Network Security, Risk Analysis
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Verification And Validation, Code Review, Linux, Vulnerability Assessments, Security Engineering, C++ (Programming Language), User Accounts, Data Validation, Debugging, Cryptography, File Systems, Authorization (Computing), C (Programming Language), Encryption, OS Process Management
Kennesaw State University
Skills you'll gain: Email Security, Wireless Networks, Mobile Security, Incident Response, Cybersecurity, Cyber Attacks, Firewall, Threat Detection, Computer Security Awareness Training, Cyber Security Policies, Proxy Servers, Computer Security Incident Management, Network Security, Threat Management, Security Awareness, Personally Identifiable Information, Cyber Risk, Virtual Private Networks (VPN), Information Privacy, Computer Networking
Skills you'll gain: Penetration Testing, Scripting, Scripting Languages, Python Programming, Cyber Security Assessment, Cyber Operations, Computer Programming, Email Security, Cybersecurity, Malware Protection, Command-Line Interface, Program Development, TCP/IP
In summary, here are 10 of our most popular malware protection courses
- Excel Skills for Business: Intermediate II:Â Macquarie University
- Protecting Business Innovation:Â The Hong Kong University of Science and Technology
- Defensive Python:Â Infosec
- Execution, persistence, privilege escalation and evasion:Â Infosec
- Vulnerabilidades y pruebas de penetración: Universidad de los Andes
- Introduction to AI for Cybersecurity:Â Johns Hopkins University
- System Hacking, Malware Threats, and Network Attacks:Â Packt
- Cybersecurity Fundamentals:Â IBM
- Cybersecurity Foundations for Risk Management:Â Kennesaw State University
- Identifying Security Vulnerabilities in C/C++Programming:Â University of California, Davis