Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "malware protection"
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Cyber Governance, Governance Risk Management and Compliance, Cyber Security Policies, Cyber Security Strategy, Cyber Risk, Threat Modeling, Enterprise Security, Cyber Security Assessment, Compliance Management, Cybersecurity, Governance, ISO/IEC 27001, Security Controls, Vulnerability Assessments, Risk Management, Audit Planning, NIST 800-53, Risk Mitigation, Regulation and Legal Compliance, Policy Analysis
- Status: Free Trial
LearnKartS
Skills you'll gain: Cloud Security, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Penetration Testing, Cloud Computing, Mobile Security, Application Security, Exploit development, Virtualization, Encryption, Cryptography, Vulnerability Scanning, SQL
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Incident Response, Cyber Governance, Cyber Security Strategy, Cyber Threat Intelligence, Threat Modeling, Cyber Risk, Risk Management, Threat Management, Threat Detection, Cyber Attacks, Cyber Security Policies, Cybersecurity, Cyber Security Assessment, Leadership, Governance, Compliance Management, Leadership and Management, ISO/IEC 27001, NIST 800-53, Resilience
- Status: NewStatus: Free Trial
Skills you'll gain: Linux Administration, Ubuntu, Hardening, Linux, Application Security, Operating System Administration, Security Controls, Service Management, Patch Management, Information Systems Security
- Status: Free Trial
Fortinet, Inc.
Skills you'll gain: Virtual Private Networks (VPN), Firewall, Network Routing, Intrusion Detection and Prevention, Authentications, Network Security, Network Administration, Security Controls, User Accounts, System Configuration, Network Monitoring, Web Servers
- Status: Free Trial
Skills you'll gain: Security Management, Threat Management, Cybersecurity, Cyber Risk, Risk Management, Incident Response, Vulnerability Management, Security Information and Event Management (SIEM), Security Controls, Continuous Monitoring, Information Systems Security, Enterprise Security, Risk Analysis, Threat Detection, Information Assurance, Auditing, Compliance Auditing
- Status: Preview
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
- Status: Free Trial
Skills you'll gain: Network Security, Hardening, Network Protocols, Cloud Security, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, Network Infrastructure, Firewall, Cloud Computing, Virtual Private Networks (VPN)
- Status: Free Trial
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Open Web Application Security Project (OWASP), Vulnerability Assessments, Exploitation techniques, Test Planning
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Vulnerability Management, Cybersecurity, Cyber Attacks, Cyber Security Policies, Vulnerability Assessments, Cyber Security Strategy, Network Security, Cyber Risk, Threat Detection, Security Controls, Firewall, Virtual Private Networks (VPN), Intrusion Detection and Prevention, Continuous Improvement Process
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Fraud detection, Email Security, Threat Detection, Jupyter, Authentications, Intrusion Detection and Prevention, Machine Learning Algorithms, Artificial Intelligence, Artificial Intelligence and Machine Learning (AI/ML), Natural Language Processing, Machine Learning, Deep Learning, Supervised Learning
Skills you'll gain: Exploitation techniques, Metasploit, Vulnerability Assessments, Vulnerability Scanning, Security Testing, Cybersecurity, Virtual Machines, Technical Writing, Web Servers, Linux
In summary, here are 10 of our most popular malware protection courses
- Cyber Security: GRC Part 1 - Governance:Â Macquarie University
- Advanced Cybersecurity:Â LearnKartS
- Cyber Security: GRC Part 2 - Risk Management and Compliance:Â Macquarie University
- Linux Security Basics and Beyond: Unit 2:Â Pearson
- FortiGate Administrator:Â Fortinet, Inc.
- Play It Safe: Manage Security Risks:Â Google
- Cyber Security Technologies:Â Illinois Tech
- Connect and Protect: Networks and Network Security:Â Google
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM
- The Foundations of Cybersecurity:Â Kennesaw State University