Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "malware protection"
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Responsible AI, Cyber Threat Intelligence, Cyber Attacks, Cybersecurity, Cyber Security Assessment, Security Controls, Security Engineering, Threat Modeling, DevSecOps, Artificial Intelligence, Cyber Governance, Data Security, Artificial Intelligence and Machine Learning (AI/ML), Encryption, Risk Management, Machine Learning, Application Programming Interface (API), Regulation and Legal Compliance, Applied Machine Learning, Governance
- Status: Free Trial
New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Computer Security Incident Management, Cybersecurity, Applied Machine Learning, Network Security, Machine Learning Algorithms, Machine Learning, Machine Learning Software, Unsupervised Learning, Supervised Learning, Artificial Neural Networks
- Status: Free Trial
University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Metasploit, Security Testing, Exploit development, Security Strategy, Threat Modeling, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Threat Detection
- Status: Free Trial
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Computer Networking, Cybersecurity, Cyber Security Strategy, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks
- Status: Free Trial
New York University
Skills you'll gain: Network Security, Firewall, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
- Status: Free Trial
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Computer Security Incident Management, Metasploit, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Exploit development, Cloud Security, Security Strategy, Computer Security Awareness Training, Risk Management, Enterprise Security
- Status: Preview
Edureka
Skills you'll gain: Cybersecurity, Secure Coding, Cyber Security Strategy, Threat Detection, Network Security, Application Security, Generative AI, Intrusion Detection and Prevention, Endpoint Security, Incident Response, Artificial Intelligence, IT Automation, Data Analysis
- Status: Free Trial
University of Colorado System
Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Exploitation techniques, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, C (Programming Language)
- Status: Free Trial
Skills you'll gain: Cyber Security Policies, Cyber Security Assessment, Risk Management Framework, Security Management, Cyber Risk, Cybersecurity, Threat Management, Cyber Governance, Security Awareness
- Status: Free Trial
Skills you'll gain: Vulnerability Management, Azure Active Directory, Cloud Security, Distributed Denial-Of-Service (DDoS) Attacks, Penetration Testing, Generative AI, Vulnerability Assessments, Intrusion Detection and Prevention, Security Testing, Single Sign-On (SSO), Microsoft Azure, Cyber Security Policies, Security Management, Network Security, Identity and Access Management, Generative Model Architectures, Data Management, Cybersecurity, Cyber Threat Intelligence, System Monitoring
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Data Loss Prevention, Threat Management, Application Security, Cloud Security, Vulnerability Management, Infrastructure Security, Threat Detection, Security Controls, Data Security, Continuous Monitoring, Identity and Access Management
In summary, here are 10 of our most popular malware protection courses
- Cyber Security: Security of AI:Â Macquarie University
- Cyber Attack Countermeasures:Â New York University
- Machine Learning and Emerging Technologies in Cybersecurity:Â Johns Hopkins University
- Proactive Computer Security:Â University of Colorado System
- Cyber Security – Technology and Governance: Royal Holloway, University of London
- Real-Time Cyber Threat Detection and Mitigation:Â New York University
- Cybersecurity for Business:Â University of Colorado System
- Gen AI in Cybersecurity:Â Edureka
- Hacking and Patching:Â University of Colorado System
- Cybersecurity Policy Foundations:Â Infosec