Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "malware identification and analysis"
Skills you'll gain: Vulnerability Assessments, Risk Management, Continuous Monitoring, Operational Risk, Threat Management, Intrusion Detection and Prevention, Cyber Risk, Vulnerability Management, Security Controls, Enterprise Risk Management (ERM), Risk Mitigation, Risk Analysis, Compliance Management, Security Information and Event Management (SIEM), Technical Communication, Auditing
Johns Hopkins University
Skills you'll gain: Statistical Analysis, R Programming, Statistical Programming, Data Analysis, Debugging, Simulations, Program Development, Software Installation, Computer Programming, Data Structures, Performance Tuning, Data Import/Export
University of Pennsylvania
Skills you'll gain: Financial Statements, Return On Investment, Financial Statement Analysis, Finance, Financial Reporting, Capital Budgeting, Financial Accounting, Financial Modeling, Working Capital, Balance Sheet, Accrual Accounting, Accounting, Cash Flows, Income Statement, Generally Accepted Accounting Principles (GAAP), Financial Analysis, Tax Planning, Equities, Financial Planning, Corporate Finance
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
Johns Hopkins University
Skills you'll gain: Rmarkdown, Exploratory Data Analysis, Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Data Visualization, Statistical Programming, Ggplot2, Dimensionality Reduction, Data Visualization Software, Data Integration, Knitr, Data Analysis, Data Import/Export, General Science and Research, Data Sharing, Statistical Reporting
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Malware Protection, Network Security, Threat Detection, Firewall, Code Review, Routing Protocols, Proxy Servers, Linux, Internet Of Things, Servers
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Threat Detection, Network Analysis, Cybersecurity, System Design and Implementation, Network Security, Machine Learning Software, Machine Learning Methods, Performance Testing, Machine Learning Algorithms, Machine Learning, Artificial Intelligence, Supervised Learning, Microsoft Windows
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
Duke University
Skills you'll gain: Statistical Hypothesis Testing, Sampling (Statistics), Statistical Inference, Exploratory Data Analysis, Regression Analysis, Statistical Reporting, Probability Distribution, Statistical Methods, Statistical Software, R Programming, Bayesian Statistics, Statistical Analysis, Data Analysis, Statistical Modeling, Probability & Statistics, Probability, Statistics, Data Science, Descriptive Statistics, Predictive Modeling
Skills you'll gain: Data Storytelling, Requirements Elicitation, Business Process Modeling, Business Analysis, Data Presentation, Process Analysis, Resource Allocation, Data Visualization, Interactive Data Visualization, Stakeholder Management, Process Optimization, Business Requirements, Requirements Management, Data Modeling, Risk Analysis, Requirements Analysis, Excel Formulas, Microsoft Excel, Data Cleansing, Analysis
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Management, Security Information and Event Management (SIEM), Data Integrity
In summary, here are 10 of our most popular malware identification and analysis courses
- Risk Identification, Monitoring, and Analysis: ISC2
- R Programming: Johns Hopkins University
- Introduction to Finance and Accounting: University of Pennsylvania
- Detecting and Mitigating Cyber Threats and Attacks: University of Colorado System
- Data Science: Foundations using R: Johns Hopkins University
- Penetration Testing, Threat Hunting, and Cryptography: IBM
- DDoS Attacks and Defenses: University of Colorado System
- Advanced Malware and Network Anomaly Detection: Johns Hopkins University
- Introduction to Cybersecurity Tools & Cyberattacks: IBM
- Data Analysis with R: Duke University