Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "malware protection"
Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Cybersecurity, Threat Modeling, Malware Protection, Penetration Testing, Threat Detection, Cyber Attacks, Network Security, Intrusion Detection and Prevention, Information Systems Security, Security Awareness, Lightweight Directory Access Protocols, Network Protocols
- Status: Free
Coursera Instructor Network
Skills you'll gain: Personally Identifiable Information, Governance Risk Management and Compliance, Information Privacy, Data Governance, Data Security, Cybersecurity, Data Management, Cyber Attacks, Data Loss Prevention, Data Ethics, Cyber Governance, Cyber Risk, Encryption
Skills you'll gain: Mac OS, Cyber Threat Intelligence, Network Security, Malware Protection, Threat Management, Endpoint Security, Threat Detection, Computer Security Awareness Training, Multi-Factor Authentication, Security Strategy, Information Systems Security, Firewall, Automation
Queen Mary University of London
Skills you'll gain: General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Cloud Security, Personally Identifiable Information, Data Security, Regulation and Legal Compliance, Information Privacy, Cybersecurity, Cloud Services, Cloud Computing, Data Governance, Data Sharing
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Malware Protection, Network Security, Threat Detection, Firewall, Code Review, Routing Protocols, Proxy Servers, Linux, Internet Of Things, Servers
Skills you'll gain: Instagram, Social Media, Advertising Campaigns, Advertising, Marketing Materials, Social Media Marketing, Social Media Content, Social Media Strategy, Facebook, Copywriting, Content Creation, Marketing, Information Privacy, Campaign Management, Data Collection, Target Audience
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
Skills you'll gain: Electrical Substation, Electrical Safety, Plant Operations and Management, Three-Phase, High Voltage, Applied Mathematics, Power Electronics, Electrical Wiring, Basic Electrical Systems, Process Control, Mathematical Modeling, Matlab, Electrical Engineering, Wiring Diagram, Low Voltage, Automation, Simulation and Simulation Software, Maintenance, Repair, and Facility Services, Reliability, Engineering Calculations
Skills you'll gain: Cyber Security Policies, Cyber Security Assessment, Risk Management Framework, Security Management, Cyber Risk, Cybersecurity, Cyber Governance, Cyber Security Strategy, Security Awareness, Technical Communication
Kennesaw State University
Skills you'll gain: Email Security, Wireless Networks, Mobile Security, Incident Response, Cybersecurity, Cyber Attacks, Firewall, Threat Detection, Cyber Security Policies, Computer Security Awareness Training, Proxy Servers, Computer Security Incident Management, Network Security, Threat Management, Security Awareness, Personally Identifiable Information, Cyber Risk, Virtual Private Networks (VPN), Information Privacy, Computer Networking
Edureka
Skills you'll gain: Cybersecurity, Secure Coding, Cyber Security Strategy, Threat Detection, Network Security, Application Security, IT Security Architecture, Generative AI, Endpoint Security, Incident Response, Artificial Intelligence, Automation
In summary, here are 10 of our most popular malware protection courses
- System Hacking, Malware Threats, and Network Attacks:Â Packt
- Introduction to Data Protection and Privacy:Â Coursera Instructor Network
- Enhancing Mac Security: Strategies for Protection:Â LearnQuest
- Cloud Computing Law: Data Protection and Cybersecurity:Â Queen Mary University of London
- Introduction to Cybersecurity Tools & Cyberattacks:Â IBM
- DDoS Attacks and Defenses:Â University of Colorado System
- Fundamentals of Social Media Advertising:Â Meta
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM
- Power System: Generation, Transmission and Protection:Â L&T EduTech
- Cybersecurity Policy Foundations:Â Infosec