Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "malware protection"
University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Threat Detection, Data Sharing
L&T EduTech
Skills you'll gain: Electrical Substation, Electrical Safety, High Voltage, Electrical Wiring, Basic Electrical Systems, Low Voltage, Electrical Engineering, Three-Phase, Plant Operations and Management, Wiring Diagram, Maintenance, Repair, and Facility Services, Reliability, Failure Analysis, Equipment Design, Electronic Components, Technical Standard, Control Panels, Engineering Calculations
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Threat Modeling, Email Security, Security Engineering, System Design and Implementation, Network Security, Jupyter, Authentications, Deep Learning, Machine Learning Software
Skills you'll gain: Vulnerability Management, Azure Active Directory, Cloud Security, Distributed Denial-Of-Service (DDoS) Attacks, Penetration Testing, Generative AI, Vulnerability Scanning, Vulnerability Assessments, Intrusion Detection and Prevention, Single Sign-On (SSO), Microsoft Azure, Security Management, Cyber Security Policies, Identity and Access Management, Data Management, Records Management, Authentications, System Monitoring, Data Ethics, ChatGPT
- Status: Free
Technical University of Denmark (DTU)
Skills you'll gain: Water Resources, Natural Resource Management, Environment and Resource Management, Civil Engineering, Environmental Issue, Environmental Management Systems, Land Management, Sanitation, Environmental Monitoring, Pollution Prevention, Construction Engineering, Environmental Policy, Waste Minimization, Cultural Diversity
Skills you'll gain: Penetration Testing, Scripting, Scripting Languages, Python Programming, Cyber Security Assessment, Cyber Operations, Computer Programming, Email Security, Cybersecurity, Malware Protection, Command-Line Interface, Program Development, TCP/IP
University of Michigan
Skills you'll gain: Database Design, SQL, MySQL, Relational Databases, Database Management, Databases, Data Modeling, Data Integrity, Development Environment, Software Installation
Skills you'll gain: Cloud Computing, Linux, Linux Servers, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Security Controls, Virtual Machines, Firewall, Virtualization, User Accounts
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Azure Active Directory, Microsoft Azure, Cyber Security Policies, Cloud Security, Cyber Attacks, Firewall, Cybersecurity, Malware Protection, Identity and Access Management, Data Security, Network Security, Threat Management, Endpoint Security, Security Information and Event Management (SIEM), Threat Detection, Security Controls, Scenario Testing, Role-Based Access Control (RBAC), Encryption
Johns Hopkins University
Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Email Security, Threat Detection, Jupyter, Authentications, Machine Learning Algorithms, Artificial Intelligence, Multi-Factor Authentication, Threat Management, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning
University of Colorado System
Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Cybersecurity, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, Data Validation
New York University
Skills you'll gain: Network Security, Firewall, IT Security Architecture, Distributed Denial-Of-Service (DDoS) Attacks, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
In summary, here are 10 of our most popular malware protection courses
- Proactive Computer Security:Â University of Colorado System
- Basics of Electrical Protection System:Â L&T EduTech
- AI for Cybersecurity:Â Johns Hopkins University
- Microsoft Azure Cybersecurity Tools and Solutions:Â Microsoft
- Global Environmental Management:Â Technical University of Denmark (DTU)
- Advanced Exploitation and Scripting Techniques:Â Packt
- Introduction to Structured Query Language (SQL):Â University of Michigan
- Operating Systems: Overview, Administration, and Security:Â IBM
- Azure Cybersecurity Solutions And Microsoft Defender :Â Microsoft
- Introduction to AI for Cybersecurity:Â Johns Hopkins University