Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "malware protection"
- Status: Free Trial
New York University
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Cyber Attacks, Cybersecurity, Malware Protection, Cyber Risk, Unix, Computer Security, Information Systems Security, Cryptography
- Status: Preview
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Public Key Cryptography Standards (PKCS), Advanced Encryption Standard (AES), Key Management, Cybersecurity, Authentications, Data Integrity, Algorithms
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Investigation, Criminal Investigation and Forensics, Intrusion Detection and Prevention, Mobile Security, Network Security, File Systems, Event Monitoring, Cyber Operations, Cybersecurity, Threat Detection, Data Ethics, Network Analysis, Security Engineering, Digital Communications, Computer Security Incident Management, Data Storage, Incident Response, Regulation and Legal Compliance, Malware Protection, Disaster Recovery
- Status: Free Trial
University at Buffalo
Skills you'll gain: Blockchain, Transaction Processing, Cryptography, Payment Systems, Public Key Cryptography Standards (PKCS), Data Integrity, Data Structures, Distributed Computing, Emerging Technologies, Virtual Machines, Verification And Validation
- Status: Free Trial
Skills you'll gain: Data Cleansing, Data Integrity, Data Quality, Sampling (Statistics), Data Transformation, Data Validation, Data Wrangling, Data Manipulation, Data Analysis, SQL, Sample Size Determination, Exploratory Data Analysis, Spreadsheet Software
- Status: Free Trial
Skills you'll gain: Endpoint Detection and Response, Networking Hardware, Cybersecurity, Linux, IT Service Management, Governance Risk Management and Compliance, Active Directory, Network Security, Cloud Computing, Incident Response, TCP/IP, Malware Protection, Information Technology Infrastructure Library, Identity and Access Management, Network Protocols, Cyber Attacks, Regulatory Compliance, Data Ethics, Cyber Threat Intelligence, Security Testing
- Status: Free Trial
Skills you'll gain: Threat Management, Cybersecurity, Network Security, Cryptography, Cyber Security Strategy, Cyber Threat Intelligence, Encryption, Security Strategy, Threat Detection, Information Systems Security, Security Controls, Data Security, Firewall, Active Directory, Identity and Access Management
- Status: NewStatus: Preview
Universidad Nacional Autónoma de México
Skills you'll gain: Law, Regulation, and Compliance, Data Ethics, Risk Management Framework, Artificial Intelligence, Education and Training, Ethical Standards And Conduct, Education Software and Technology, Social Sciences, Artificial Intelligence and Machine Learning (AI/ML), Information Privacy, Generative AI Agents, Generative AI, Analysis
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Cryptography, Network Security, Blockchain, Encryption, Public Key Infrastructure, Application Security, Computer Security, Data Encryption Standard, Cybersecurity, Data Security, Key Management, Security Engineering, Personally Identifiable Information, Information Assurance, Secure Coding, Data Integrity, Security Management, Virtual Private Networks (VPN), Hardware Architecture, Intellectual Property
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Security, Threat Detection, Cyber Risk, Cybersecurity, General Data Protection Regulation (GDPR), Threat Modeling, Information Assurance, Data Ethics, Risk Management, Data Governance, Data Encryption Standard, Data Access, Vulnerability, Security Software, Security Management, Compliance Management, Security Strategy, NIST 800-53
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cybersecurity, Vulnerability Management, Cyber Security Policies, Cyber Security Strategy, Network Security, Vulnerability Assessments, Threat Management, Threat Detection, Security Controls, Intrusion Detection and Prevention, Firewall, Authorization (Computing), Virtual Private Networks (VPN)
- Status: NewStatus: Preview
Huddersfield Sandbox
Skills you'll gain: Journalism, Media and Communications, Data Ethics, Ethical Standards And Conduct, Content Creation, Research, Investigation, Information Privacy
In summary, here are 10 of our most popular malware protection courses
- Introduction to Cyber Attacks:Â New York University
- Cryptography I:Â Stanford University
- Digital Forensics:Â Macquarie University
- Blockchain Basics:Â University at Buffalo
- Process Data from Dirty to Clean:Â Google
- IT Fundamentals for Cybersecurity:Â IBM
- Cybersecurity Threat Vectors and Mitigation:Â Microsoft
- IA: Ética en la Inteligencia Artificial Educativa: Universidad Nacional Autónoma de México
- Applied Cryptography & Information Security:Â Macquarie University
- Data Security & Information Privacy:Â Macquarie University