Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "malware protection"
- Status: Free Trial
Advancing Women in Tech
Skills you'll gain: Product Management, Product Roadmaps, Product Strategy, Product Requirements, New Product Development, Product Lifecycle Management, Competitive Analysis, Customer experience strategy (CX), Customer Insights, Innovation, Persuasive Communication, Market Analysis
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Health Informatics, Health Technology, Health Policy, Health Care, Healthcare Industry Knowledge, Health Information Management, Information Technology, Health Care Procedure and Regulation, System Requirements, Interoperability, Electronic Medical Record, Data Literacy, Technology Strategies, Medical Imaging, Emerging Technologies, Information Privacy
- Status: Free Trial
LearnKartS
Skills you'll gain: Cloud Security, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Penetration Testing, Cloud Computing, Mobile Security, Cloud Services, Cloud Infrastructure, Virtualization, Encryption, Cryptography, Vulnerability Assessments, SQL
Skills you'll gain: Incident Response, Security Controls, Cryptography, Malware Protection, Key Management, Vulnerability Assessments, Risk Management, Continuous Monitoring, Public Key Infrastructure, Endpoint Security, Disaster Recovery, Computer Security Incident Management, OSI Models, Network Security, Encryption, Authentications, Mobile Security, Operational Risk, Security Awareness, Authorization (Computing)
- Status: Free Trial
Skills you'll gain: Intrusion Detection and Prevention, Computer Security Incident Management, Cyber Threat Hunting, Cyber Attacks, Cybersecurity, Cyber Operations, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Security Information and Event Management (SIEM), Threat Detection, Cloud Security, Security Controls, Threat Management, System Monitoring, IT Automation, Record Keeping, Problem Management
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Email Security, Threat Detection, Threat Modeling, Jupyter, Authentications, Intrusion Detection and Prevention, Machine Learning Algorithms, Artificial Intelligence, Multi-Factor Authentication, Artificial Intelligence and Machine Learning (AI/ML), Computer Vision, Natural Language Processing, Machine Learning, Deep Learning
- Status: Free Trial
Michigan State University
Skills you'll gain: Photography, Photo Editing, Peer Review, Color Theory, Storytelling, Creativity, Information Privacy, Web Design and Development
- Status: Free Trial
Skills you'll gain: Network Analysis, Network Security, Cyber Operations, MITRE ATT&CK Framework, Cybersecurity, Threat Detection, Network Monitoring, Penetration Testing, Anomaly Detection, Scripting, Network Protocols, Authentications, TCP/IP, Python Programming, Data Access, User Accounts, System Programming, Automation
Universitat Autònoma de Barcelona
Skills you'll gain: Digital Transformation, Liberal Arts, Research, Human Computer Interaction, Open Source Technology, Technology Solutions, Computer Science, Data Ethics, Image Analysis, Social Sciences, Computer Vision, Artificial Intelligence, Information Privacy
Universidad Nacional Autónoma de México
Skills you'll gain: Generative AI, Prompt Engineering, ChatGPT, AI Personalization, Education Software and Technology, Large Language Modeling, Artificial Intelligence, Creativity, Data Ethics, Computer Vision, Information Privacy, Ethical Standards And Conduct, Intellectual Property
Lund University
Skills you'll gain: Data Ethics, Artificial Intelligence, Social Justice, Algorithms, Ethical Standards And Conduct, Information Privacy, Political Sciences, Emerging Technologies, Governance, Law, Regulation, and Compliance
- Status: Free Trial
LearnKartS
Skills you'll gain: Cloud Security, Penetration Testing, Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Malware Protection, Cybersecurity, Threat Modeling, Cloud Computing, Mobile Security, Cyber Security Assessment, Cyber Attacks, Security Testing, Cloud Services, Threat Detection, Cloud Infrastructure, Information Systems Security, Intrusion Detection and Prevention, Cyber Threat Intelligence, Firewall, Incident Response
In summary, here are 10 of our most popular malware protection courses
- The Business of Product Management I:Â Advancing Women in Tech
- The Social and Technical Context of Health Informatics:Â Johns Hopkins University
- Advanced Cybersecurity:Â LearnKartS
- ISC2 Systems Security Certified Practitioner (SSCP):Â ISC2
- Detect, Respond, and Recover from Cloud Cybersecurity Attacks:Â Google Cloud
- Introduction to AI for Cybersecurity:Â Johns Hopkins University
- Photography Techniques: Light, Content, and Sharing:Â Michigan State University
- Advanced Python Scripting for Cybersecurity:Â Infosec
- Humanidades digitales: Universitat Autònoma de Barcelona
- IA generativa en el aula: Universidad Nacional Autónoma de México