Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "malware protection"
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Management, Cybersecurity, Remote Access Systems, Zero Trust Network Access, Application Deployment, Software Installation, Infrastructure Architecture, Linux Administration, Systems Architecture, Linux, Software Versioning
- Status: Free Trial
Vanderbilt University
Skills you'll gain: Prompt Engineering, Law Practice Management Software, Generative AI, Legal Writing, Legal Research, Data Ethics, Legal Support, ChatGPT, Artificial Intelligence, Emerging Technologies, Information Privacy
- Status: Free Trial
Duke University
Skills you'll gain: Blockchain, FinTech, Emerging Technologies, Cryptography, Cryptographic Protocols, Financial Regulation, Regulatory Compliance, Technology Strategies, Payment Systems, Data Integrity, Digital Assets, Financial Services, Feasibility Studies, Business Valuation, Distributed Computing, Due Diligence, Scalability
University of Maryland, College Park
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Cyber Governance, Cyber Risk, Cyber Security Assessment, Security Strategy, Cyber Security Policies, Security Management, Security Awareness, Threat Modeling, Information Privacy, Infrastructure Security, Risk Management, Vulnerability Assessments
- Status: Free Trial
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Security Controls, Key Management, Threat Modeling, Authorization (Computing), Encryption, Data Integrity, Authentications, Vulnerability Assessments
- Status: Free Trial
Infosec
Skills you'll gain: File Systems, Microsoft Windows, Operating Systems, Data Structures, Data Validation, Data Integrity, Disaster Recovery, Data Storage
University of Pittsburgh
Skills you'll gain: Dental Procedures, Dentistry, Oral and Dental Care, Radiography, Dental Care, Oral Health, Oral Hygiene, Medical Imaging, Radiology, Medical Terminology, Radiation Protection, Dental Hygiene, Medical Office Procedures, X-Ray Computed Tomography, Surgery, Practice Management Software, Pediatrics, Anatomy, Health Information Management and Medical Records
ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Data Security, Cybersecurity, Authentications, Email Security, Data Integrity, IT Security Architecture, Virtual Private Networks (VPN), Algorithms
Emory University
Skills you'll gain: Emergency Response, Crisis Intervention, Hazard Communication (HazCom), Media and Communications, Interpersonal Communications, Persuasive Communication, Risk Management, Public Health and Disease Prevention, Public Health, Health Policy, Cultural Sensitivity
- Status: Free Trial
University of Colorado System
Skills you'll gain: Cryptography, Cybersecurity, Encryption, Key Management, Public Key Cryptography Standards (PKCS), Data Integrity
- Status: Free
Duke University
Skills you'll gain: Medical Equipment and Technology, Medical Science and Research, Emergency Medicine, Vital Signs, Patient Safety, Preventative Care, Aerospace Basic Quality System Standards, Radiation Protection, Human Factors, Respiration, Environmental Engineering, Physics, Engineering Design Process
- Status: Free Trial
Imperial College London
Skills you'll gain: Infectious Diseases, Epidemiology, Microbiology, Biology, Public Health, Molecular Biology
In summary, here are 10 of our most popular malware protection courses
- Check Point Jump Start: Harmony Endpoint Security:Â Check Point Software Technologies Ltd.
- Generative AI for Legal Services Primer:Â Vanderbilt University
- Blockchain Business Models:Â Duke University
- A Strategic Approach to Cybersecurity:Â University of Maryland, College Park
- Design and Analyze Secure Networked Systems:Â University of Colorado System
- Windows OS Forensics:Â Infosec
- Introduction to Dental Terminology:Â University of Pittsburgh
- Cryptography :Â ISC2
- Communicating During Global Emergencies:Â Emory University
- Classical Cryptosystems and Core Concepts:Â University of Colorado System