Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "malware threats"
University of California, Irvine
Skills you'll gain: Threat Modeling, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Business Risk Management, Risk Management Framework, Risk Mitigation, Risk Modeling, Vulnerability Assessments, Security Controls
Johns Hopkins University
Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Email Security, Threat Detection, Jupyter, Authentications, Machine Learning Algorithms, Artificial Intelligence, Multi-Factor Authentication, Threat Management, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning
New York University
Skills you'll gain: Network Security, Firewall, Distributed Denial-Of-Service (DDoS) Attacks, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Cyber Attacks, Security Controls, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
- Status: New
Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Mobile Security, Cybersecurity, Threat Modeling, Penetration Testing, Cyber Threat Intelligence, Open Web Application Security Project (OWASP), Malware Protection, Threat Detection, Network Security, MITRE ATT&CK Framework, Cyber Attacks, Intrusion Detection and Prevention, Information Systems Security, Wireless Networks, Cryptography, Risk Management Framework, Encryption
Johns Hopkins University
Skills you'll gain: Generative AI, Feature Engineering, Cybersecurity, Threat Modeling, Security Engineering, Deep Learning, Anomaly Detection, Artificial Intelligence, Artificial Neural Networks, Data Processing, Applied Machine Learning, Reinforcement Learning, Data Modeling, Machine Learning, Performance Tuning
University of Maryland, College Park
Skills you'll gain: Closing (Sales), Sales Process, Selling Techniques, Technical Sales, Sales, Sales Strategy, Prospecting and Qualification, Emerging Technologies, Needs Assessment, Negotiation, Forecasting, Cloud Computing, Cybersecurity, Information Technology
Kennesaw State University
Skills you'll gain: Cybersecurity, Network Security, Disaster Recovery, Application Security, Computer Security, Cryptography, Cyber Risk, Authorization (Computing), Secure Coding, Systems Development Life Cycle, Security Controls, Cyber Governance, Cyber Security Policies, Infrastructure Security, Data Security, Safety and Security, Identity and Access Management, Incident Management, Data Encryption Standard, Authentications
Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Threat Detection, Incident Response, Event Monitoring, Computer Security Incident Management, Network Analysis, Cybersecurity, Anomaly Detection, Network Security, Network Monitoring, SQL
- Status: Free
Tel Aviv University
Skills you'll gain: Social Justice, Economics, Policy, and Social Studies, Socioeconomics, Tax, Economics, Public Policies, Income Tax, Ethical Standards And Conduct, Policy Analysis, Technology Strategies, Environmental Policy
- Status: Free
EIT Digital
Skills you'll gain: Email Security, Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Identity and Access Management, Threat Detection, User Accounts, Information Privacy, Entrepreneurship
University of Michigan
Skills you'll gain: Crisis Management, Leadership, Strategic Communication, Resilience, Stakeholder Management, Business Continuity, Organizational Change, Dealing With Ambiguity, Communication Strategies, Business Risk Management, Adaptability, Value Propositions
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Verification And Validation, Linux, Vulnerability Assessments, C++ (Programming Language), User Accounts, Data Validation, Cryptography, File Systems, Authorization (Computing), C (Programming Language), Encryption, OS Process Management
Searches related to malware threats
In summary, here are 10 of our most popular malware threats courses
- Introduction to Risk Management:Â University of California, Irvine
- Introduction to AI for Cybersecurity:Â Johns Hopkins University
- Real-Time Cyber Threat Detection and Mitigation:Â New York University
- Certified Ethical Hacker (CEH) v.12:Â Packt
- Securing AI and Advanced Topics:Â Johns Hopkins University
- Fundamentals of Technology Sales:Â University of Maryland, College Park
- Cybersecurity and Its Ten Domains:Â Kennesaw State University
- Threat Analysis:Â Cisco Learning and Certifications
- Economic Growth and Distributive Justice Part I - The Role of the State:Â Tel Aviv University
- Cybersecurity Awareness and Innovation:Â EIT Digital