Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "malware protection"
- Status: Free
Duke University
Skills you'll gain: Medical Equipment and Technology, Medical Science and Research, Emergency Medicine, Vital Signs, Patient Safety, Preventative Care, Aerospace Basic Quality System Standards, Radiation Protection, Human Factors, Respiration, Environmental Engineering, Physics, Engineering Design Process
- Status: Free Trial
Advancing Women in Tech
Skills you'll gain: Goal Setting, Engineering Management, Recruitment, Management Training And Development, Employee Retention, Talent Management, Leadership and Management, Talent Acquisition, People Management, Team Management, Team Leadership, Leadership, Interviewing Skills
- Status: Free Trial
University of Colorado System
Skills you'll gain: Cryptography, Cybersecurity, Encryption, Key Management, Public Key Cryptography Standards (PKCS), Data Integrity
- Status: Free Trial
Infosec
Skills you'll gain: File Systems, Microsoft Windows, Operating Systems, Data Structures, Data Validation, Data Integrity, Disaster Recovery, Data Storage
Emory University
Skills you'll gain: Emergency Response, Crisis Intervention, Hazard Communication (HazCom), Media and Communications, Interpersonal Communications, Persuasive Communication, Risk Management, Public Health and Disease Prevention, Public Health, Health Policy, Cultural Sensitivity
University of Maryland, College Park
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Cyber Governance, Cyber Risk, Cyber Security Assessment, Security Strategy, Cyber Security Policies, Security Management, Security Awareness, Threat Modeling, Information Privacy, Infrastructure Security, Risk Management, Vulnerability Assessments
- Status: Free Trial
Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Containerization
- Status: NewStatus: Free Trial
Amazon Web Services
Skills you'll gain: Prompt Engineering, Generative AI, Generative AI Agents, Data Ethics, AWS SageMaker, Amazon Web Services, MLOps (Machine Learning Operations), Application Programming Interface (API), Application Development, Solution Architecture, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Cloud Development, Public Cloud, Data Governance, Large Language Modeling, API Design, Cost Management, Information Privacy, Business Ethics
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Data Cleansing, Data Management, Data Validation, Data Quality, Data Integrity, Technical Communication, Automation, Requirements Analysis, Machine Learning
ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Data Security, Cybersecurity, Authentications, Email Security, Data Integrity, IT Security Architecture, Virtual Private Networks (VPN), Algorithms
- Status: Free Trial
Imperial College London
Skills you'll gain: Infectious Diseases, Epidemiology, Microbiology, Biology, Public Health, Molecular Biology
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Land Development, Landscape Architecture, Architectural Design, Environment, Community Development, Public Works, Building Design, Environment and Resource Management, Environmental Issue, Geographic Information Systems, Economic Development, Diversity Equity and Inclusion Initiatives, Cultural Diversity
In summary, here are 10 of our most popular malware protection courses
- Space Medicine:Â Duke University
- Leadership Principles for Software Engineers:Â Advancing Women in Tech
- Classical Cryptosystems and Core Concepts:Â University of Colorado System
- Windows OS Forensics:Â Infosec
- Communicating During Global Emergencies:Â Emory University
- A Strategic Approach to Cybersecurity:Â University of Maryland, College Park
- Cloud Security Risks: Identify and Protect Against Threats:Â Google Cloud
- AWS Generative AI Applications:Â Amazon Web Services
- Introduction to the Threat Intelligence Lifecycle :Â IBM
- Cryptography :Â ISC2