Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "malware protection"
Skills you'll gain: Malware Protection, Cyber Threat Hunting, Cyber Security Assessment, Application Security, Threat Detection, Network Analysis, Virtual Machines, Code Review, Debugging, System Programming, Microsoft Windows, Windows PowerShell, Programming Principles, Computer Architecture, Excel Macros, Linux
- Status: Free Trial
Skills you'll gain: Excel Formulas, Microsoft Excel, Data Cleansing, Data Analysis, Data Import/Export, Spreadsheet Software, Data Wrangling, Data Quality, Pivot Tables And Charts, Google Sheets, Data Manipulation, Data Visualization Software, Information Privacy
- Status: Free Trial
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Intrusion Detection and Prevention, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
- Status: Free TrialStatus: AI skills
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, System Testing, Cloud Security, Threat Management, Vulnerability Scanning, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
- Status: Free Trial
University of Pennsylvania
Skills you'll gain: Compliance Training, Compliance Management, General Data Protection Regulation (GDPR), Regulatory Compliance, Law, Regulation, and Compliance, Compliance Reporting, Regulation and Legal Compliance, Legal Risk, Compliance Auditing, Information Privacy, Governance Risk Management and Compliance, Personally Identifiable Information, Regulatory Requirements, Risk Management, Internal Communications, Procedure Development, Data Security, Continuous Monitoring, Business Ethics, Internal Controls
- Status: Free Trial
University of Pennsylvania
Skills you'll gain: General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Information Privacy, Personally Identifiable Information, Regulatory Compliance, Data Security, Health Care Procedure and Regulation, Incident Response, Governance
- Status: Free Trial
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Infrastructure Security, Authorization (Computing), Multi-Factor Authentication
- Status: Free Trial
Skills you'll gain: Information Systems Security, Network Security, Computer Security, Application Security, Cybersecurity, Security Awareness, Cyber Attacks, Encryption, Data Security, Cryptography, Security Strategy, Information Technology, Security Management, Authorization (Computing), Threat Management, Firewall, Authentications, Identity and Access Management, Threat Detection, Hardening
Coursera Instructor Network
Skills you'll gain: General Data Protection Regulation (GDPR), Personally Identifiable Information, Governance Risk Management and Compliance, Information Privacy, Data Governance, Data Security, Cybersecurity, Data Management, Data Storage, Cyber Risk, Data Processing, Data Access, Encryption
- Status: Free Trial
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, Threat Management, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Open Web Application Security Project (OWASP), Cyber Operations, Vulnerability Assessments, Security Information and Event Management (SIEM), Test Planning, Network Analysis, Data Integrity
- Status: Free Trial
Macquarie University
Skills you'll gain: Microsoft Excel, Dashboard, Excel Formulas, Spreadsheet Software, Data Visualization, Excel Macros, Data Validation, Data Analysis Expressions (DAX), Data Cleansing, Data Modeling, Financial Forecasting, Predictive Modeling, Financial Modeling, Workflow Management, Finance, Data Management, Business Intelligence Software, Consolidation, Data Integrity, Data Entry
- Status: Free Trial
Skills you'll gain: Prompt Engineering, Generative AI, ChatGPT, Cyber Threat Intelligence, Security Information and Event Management (SIEM), Threat Modeling, OpenAI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Large Language Modeling, Artificial Intelligence, Natural Language Processing, Program Development, Anomaly Detection, Vulnerability Management, Content Creation, Image Analysis, Virtual Environment
In summary, here are 10 of our most popular malware protection courses
- Malware Analysis and Introduction to Assembly Language:Â IBM
- Excel Basics for Data Analysis:Â IBM
- IBM Cybersecurity Analyst:Â IBM
- Microsoft Cybersecurity Analyst:Â Microsoft
- Regulatory Compliance:Â University of Pennsylvania
- Privacy Law and Data Protection:Â University of Pennsylvania
- Introduction to Cybersecurity Tools & Cyberattacks:Â IBM
- IT Security: Defense against the digital dark arts :Â Google
- Introduction to Data Protection and Privacy:Â Coursera Instructor Network
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM