Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "malware creation and delivery"
- Status: Free
Coursera Project Network
Skills you'll gain: Excel Formulas, Spreadsheet Software, Microsoft Excel, Microsoft 365, Data Analysis Software, Gross Profit, Business Mathematics
University of California, Irvine
Skills you'll gain: Cash Management, Financial Analysis, Financial Statements, Budgeting, Accounting, Cash Flow Forecasting, Business Valuation, Financial Accounting, Finance, Financial Management, Balance Sheet
Kennesaw State University
Skills you'll gain: Data Collection, Lean Six Sigma, Six Sigma Methodology, Quality Improvement, Process Improvement, Business Process, Project Management, Project Planning, Customer experience improvement, Data Validation, Process Mapping, Statistics, Stakeholder Management, Statistical Analysis
Google Cloud
Skills you'll gain: Digital Transformation, Cloud Services, Cloud Infrastructure, Infrastructure As A Service (IaaS), Cloud Computing, Public Cloud, Business Transformation, Technology Strategies, Google Cloud Platform, Software As A Service, Platform As A Service (PaaS), Hybrid Cloud Computing, Cloud Security, Multi-Cloud, Capital Expenditure
Skills you'll gain: Flutter (Software), Mobile Development, iOS Development, Apple iOS, User Interface (UI), Android Development, User Interface and User Experience (UI/UX) Design, Application Development, Cross Platform Development, Application Programming Interface (API), Software Development Tools, Debugging, Object Oriented Programming (OOP)
- Status: Free
Rice University
Skills you'll gain: Chemistry, General Science and Research, Physics, Laboratory Research, Scientific Methods, Experimentation
Skills you'll gain: Penetration Testing, Network Security, Mobile Security, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Threat Detection, Cybersecurity, Authorization (Computing), Security Awareness, Encryption, Malware Protection, Identity and Access Management, Wireless Networks, Data Security, Intrusion Detection and Prevention, Computer Security Awareness Training, Cyber Threat Intelligence
University of Michigan
Skills you'll gain: UI/UX Research, User Experience, User Centered Design, Interaction Design, Prototyping, Usability Testing, Design Thinking, Human Computer Interaction, Human Factors, User Interface (UI) Design, Ideation
Skills you'll gain: Extract, Transform, Load, Power BI, Data Validation, Data Transformation, Data Cleansing, Data Storage, Data Quality, Data Analysis, Data Integration, Data Storage Technologies, Business Intelligence
Lund University
Skills you'll gain: Intellectual Property, Legal Writing, Labor Law, Arbitration, Environmental Laws, Case Law, Legal Research, Tax Laws, Regulation and Legal Compliance, Law, Regulation, and Compliance, Commercial Laws, Legal Strategy, Business, International Relations, Compliance Management, Business Strategy, European History, Competitive Analysis, Regulatory Compliance, Business Economics
- Status: Free
Georgia Institute of Technology
Skills you'll gain: Structural Analysis, Structural Engineering, Engineering Analysis, Mechanical Engineering, Mechanics, Engineering
Imperial College London
Skills you'll gain: Dimensionality Reduction, NumPy, Probability & Statistics, Feature Engineering, Jupyter, Data Science, Statistics, Linear Algebra, Python Programming, Advanced Mathematics, Machine Learning, Calculus
In summary, here are 10 of our most popular malware creation and delivery courses
- Using Basic Formulas and Functions in Microsoft Excel: Coursera Project Network
- Finance for Non-Financial Professionals: University of California, Irvine
- Six Sigma Tools for Define and Measure: Kennesaw State University
- Digital Transformation with Google Cloud: Google Cloud
- Flutter and Dart: Developing iOS, Android, and Mobile Apps: IBM
- General Chemistry: Concept Development and Application: Rice University
- Cybersecurity Attack and Defense Fundamentals: EC-Council
- Introduction to User Experience Principles and Processes: University of Michigan
- Extract, Transform and Load Data in Power BI: Microsoft
- European Business Law: Lund University