Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "malware protection"
- Status: Free Trial
University of Michigan
Skills you'll gain: Database Design, SQL, Relational Databases, PostgreSQL, Database Theory, Database Management, Data Modeling, Databases, Data Integrity
- Status: Free Trial
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Information and Event Management (SIEM), Security Controls, Document Management, Data Integrity, Technical Communication, Technical Documentation
- Status: Free Trial
Skills you'll gain: Security Controls, Governance, Cybersecurity, Information Assurance, Risk Management Framework, Cyber Security Policies, Cyber Governance, Data Ethics, Cyber Risk, Security Awareness, Data Integrity
- Status: Free Trial
University of Colorado System
Skills you'll gain: Cryptography, Data Integrity, Encryption, Authentications, Data Security, Public Key Cryptography Standards (PKCS), Digital Communications
Skills you'll gain: Incident Response, Security Controls, Cryptography, Malware Protection, Key Management, Vulnerability Assessments, Risk Management, Continuous Monitoring, Public Key Infrastructure, Endpoint Security, Disaster Recovery, Computer Security Incident Management, OSI Models, Network Security, Encryption, Authentications, Mobile Security, Operational Risk, Security Awareness, Authorization (Computing)
- Status: Free Trial
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Health Informatics, Health Technology, Health Policy, Health Care, Healthcare Industry Knowledge, Health Information Management, Information Technology, Health Care Procedure and Regulation, System Requirements, Interoperability, Electronic Medical Record, Data Literacy, Technology Strategies, Medical Imaging, Emerging Technologies, Information Privacy
- Status: Free Trial
University of Pennsylvania
Skills you'll gain: Intellectual Property, Law, Regulation, and Compliance, Creativity, Legal Strategy, Lawsuits, Musical Composition, Legal Research, Commercial Laws
- Status: Preview
Universidad Nacional Autónoma de México
Skills you'll gain: Generative AI, Prompt Engineering, ChatGPT, AI Personalization, Education Software and Technology, Large Language Modeling, Artificial Intelligence, Creativity, Data Ethics, Computer Vision, Information Privacy, Ethical Standards And Conduct, Intellectual Property
- Status: Free Trial
Skills you'll gain: Cybersecurity, Cyber Operations, Cyber Threat Hunting, Persistence, Intrusion Detection and Prevention, Scripting, Python Programming, Authorization (Computing), Command-Line Interface, Operating Systems
- Status: Free Trial
University of Colorado System
Skills you'll gain: Digital Communications, OSI Models, Network Protocols, TCP/IP, Network Routing, Network Architecture, Network Planning And Design, Computer Networking, System Programming, Data Integrity
- Status: Free Trial
Skills you'll gain: Cyber Security Policies, Cyber Security Assessment, Risk Management Framework, Security Management, Cyber Risk, Cybersecurity, Cyber Governance, Security Awareness
In summary, here are 10 of our most popular malware protection courses
- Database Design and Basic SQL in PostgreSQL:Â University of Michigan
- Incident Response and Digital Forensics:Â IBM
- Security Principles:Â ISC2
- Cryptographic Hash and Integrity Protection:Â University of Colorado System
- ISC2 Systems Security Certified Practitioner (SSCP):Â ISC2
- Introduction to Applied Cryptography:Â University of Colorado System
- The Social and Technical Context of Health Informatics:Â Johns Hopkins University
- Copyright Law:Â University of Pennsylvania
- IA generativa en el aula: Universidad Nacional Autónoma de México
- Execution, persistence, privilege escalation and evasion:Â Infosec