• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Malware Detection Techniques

Results for "malware+detection+techniques"


  • M

    Macquarie University

    Cyber Security: Essentials for AI

    Skills you'll gain: Data Security, Security Testing, Data Ethics, Cyber Security Strategy, Cyber Threat Intelligence, Security Controls, Cyber Risk, Data Sharing, Intrusion Detection and Prevention, Cyber Attacks, Cybersecurity, Cyber Threat Hunting, Cyber Governance, Security Management, Artificial Intelligence and Machine Learning (AI/ML), Security Awareness, Security Strategy, AI Product Strategy, Security Software, Generative AI

    4.6
    Rating, 4.6 out of 5 stars
    ·
    29 reviews

    Beginner · Specialization · 3 - 6 Months

  • M

    Macquarie University

    Cyber Security: DevOps

    Skills you'll gain: DevSecOps, Cryptography, Network Security, Secure Coding, Application Security, Encryption, IT Security Architecture, Security Testing, Data Ethics, Advanced Encryption Standard (AES), Cyber Threat Intelligence, Cybersecurity, Cyber Security Assessment, CI/CD, Cloud Security, Software Development, Security Controls, Security Awareness, Artificial Intelligence and Machine Learning (AI/ML), Software Architecture

    4.6
    Rating, 4.6 out of 5 stars
    ·
    21 reviews

    Beginner · Specialization · 3 - 6 Months

  • E

    Edureka

    Penetration Testing and Vulnerability Scanning

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Cyber Security Assessment, Open Web Application Security Project (OWASP), Exploitation techniques, Application Security, Patch Management, Cyber Threat Intelligence, Web Applications, Cyber Engineering, Cyber Security Policies, Cyber Governance, Risk Management Framework, Linux Administration, Ethical Standards And Conduct, Linux, Linux Commands, Linux Servers

    Beginner · Course · 1 - 4 Weeks

  • E

    EDUCBA

    Kali Linux: Ethical Hacking & Pentesting

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Malware Protection, Exploitation techniques, Database Management, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Security Assessment, Brute-force attacks, Cryptography, Cybersecurity, Vulnerability Scanning, Intrusion Detection and Prevention, Data Import/Export, MySQL, Encryption, Mobile Security, Linux, Linux Administration

    4.8
    Rating, 4.8 out of 5 stars
    ·
    77 reviews

    Beginner · Specialization · 3 - 6 Months

  • E

    Edureka

    Cyber Threat Intelligence and Incident Response

    Skills you'll gain: Incident Response, Vulnerability Assessments, Vulnerability Management, Cyber Threat Intelligence, MITRE ATT&CK Framework, Cybersecurity, Endpoint Detection and Response, Intrusion Detection and Prevention, Cyber Attacks, Security Information and Event Management (SIEM), Event Monitoring, Cyber Engineering, Patch Management, Network Security, Malware Protection, Continuous Monitoring, Security Management, Cyber Risk, Digital Forensics, Risk Analysis

    Intermediate · Specialization · 1 - 3 Months

  • I

    ISC2

    Systems and Application Security

    Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Deployment, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Encryption

    4.7
    Rating, 4.7 out of 5 stars
    ·
    32 reviews

    Beginner · Course · 1 - 4 Weeks

  • I

    ISC2

    Risk Identification, Monitoring, and Analysis

    Skills you'll gain: Vulnerability Assessments, Risk Management, Continuous Monitoring, Operational Risk, Threat Management, Intrusion Detection and Prevention, Business Risk Management, Cyber Risk, Vulnerability Management, Security Controls, Enterprise Risk Management (ERM), Risk Mitigation, Risk Analysis, Compliance Management, Law, Regulation, and Compliance, Security Information and Event Management (SIEM), Technical Communication, Network Monitoring, Network Analysis

    4.6
    Rating, 4.6 out of 5 stars
    ·
    31 reviews

    Beginner · Course · 1 - 4 Weeks

  • J

    Johns Hopkins University

    Information Assurance Analysis

    Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, AI Security, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Network Monitoring, Responsible AI, Network Routing, Infrastructure Security, Application Security

    4
    Rating, 4 out of 5 stars
    ·
    10 reviews

    Intermediate · Specialization · 3 - 6 Months

  • N

    New York University

    Cyber Attack Countermeasures

    Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication

    4.7
    Rating, 4.7 out of 5 stars
    ·
    710 reviews

    Intermediate · Course · 1 - 4 Weeks

  • S

    Starweaver

    Threat Hunting Techniques

    Skills you'll gain: Cyber Threat Hunting, Splunk, Threat Detection, Jupyter, Anomaly Detection, Cybersecurity, Data Analysis, Data Science, Applied Machine Learning, Security Information and Event Management (SIEM), Pandas (Python Package), Interactive Data Visualization, Data Cleansing, Data Preprocessing, MLOps (Machine Learning Operations), Unsupervised Learning, Automation

    Intermediate · Course · 1 - 3 Months

  • G

    Google

    Secure Against Network Intrusions

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Network Protocols

    4.9
    Rating, 4.9 out of 5 stars
    ·
    8 reviews

    Beginner · Course · 1 - 4 Weeks

  • M

    Microsoft

    Cybersecurity Testing and Prevention

    Skills you'll gain: Vulnerability Management, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Security Testing, Network Security, Threat Management, System Testing, Firewall, Cybersecurity, Cloud Security, Microsoft Azure, Virtual Private Networks (VPN), Virtual Networking, Command-Line Interface

    Beginner · Course · 1 - 4 Weeks

1234…9

In summary, here are 10 of our most popular malware+detection+techniques courses

  • Cyber Security: Essentials for AI: Macquarie University
  • Cyber Security: DevOps: Macquarie University
  • Penetration Testing and Vulnerability Scanning: Edureka
  • Kali Linux: Ethical Hacking & Pentesting: EDUCBA
  • Cyber Threat Intelligence and Incident Response: Edureka
  • Systems and Application Security: ISC2
  • Risk Identification, Monitoring, and Analysis: ISC2
  • Information Assurance Analysis: Johns Hopkins University
  • Cyber Attack Countermeasures: New York University
  • Threat Hunting Techniques: Starweaver

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok