• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Malware Detection Techniques

Results for "malware+detection+techniques"


  • G

    Google

    Sound the Alarm: Detection and Response

    Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Threat Detection, Event Monitoring, Security Information and Event Management (SIEM), Incident Management, Security Management, Continuous Monitoring, Network Security, Network Monitoring, Splunk, Network Analysis, TCP/IP, Network Protocols, Query Languages

    4.8
    Rating, 4.8 out of 5 stars
    ·
    3.3K reviews

    Beginner · Course · 1 - 4 Weeks

  • E

    Edureka

    Cyber Threat Intelligence and Incident Response

    Skills you'll gain: Incident Response, Vulnerability Assessments, Vulnerability Management, Cyber Threat Intelligence, MITRE ATT&CK Framework, Cybersecurity, Endpoint Detection and Response, Intrusion Detection and Prevention, Cyber Attacks, Security Information and Event Management (SIEM), Event Monitoring, Cyber Engineering, Patch Management, Network Security, Malware Protection, Continuous Monitoring, Security Management, Cyber Risk, Digital Forensics, Risk Analysis

    Intermediate · Specialization · 1 - 3 Months

  • C

    Coursera

    Securing Applications with Checkmarx

    Skills you'll gain: Secure Coding, Open Web Application Security Project (OWASP), DevSecOps, Security Testing, Application Security, Vulnerability Scanning, Vulnerability Assessments, Vulnerability Management, CI/CD, Continuous Monitoring, Docker (Software), Technical Communication, Computer Programming

    Intermediate · Course · 1 - 4 Weeks

  • E

    Edureka

    Penetration Testing and Vulnerability Scanning

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Cyber Security Assessment, Open Web Application Security Project (OWASP), Exploitation techniques, Application Security, Patch Management, Cyber Threat Intelligence, Web Applications, Cyber Engineering, Cyber Security Policies, Cyber Governance, Risk Management Framework, Linux Administration, Ethical Standards And Conduct, Linux, Linux Commands, Linux Servers

    Beginner · Course · 1 - 4 Weeks

  • P

    Palo Alto Networks

    Palo Alto Networks Cybersecurity Foundation

    Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Zero Trust Network Access, Malware Protection, Firewall, AI Security, Endpoint Security, Threat Modeling, Cloud Security, System Configuration, Cloud Computing, Software As A Service, Cryptography, Authentications

    4.6
    Rating, 4.6 out of 5 stars
    ·
    552 reviews

    Intermediate · Course · 1 - 3 Months

  • S

    Simplilearn

    Master Basics of Cybersecurity Fundamentals Training

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Cybersecurity, Threat Detection, Exploitation techniques, Data Encryption Standard, Threat Modeling, Security Awareness, Cryptography, Cyber Attacks, Data Security, Databases, Malware Protection, Penetration Testing, AI Security, Vulnerability Assessments, Application Security, Security Engineering, Artificial Intelligence, SQL

    Beginner · Specialization · 1 - 3 Months

  • U

    University of London

    Cyber Security – Technology and Governance

    Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, IT Security Architecture, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Computer Networking, Cybersecurity, Network Protocols, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks

    4.8
    Rating, 4.8 out of 5 stars
    ·
    200 reviews

    Beginner · Specialization · 3 - 6 Months

  • J

    Johns Hopkins University

    Information Assurance Analysis

    Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, AI Security, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Network Monitoring, Responsible AI, Network Routing, Infrastructure Security, Application Security

    4
    Rating, 4 out of 5 stars
    ·
    10 reviews

    Intermediate · Specialization · 3 - 6 Months

  • M

    Macquarie University

    Cyber Security: DevSecOps

    Skills you'll gain: DevSecOps, Secure Coding, Application Security, IT Security Architecture, DevOps, Security Engineering, Security Testing, Security Controls, Cyber Security Strategy, Cybersecurity, Infrastructure as Code (IaC), Vulnerability Management

    Beginner · Course · 1 - 3 Months

  • P

    Packt

    Advanced Penetration Techniques

    Skills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Assessments, Intrusion Detection and Prevention, Brute-force attacks, Application Security, Network Security, Virtual Local Area Network (VLAN), Cloud Security, API Testing, Wireless Networks

    Advanced · Course · 1 - 4 Weeks

  • M

    Macquarie University

    Cyber Security: Application of AI

    Skills you'll gain: Cyber Security Strategy, Cyber Threat Intelligence, Intrusion Detection and Prevention, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Machine Learning Methods

    4.9
    Rating, 4.9 out of 5 stars
    ·
    7 reviews

    Intermediate · Course · 1 - 3 Months

  • P

    Pearson

    Cybersecurity Prevention and Detection: Unit 3

    Skills you'll gain: Incident Response, Threat Detection, Cyber Threat Hunting, Intrusion Detection and Prevention, Malware Protection, Cybersecurity, Data Persistence, Network Analysis, Operating Systems, Virtual Environment

    Beginner · Course · 1 - 4 Weeks

1234…9

In summary, here are 10 of our most popular malware+detection+techniques courses

  • Sound the Alarm: Detection and Response: Google
  • Cyber Threat Intelligence and Incident Response: Edureka
  • Securing Applications with Checkmarx: Coursera
  • Penetration Testing and Vulnerability Scanning: Edureka
  • Palo Alto Networks Cybersecurity Foundation: Palo Alto Networks
  • Master Basics of Cybersecurity Fundamentals Training: Simplilearn
  • Cyber Security – Technology and Governance: University of London
  • Information Assurance Analysis: Johns Hopkins University
  • Cyber Security: DevSecOps: Macquarie University
  • Advanced Penetration Techniques: Packt

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok