Filter by
The language used throughout the course, in both instruction and assessments.
Results for "rootkit+detection+and+defense"
University of Colorado System
Skills you'll gain: Security Engineering, Risk Management, Security Strategy, System Security, Cyberattacks, Leadership and Management, Computer Security Incident Management, Finance
Skills you'll gain: Computer Security Incident Management, Risk Management, Cryptography, Operations Management
Kennesaw State University
Skills you'll gain: Security Engineering, System Security, Risk Management, Computer Security Incident Management, Leadership and Management, Security Strategy, Network Security, Strategy, Cyberattacks, Strategy and Operations, Computer Security Models, Software Security, Security Software, Computer Networking, Planning, Regulations and Compliance, Business Analysis, Network Architecture, Networking Hardware, Organizational Development, Operations Management, Cryptography, Network Model, Systems Design
Skills you'll gain: Python Programming, Computer Programming
Skills you'll gain: Cyberattacks, Leadership and Management
- Status: Free
Coursera Project Network
Skills you'll gain: Network Security
Kennesaw State University
Skills you'll gain: Computer Security Models, Cyberattacks, Network Security, Security Engineering, Software Security, System Security, Computer Security Incident Management, Security Strategy, Security Software, Strategy
Microsoft
University of Maryland, College Park
Skills you'll gain: Security Engineering, Cyberattacks, Security Software, Security Strategy, Software Security, Cryptography, Hardware Design
Microsoft
- Status: Free
Coursera Instructor Network
EC-Council
Skills you'll gain: Security Engineering, Network Security, System Security, Software Security, Cloud Computing, Security Software, Internet Of Things, Kubernetes, Mobile Security, Network Architecture
In summary, here are 10 of our most popular rootkit+detection+and+defense courses
- Homeland Security and Cybersecurity:Â University of Colorado System
- Security Operations:Â ISC2
- Managing Cybersecurity:Â Kennesaw State University
- Advanced Python Scripting for Cybersecurity:Â Infosec
- Introduction to Cybersecurity Tools & Cyberattacks:Â IBM
- Vulnerability Scanning with Nmap: Network Scanning:Â Coursera Project Network
- The Foundations of Cybersecurity:Â Kennesaw State University
- Cybersecurity Tools and Technologies:Â Microsoft
- Hardware Security:Â University of Maryland, College Park
- Cybersecurity and Privacy:Â Microsoft