Filter by
The language used throughout the course, in both instruction and assessments.
Results for "malware+detection+techniques"
Royal Holloway, University of London
Skills you'll gain: Human Factors (Security), Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Cyber Risk, Threat Modeling, Security Awareness, Social Sciences, Culture, Psychology, Survey Creation
New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Public Key Infrastructure, Cryptography, Security Testing, Cybersecurity, Vulnerability Assessments, Encryption, Technical Writing, Cyber Threat Intelligence, Cyber Attacks
University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Encryption, Application Security, Vulnerability Assessments, Data Security, Authentications, Cybersecurity, Security Testing, Vulnerability Management, Personally Identifiable Information, Web Applications, SQL
- Status: Free
Universidades Anáhuac
Skills you'll gain: Cybersecurity, Cyber Attacks, Information Systems Security, Data Security, Malware Protection, Computer Security Awareness Training, Security Controls, Vulnerability Assessments, Threat Detection, Network Security, Security Awareness, Human Factors (Security)
Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Cyber Threat Intelligence, Threat Detection, Security Strategy, Intrusion Detection and Prevention, Threat Management, Cybersecurity, Continuous Monitoring, Security Information and Event Management (SIEM), Technical Communication
Skills you'll gain: Ansible, Vulnerability Scanning, Network Security, Cybersecurity, Network Monitoring, Firewall, Linux Commands, System Configuration, Command-Line Interface, TCP/IP, Network Analysis, Configuration Management, Software Versioning
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Threat Detection, Amazon Web Services, Incident Response, Continuous Monitoring, Cloud Security, Data Security, Identity and Access Management, Amazon Elastic Compute Cloud, Network Security, Cloud Computing
Skills you'll gain: Penetration Testing, Scripting, Scripting Languages, Python Programming, Cyber Security Assessment, Cyber Operations, Computer Programming, Email Security, Cybersecurity, Malware Protection, Command-Line Interface, Program Development, TCP/IP
University of Colorado System
Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Cybersecurity, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, Data Validation
Skills you'll gain: Feature Engineering, Big Data, Anomaly Detection, Google Cloud Platform, Unsupervised Learning, Applied Machine Learning, Decision Tree Learning, Supervised Learning, Predictive Modeling, Predictive Analytics
Coursera Project Network
Skills you'll gain: Anomaly Detection, Jupyter, Exploratory Data Analysis, Application Deployment, Unsupervised Learning, Data Visualization, Applied Machine Learning, Machine Learning, Machine Learning Software, Machine Learning Algorithms
In summary, here are 10 of our most popular malware+detection+techniques courses
- Cybercrime: Royal Holloway, University of London
- Cyber Attack Countermeasures: New York University
- Cybersecurity Fundamentals: Johns Hopkins University
- Identifying Security Vulnerabilities: University of California, Davis
- Digital Shield: Cybersecurity for Data and System Protection: Universidades Anáhuac
- Advanced Threat Hunting and Incident Response: LearnQuest
- Getting Started in Port Scanning Using Nmap and Kali Linux: Packt
- AWS: Threat Detection, Logging and Monitoring: Whizlabs
- Advanced Exploitation and Scripting Techniques: Packt
- Hacking and Patching: University of Colorado System