Filter by
The language used throughout the course, in both instruction and assessments.
Results for "ransomware"
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Disaster Recovery, Business Continuity, Application Security, IT Security Architecture, Infrastructure Security, Cryptography, Regulation and Legal Compliance, Bash (Scripting Language), Encryption, Authorization (Computing), Risk Management, Virtualization
Kennesaw State University
Skills you'll gain: Incident Response, Contingency Planning, Disaster Recovery, Computer Security Incident Management, Security Management, Crisis Management, Cybersecurity, Business Continuity, Cyber Attacks, Risk Analysis, Business Risk Management, Data Storage
Skills you'll gain: Penetration Testing, Network Protocols, Network Security, Network Analysis, Malware Protection, Cyber Security Assessment, Cyber Threat Intelligence, Vulnerability Assessments, System Configuration, Image Analysis, Open Source Technology, Virtual Machines, Linux, Software Installation, Microsoft Windows
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Azure Active Directory, Microsoft Azure, Cyber Security Policies, Cloud Security, Firewall, Cyber Attacks, Cybersecurity, Malware Protection, Identity and Access Management, Data Security, Network Security, Threat Management, Endpoint Security, Security Information and Event Management (SIEM), Threat Detection, Security Controls, Scenario Testing, Role-Based Access Control (RBAC), Encryption
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Endpoint Detection and Response, Threat Management, Cyber Operations, Cybersecurity, Disaster Recovery, Cyber Threat Hunting, Security Management, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Event Monitoring, Network Security, Network Monitoring, Data Security, Business Continuity
Kennesaw State University
Skills you'll gain: Cyber Governance, Vulnerability Management, Cybersecurity, Cyber Risk, Threat Management, Security Management, Vulnerability Assessments, Threat Detection, Governance, Cyber Security Strategy, Risk Management, Security Awareness, Cyber Operations, Cyber Security Policies, Computer Security Incident Management, Human Factors (Security)
- Status: Free
Coursera Instructor Network
Skills you'll gain: Disaster Recovery, Business Continuity Planning, Contingency Planning, Business Risk Management, Data Loss Prevention, Risk Mitigation, Risk Analysis, Procedure Development, Crisis Management, Incident Management, Data Governance, Threat Management, Compliance Management, Program Development, Continuous Improvement Process
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Threat Modeling, Email Security, Security Engineering, System Design and Implementation, Network Security, Jupyter, Authentications, Deep Learning, Machine Learning Software
University of Colorado System
Skills you'll gain: Infrastructure Security, Public Safety and National Security, Cybersecurity, Security Management, Cyber Attacks, Cyber Security Policies, Security Strategy, Threat Modeling, Policty Analysis, Research, and Development, Risk Management Framework
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Malware Protection, Network Security, Threat Detection, Firewall, Code Review, Routing Protocols, Proxy Servers, Linux, Internet Of Things, Servers
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Management, Cybersecurity, Zero Trust Network Access, Application Deployment, Network Protocols, Identity and Access Management, Software Installation, Infrastructure Architecture, Solution Architecture, Linux
New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
Searches related to ransomware
In summary, here are 10 of our most popular ransomware courses
- Cyber Security Technologies: Illinois Tech
- Managing Cybersecurity Incidents and Disasters: Kennesaw State University
- Digital Forensics for Pentesters - Hands-On Learning: Packt
- Azure Cybersecurity Solutions And Microsoft Defender : Microsoft
- Cyber Incident Response: Infosec
- Cybersecurity Foundations for Risk Management: Kennesaw State University
- Disaster Recovery Planning for Organizations: Coursera Instructor Network
- AI for Cybersecurity: Johns Hopkins University
- Homeland Security & Cybersecurity Connection - It's Not About the Terrorists: University of Colorado System
- DDoS Attacks and Defenses: University of Colorado System