Filter by
The language used throughout the course, in both instruction and assessments.
Results for "ransomware"
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Cyber Governance, Incident Management, Incident Response, Security Management, Cyber Security Strategy, Cyber Security Policies, Human Factors (Security), Security Awareness, ISO/IEC 27001, Computer Security Awareness Training, Cyber Risk, Information Assurance
Association of International Certified Professional Accountants
Skills you'll gain: Digital Assets, Blockchain, Asset Management, Cryptography, Cybersecurity, Security Awareness, Security Controls, Securities (Finance), Multi-Factor Authentication, Financial Market, Financial Regulations, Accounting
Board Infinity
Skills you'll gain: Incident Response, Risk Management Framework, Cyber Risk, Risk Management, Security Management, Enterprise Risk Management (ERM), Business Risk Management, Cyber Threat Intelligence, Threat Management, Governance Risk Management and Compliance, Continuous Monitoring, Cybersecurity, Cyber Security Strategy, Risk Analysis, Cyber Operations, Security Information and Event Management (SIEM), Security Controls, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Key Performance Indicators (KPIs)
Kennesaw State University
Skills you'll gain: Email Security, Wireless Networks, Mobile Security, Incident Response, Cybersecurity, Cyber Attacks, Firewall, Threat Detection, Cyber Security Policies, Computer Security Awareness Training, Proxy Servers, Computer Security Incident Management, Network Security, Threat Management, Security Awareness, Personally Identifiable Information, Cyber Risk, Virtual Private Networks (VPN), Information Privacy, Computer Networking
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Network Security, Unix, Cybersecurity, Application Security, Linux, Web Applications, Infrastructure Security, Virtual Machines, Web Servers, Software Installation
Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Security Testing, Application Security, Vulnerability Assessments, Vulnerability Management, Extensible Markup Language (XML), Scripting, Cybersecurity
Johns Hopkins University
Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Email Security, Threat Detection, Jupyter, Authentications, Machine Learning Algorithms, Artificial Intelligence, Multi-Factor Authentication, Threat Management, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning
Skills you'll gain: Incident Response, Computer Security Incident Management, Business Continuity, Security Management, Disaster Recovery, Risk Management Framework, Threat Management, Risk Management, Security Controls, Information Systems Security, Cybersecurity, Virtualization and Virtual Machines, Information Systems, Vulnerability Assessments, Cloud Computing
New York University
Skills you'll gain: Cyber Attacks, Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cybersecurity, IT Security Architecture, Cloud Security, NIST 800-53, Cyber Threat Intelligence, Hybrid Cloud Computing, Cloud Computing Architecture, Payment Card Industry (PCI) Data Security Standards, Security Controls, Risk Management Framework, Blockchain, Internet Of Things, Data Integrity
Board Infinity
Skills you'll gain: Cyber Risk, Risk Management Framework, Risk Management, IT Management, Threat Management, Risk Mitigation, Vulnerability Management, Business Risk Management, Security Management, Enterprise Risk Management (ERM), Risk Analysis, Operational Risk, Risk Control, Cybersecurity, Governance Risk Management and Compliance, ISO/IEC 27001, Continuous Monitoring, Business Continuity, Incident Response, Governance
Skills you'll gain: Security Controls, Incident Response, Cyber Risk, Vulnerability Management, Cyber Security Strategy, Vulnerability Scanning, Vulnerability Assessments, Threat Management, Security Management, IT Management, Risk Management, Cyber Security Policies, Threat Detection, Penetration Testing, Cyber Security Assessment, Business Risk Management, Data Security, Disaster Recovery, Business Continuity Planning
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Threat Detection, Network Analysis, Cybersecurity, System Design and Implementation, Network Security, Machine Learning Software, Machine Learning Methods, Performance Testing, Machine Learning Algorithms, Machine Learning, Artificial Intelligence, Supervised Learning, Microsoft Windows
Searches related to ransomware
In summary, here are 10 of our most popular ransomware courses
- Security Management and Governance: Royal Holloway, University of London
- Understanding, Using, and Securing Crypto and Digital Assets: Association of International Certified Professional Accountants
- Advanced Cybersecurity Risk Management: Board Infinity
- Cybersecurity Awareness for Everyone: Kennesaw State University
- An Introduction to Ethical Hacking with Kali Linux: Packt
- Previous OWASP Risks: Infosec
- Introduction to AI for Cybersecurity: Johns Hopkins University
- Incident Response and Risk Management: Packt
- Enterprise and Infrastructure Security: New York University
- Risk Assessment and Management in Cybersecurity: Board Infinity