Filter by
The language used throughout the course, in both instruction and assessments.
Results for "malware+threats"
Kennesaw State University
Skills you'll gain: Email Security, Firewall, Threat Detection, Network Security, Cybersecurity, Security Awareness, Cloud Storage, Information Privacy, Cloud Computing, General Networking, Encryption
Board Infinity
Skills you'll gain: Incident Response, Risk Management Framework, Cyber Risk, Risk Management, Security Management, Enterprise Risk Management (ERM), Business Risk Management, Cyber Threat Intelligence, Threat Management, Governance Risk Management and Compliance, Continuous Monitoring, Cyber Security Strategy, Cybersecurity, Risk Analysis, Cyber Operations, Security Information and Event Management (SIEM), Security Controls, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Key Performance Indicators (KPIs)
Johns Hopkins University
Skills you'll gain: Generative AI, Feature Engineering, Cybersecurity, Threat Modeling, Security Engineering, Deep Learning, Anomaly Detection, Artificial Intelligence, Artificial Neural Networks, Data Processing, Applied Machine Learning, Reinforcement Learning, Data Modeling, Machine Learning, Performance Tuning
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Threat Modeling, Cyber Threat Intelligence, Cybersecurity, Threat Detection, Operating Systems, Malware Protection, Application Security, Information Systems Security, Vulnerability Assessments, Vulnerability Management, Computer Architecture
- Status: Free
Ball State University
Skills you'll gain: Application Security, Cryptography, Authentications, Encryption, Cybersecurity, Information Systems Security, Email Security, Network Security, Advanced Encryption Standard (AES), Data Encryption Standard, Secure Coding, Application Development, Key Management, Public Key Infrastructure, Network Protocols, Data Integrity
Skills you'll gain: Security Controls, Incident Response, Cyber Risk, Vulnerability Management, Cyber Security Strategy, Vulnerability Scanning, Vulnerability Assessments, Threat Management, Security Management, IT Management, Risk Management, Cyber Security Policies, Threat Detection, Penetration Testing, Cyber Security Assessment, Business Risk Management, Data Security, Disaster Recovery, Business Continuity Planning
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Cybersecurity, Virtual Private Networks (VPN), Remote Access Systems, Network Protocols, Vulnerability Assessments, Encryption, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Skills you'll gain: Penetration Testing, Scripting, Scripting Languages, Python Programming, Cyber Security Assessment, Cyber Operations, Computer Programming, Email Security, Cybersecurity, Malware Protection, Command-Line Interface, Program Development, TCP/IP
Skills you'll gain: Virtualization, Augmented and Virtual Reality (AR/VR), Virtual Machines, Virtual Private Networks (VPN), Network Administration, Network Security, Network Architecture, Infrastructure Security, Network Infrastructure, Mobile Security, General Networking, Cloud Computing, Hardware Troubleshooting, Computer Networking, Local Area Networks, Wireless Networks, Cloud Security, Internet Of Things, Computer Hardware, Peripheral Devices
Johns Hopkins University
Skills you'll gain: Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Detection, Computer Security Incident Management, Cybersecurity, Anomaly Detection, Applied Machine Learning, Network Security, Machine Learning Algorithms, Machine Learning, Predictive Modeling, Data Mining, Artificial Neural Networks
Skills you'll gain: Risk Management, Cyber Risk, Threat Management, Security Management, Business Risk Management, IT Management, Vulnerability Management, Risk Mitigation, Risk Analysis, Enterprise Risk Management (ERM), Operational Risk, Risk Control, Cybersecurity, Threat Modeling, Vulnerability Assessments, Incident Response
Johns Hopkins University
Skills you'll gain: Malware Protection, Cybersecurity, Internet Of Things, Network Monitoring, TCP/IP, Network Security, Network Analysis, Border Gateway Protocol, Threat Detection, Network Routing, Network Protocols, Vulnerability Assessments, Docker (Software)
Searches related to malware+threats
In summary, here are 10 of our most popular malware+threats courses
- Cybersecurity: Protecting your Information at Home: Kennesaw State University
- Advanced Cybersecurity Risk Management: Board Infinity
- Securing AI and Advanced Topics: Johns Hopkins University
- Advanced Cybersecurity Topics: Johns Hopkins University
- CS 647: Cybersecurity and Secure Software Design. (2024): Ball State University
- Risk Management for Cyber Security Managers: Packt
- Security & Ethical Hacking: Attacking the Network: University of Colorado Boulder
- Advanced Exploitation and Scripting Techniques: Packt
- Advanced Networking, Virtualization, and IT Security: Packt
- Machine Learning and Emerging Technologies in Cybersecurity: Johns Hopkins University