• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Malware

Results for "malware"


  • C

    Check Point Software Technologies Ltd.

    Check Point Jump Start: Harmony Endpoint Security

    Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Software, Security Management, Cybersecurity, Cyber Attacks, Remote Access Systems, Zero Trust Network Access, Network Protocols, Software Installation, Linux

    4.7
    Rating, 4.7 out of 5 stars
    ·
    14 reviews

    Beginner · Course · 1 - 3 Months

  • P

    Packt

    Handling Security Incidents Across Domains

    Skills you'll gain: Email Security, Incident Response, Computer Security Incident Management, Malware Protection, Cybersecurity, Network Security, Intrusion Detection and Prevention, Cyber Security Strategy, Threat Detection, Distributed Denial-Of-Service (DDoS) Attacks, Wireless Networks

    Intermediate · Course · 1 - 4 Weeks

  • P

    Packt

    Advanced Incident Handling and Analysis Techniques

    Skills you'll gain: Cloud Security, Intrusion Detection and Prevention, Email Security, Incident Response, Application Security, Cloud Computing, Computer Security Incident Management, Cyber Attacks, Infrastructure Security, Cyber Threat Intelligence, Threat Detection, Web Applications, Malware Protection, Network Security, Threat Management, Security Information and Event Management (SIEM), Network Monitoring, Digital Forensics

    Intermediate · Course · 1 - 4 Weeks

  • P

    Packt

    AI & Cybersecurity Threats, Global Actors, and Trends

    Skills you'll gain: DevSecOps, AI Security, Cyber Operations, Threat Modeling, Zero Trust Network Access

    Intermediate · Course · 3 - 6 Months

  • Status: Hands-On Projects
    Hands-On Projects
    E

    EC-Council

    Information Security Analyst

    Skills you'll gain: Digital Forensics, Network Security, Incident Response, Computer Security Incident Management, Cryptography, Penetration Testing, Cybersecurity, Application Security, Cyber Security Policies, Security Information and Event Management (SIEM), Threat Detection, Network Monitoring, Cloud Security, Vulnerability Assessments, Malware Protection, Mobile Security, Identity and Access Management, Internet Of Things, Risk Analysis, Web Applications

    4.9
    Rating, 4.9 out of 5 stars
    ·
    44 reviews

    Beginner · Professional Certificate · 3 - 6 Months

  • C

    Cisco Learning and Certifications

    Threat Investigation

    Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Threat Management, Event Monitoring, Security Information and Event Management (SIEM), Continuous Monitoring, Incident Response, Security Management, Malware Protection, Network Security, System Monitoring, Network Analysis, Network Monitoring

    4.8
    Rating, 4.8 out of 5 stars
    ·
    39 reviews

    Mixed · Course · 1 - 4 Weeks

  • C

    Cisco Learning and Certifications

    Threat Response

    Skills you'll gain: Incident Response, Computer Security Incident Management, Security Information and Event Management (SIEM), Event Monitoring, Threat Detection, General Networking, Network Security, Cybersecurity, Infrastructure Security, Computer Networking, IT Security Architecture, Technical Support and Services, Malware Protection

    4.9
    Rating, 4.9 out of 5 stars
    ·
    59 reviews

    Mixed · Course · 1 - 4 Weeks

  • U

    University of Colorado System

    Advanced System Security Design

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Threat Modeling, Cloud Security, Load Balancing, Security Engineering, User Accounts, Authorization (Computing), Identity and Access Management, Network Security, Information Systems Security, Cybersecurity, Encryption, Geographic Information Systems

    4.5
    Rating, 4.5 out of 5 stars
    ·
    658 reviews

    Beginner · Specialization · 3 - 6 Months

  • P

    Palo Alto Networks

    Palo Alto Networks Cloud Security Fundamentals

    Skills you'll gain: Cloud Security, Cloud-Native Computing, Cloud Computing Architecture, Infrastructure Security, DevSecOps, Cloud Computing, Cloud Deployment, Application Security, Cloud Infrastructure, Network Security, Data Security, Docker (Software), Software As A Service, Hybrid Cloud Computing, Containerization, Data Centers, Vulnerability Scanning, Virtual Machines, DevOps, Vulnerability Assessments

    4.7
    Rating, 4.7 out of 5 stars
    ·
    150 reviews

    Intermediate · Course · 1 - 3 Months

  • G

    Google Cloud

    Mitigating Security Vulnerabilities on Google Cloud

    Skills you'll gain: Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Threat Management, Security Controls, Information Systems Security, Google Cloud Platform, Data Security, Vulnerability Management, Threat Detection, Malware Protection, Continuous Monitoring, IT Automation, Identity and Access Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    724 reviews

    Intermediate · Course · 1 - 4 Weeks

  • G

    Google Cloud

    Security in Google Cloud 日本語版

    Skills you'll gain: Prompt Engineering, Google Cloud Platform, Cloud Infrastructure, Identity and Access Management, Distributed Denial-Of-Service (DDoS) Attacks, Kubernetes, Generative AI, Cloud Security, Infrastructure As A Service (IaaS), Data Loss Prevention, Cloud Storage, Virtual Machines, Containerization, Application Development, Security Management, Virtual Networking, Cloud Computing, Encryption, Malware Protection, Data Access

    4.5
    Rating, 4.5 out of 5 stars
    ·
    707 reviews

    Intermediate · Specialization · 3 - 6 Months

  • P

    Packt

    The Complete Ethical Hacking Course

    Skills you'll gain: Exploit development, OSI Models, Network Security, Exploitation techniques, TCP/IP, Cybersecurity, Vulnerability Scanning, Metasploit, Malware Protection, Network Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Wireless Networks, Application Security, Cyber Security Assessment, Network Monitoring, Linux, Object Oriented Programming (OOP), General Networking, Security Awareness

    4.7
    Rating, 4.7 out of 5 stars
    ·
    22 reviews

    Intermediate · Specialization · 3 - 6 Months

Searches related to malware

malware analysis
malware analysis and introduction to assembly language
malware protection
malware development
malware detection
malware analyst
malware forensics
exploit development, malware, & defensive strategies
1…91011…18

In summary, here are 10 of our most popular malware courses

  • Check Point Jump Start: Harmony Endpoint Security: Check Point Software Technologies Ltd.
  • Handling Security Incidents Across Domains: Packt
  • Advanced Incident Handling and Analysis Techniques: Packt
  • AI & Cybersecurity Threats, Global Actors, and Trends: Packt
  • Information Security Analyst: EC-Council
  • Threat Investigation: Cisco Learning and Certifications
  • Threat Response: Cisco Learning and Certifications
  • Advanced System Security Design: University of Colorado System
  • Palo Alto Networks Cloud Security Fundamentals: Palo Alto Networks
  • Mitigating Security Vulnerabilities on Google Cloud: Google Cloud

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok