Filter by
The language used throughout the course, in both instruction and assessments.
Results for "ransomware"
Skills you'll gain: Incident Response, Cybersecurity, Human Factors (Security), Security Awareness, Continuous Monitoring, Cyber Security Strategy, Cyber Governance, Crisis Management, Computer Security Awareness Training, Culture Transformation, Threat Management, Threat Detection, Organizational Change, Communication Planning, Employee Engagement
Skills you'll gain: Vulnerability Management, Risk Analysis, Risk Management, Disaster Recovery, Incident Response, Business Continuity Planning, Security Management, Vulnerability Assessments, Threat Modeling, Computer Security Incident Management, Threat Management, Business Risk Management, Cyber Risk, Continuous Monitoring, Cybersecurity, Cyber Threat Intelligence, General Data Protection Regulation (GDPR)
Skills you'll gain: Open Web Application Security Project (OWASP), Application Security, Secure Coding, Security Engineering, Security Testing, Vulnerability Assessments, Encryption, Security Requirements Analysis, Threat Modeling, Authentications, Vulnerability Management, Code Review, Data Validation
- Status: Free
Ball State University
Skills you'll gain: Application Security, Cryptography, Authentications, Encryption, Cybersecurity, Information Systems Security, Email Security, Network Security, Advanced Encryption Standard (AES), Data Encryption Standard, Secure Coding, Application Development, Key Management, Public Key Infrastructure, Network Protocols, Data Integrity
University of California San Diego
Skills you'll gain: Technical Communication, Digital Transformation, Cloud Computing, Computational Thinking, Big Data, Hypertext Markup Language (HTML), Cloud Storage, Data Science, Artificial Intelligence and Machine Learning (AI/ML), Amazon Web Services, SQL, Databases
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Microsoft Intune (Mobile Device Management Software), Mobile Security, Application Deployment, Endpoint Security, Threat Management, Apple iOS, System Configuration, Threat Detection, Cyber Security Policies, Application Security
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Technical Communication, Threat Detection, Cyber Threat Intelligence, Security Information and Event Management (SIEM), Cybersecurity, Vulnerability Management, Vulnerability Assessments, Threat Management, Continuous Monitoring
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Cybersecurity, Virtual Private Networks (VPN), Remote Access Systems, Network Protocols, Vulnerability Assessments, Encryption, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
FAIR Institute
Skills you'll gain: Incident Response, Cyber Risk, Cyber Governance, Business Risk Management, Operational Risk, Mergers & Acquisitions, Cybersecurity, Security Management, Risk Management, Safety Culture, Compliance Management, Regulatory Requirements
Skills you'll gain: Penetration Testing, Incident Response, Computer Security Incident Management, Cyber Security Strategy, Application Security, Open Web Application Security Project (OWASP), Cybersecurity, Information Systems Security, Vulnerability Assessments, Secure Coding, Intrusion Detection and Prevention, Hardening, Infrastructure Security, Threat Modeling, Mobile Security, Cloud Security, Vulnerability Management, Disaster Recovery, Containerization
University of California San Diego
Skills you'll gain: Pedagogy, Blockchain, Data Ethics, Teaching, Emerging Technologies, Computer Networking, Internet Of Things, Instructional Strategies, Cybersecurity, Information Privacy, Encryption, Virtual Private Networks (VPN), Social Studies, Distributed Denial-Of-Service (DDoS) Attacks
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Unix, Application Security, Vulnerability Assessments, Cybersecurity, Unix Commands, System Programming, Linux, Debugging, Command-Line Interface, Windows PowerShell, Computer Architecture, Authentications
Searches related to ransomware
In summary, here are 10 of our most popular ransomware courses
- The Cybersecurity Culture Blueprint: A Proactive Approach: LearnQuest
- Risk Management and Incident Response: Packt
- Cyber Secure Coder (CSC-110) : Packt
- CS 647: Cybersecurity and Secure Software Design. (2024): Ball State University
- Teaching Impacts of Technology: Workplace of the Future: University of California San Diego
- Check Point Jump Start: Harmony Mobile: Check Point Software Technologies Ltd.
- Cybersecurity Incident Response and Communication: Packt
- Security & Ethical Hacking: Attacking the Network: University of Colorado Boulder
- Understanding Cyber Risk Reporting with FAIRâ„¢: FAIR Institute
- Advanced Security Strategies and Incident Response: Packt