Filter by
The language used throughout the course, in both instruction and assessments.
Results for "malware+detection+techniques"
Skills you'll gain: Network Security, Encryption, Cybersecurity, Security Awareness, Cyber Attacks, Security Management, Security Strategy, Threat Detection, Firewall, Wireless Networks, Technical Support, Malware Protection, Authentications, Multi-Factor Authentication, Authorization (Computing), Generative AI
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Network Analysis, Document Management, Technical Documentation, Record Keeping
Skills you'll gain: Malware Protection, Cyber Threat Hunting, Application Security, Cybersecurity, Threat Detection, Virtual Machines, Code Review, Debugging, System Programming, Windows PowerShell, Virtualization, Operating Systems, Programming Principles, Computer Architecture, Linux
Skills you'll gain: Debugging, Technical Communication, Network Troubleshooting, Performance Tuning, Problem Management, Technical Documentation, Technical Support, System Monitoring, System Support, Capacity Management, Incident Management, Performance Testing, Application Performance Management, Network Performance Management, Continuous Monitoring, Virtual Machines, Scripting
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Cybersecurity, Cyber Operations, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Security Information and Event Management (SIEM), Threat Detection, Cloud Security, Threat Management, System Monitoring, Automation
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Management, Security Information and Event Management (SIEM), Data Integrity
Infosec
Skills you'll gain: File Systems, Criminal Investigation and Forensics, Microsoft Windows, Cybersecurity, TCP/IP, Network Protocols, Information Systems Security, File Management, Operating Systems, Data Structures, Data Ethics, General Networking, Data Validation, Record Keeping, Data Storage Technologies, Data Integrity, Data Analysis Software, User Accounts, USB, Systems Analysis
- Status: Free
Coursera Project Network
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Security Testing, Network Security, Network Monitoring, Operating Systems
Skills you'll gain: Incident Response, Business Continuity Planning, Continuous Monitoring, Disaster Recovery, Threat Management, Risk Analysis, Risk Mitigation, Vulnerability Scanning, Security Information and Event Management (SIEM), Vulnerability Assessments, Investigation, Penetration Testing
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
Skills you'll gain: Generative AI, Data Ethics, Anomaly Detection, Advanced Analytics, Threat Detection, Artificial Intelligence and Machine Learning (AI/ML), Deep Learning, Data Security, Applied Machine Learning, Artificial Neural Networks, Email Security, Natural Language Processing
In summary, here are 10 of our most popular malware+detection+techniques courses
- IT Security: Defense against the digital dark arts : Google
- Sound the Alarm: Detection and Response: Google
- Malware Analysis and Introduction to Assembly Language: IBM
- Troubleshooting and Debugging Techniques: Google
- Penetration Testing, Threat Hunting, and Cryptography: IBM
- Detect, Respond, and Recover from Cloud Cybersecurity Attacks: Google Cloud
- Incident Response and Digital Forensics: IBM
- Computer Forensics: Infosec
- Vulnerability Scanning with Nmap: Network Scanning: Coursera Project Network
- Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery : ISC2