Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "malware protection"
- Status: Preview
The University of North Carolina at Chapel Hill
Skills you'll gain: Data Sharing, Data Management, File Management, Data Storage, Information Management, Data Strategy, Metadata Management, Data Governance, Document Management, Data Literacy, Data Quality, Data Integrity, Data Security, Version Control
- Status: Preview
ConsenSys Academy
Skills you'll gain: Blockchain, Cryptography, Interoperability, FinTech, Emerging Technologies, Ledgers (Accounting), Business Modeling, Distributed Computing, Digital Assets, Data Sharing, Data Integrity, Transaction Processing
- Status: Free Trial
University of Colorado System
Skills you'll gain: Digital Communications, OSI Models, Network Protocols, TCP/IP, Network Routing, Network Architecture, Network Planning And Design, Computer Networking, System Programming, Data Integrity
- Status: Free Trial
University of Colorado System
Skills you'll gain: Cryptography, Data Integrity, Encryption, Authentications, Data Security, Public Key Cryptography Standards (PKCS), Digital Communications
- Status: Free Trial
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Information and Event Management (SIEM), Security Controls, Data Integrity, Technical Documentation
- Status: Free Trial
Skills you'll gain: Security Controls, Governance, Cybersecurity, Information Assurance, Risk Management Framework, Cyber Security Policies, Cyber Governance, Data Ethics, Cyber Risk, Security Awareness, Data Integrity
- Status: Free Trial
University of Michigan
Skills you'll gain: Database Design, SQL, Relational Databases, PostgreSQL, Database Theory, Database Management, Data Modeling, Databases, Data Integrity
- Status: Preview
Universidad Nacional Autónoma de México
Skills you'll gain: Generative AI, Prompt Engineering, ChatGPT, AI Personalization, Education Software and Technology, Large Language Modeling, Artificial Intelligence, Creativity, Data Ethics, Computer Vision, Information Privacy, Ethical Standards And Conduct, Intellectual Property
Skills you'll gain: Incident Response, Security Controls, Cryptography, Malware Protection, Key Management, Vulnerability Assessments, Risk Management, Public Key Infrastructure, Continuous Monitoring, Endpoint Security, Disaster Recovery, Computer Security Incident Management, OSI Models, Network Security, Encryption, Authentications, Mobile Security, Operational Risk, Security Awareness, Authorization (Computing)
- Status: Free Trial
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Health Informatics, Health Technology, Health Policy, Health Care, Healthcare Industry Knowledge, Health Information Management, Information Technology, Health Care Procedure and Regulation, System Requirements, Interoperability, Electronic Medical Record, Data Literacy, Technology Strategies, Medical Imaging, Emerging Technologies, Information Privacy
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Threat Detection, Network Analysis, Cybersecurity, System Design and Implementation, Network Security, Machine Learning Software, Machine Learning Methods, Performance Testing, Machine Learning Algorithms, Machine Learning, Supervised Learning, Microsoft Windows
In summary, here are 10 of our most popular malware protection courses
- Research Data Management and Sharing:Â The University of North Carolina at Chapel Hill
- Blockchain: Foundations and Use Cases:Â ConsenSys Academy
- Fundamentals of Network Communication:Â University of Colorado System
- Cryptographic Hash and Integrity Protection:Â University of Colorado System
- Incident Response and Digital Forensics:Â IBM
- Security Principles:Â ISC2
- Database Design and Basic SQL in PostgreSQL:Â University of Michigan
- IA generativa en el aula: Universidad Nacional Autónoma de México
- ISC2 Systems Security Certified Practitioner (SSCP):Â ISC2
- Introduction to Applied Cryptography:Â University of Colorado System