Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "malware protection"
Vanderbilt University
Skills you'll gain: Clinical Data Management, Data Capture, Clinical Research, Data Management, Data Collection, Data Sharing, Data Strategy, Data Quality, Sampling (Statistics), Data Integrity, Data Validation, Regulatory Compliance
- Status: Free Trial
University at Buffalo
Skills you'll gain: Blockchain, Cryptography, Transaction Processing, Network Protocols, Encryption, Network Model, Data Structures, Distributed Computing, FinTech, Virtual Environment, Data Integrity, Emerging Technologies, Virtual Machines, Verification And Validation
- Status: Free Trial
Palo Alto Networks
Skills you'll gain: Cybersecurity, Zero Trust Network Access, Cyber Threat Intelligence, Malware Protection, Network Security, Firewall, Threat Detection, Cloud Security, Endpoint Security, Security Controls, Enterprise Security, Software As A Service, Cloud Computing, Cryptography
- Status: Free Trial
Skills you'll gain: Data Cleansing, Sampling (Statistics), Data Integrity, Data Quality, Data Processing, Data Analysis, Data Transformation, Data Validation, Sample Size Determination, SQL, Spreadsheet Software
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Data Integrity, Secure Coding, Algorithms
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Risk Management Framework, Continuous Monitoring, Cyber Security Assessment, Security Controls, Information Privacy
- Status: Free Trial
New York University
Skills you'll gain: Network Security, Firewall, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
- Status: Free Trial
EC-Council
Skills you'll gain: Network Security, Mobile Security, Public Key Infrastructure, Cryptography, Security Controls, Cybersecurity, Authorization (Computing), Encryption, Identity and Access Management, Wireless Networks, Cloud Computing, Cloud Security, Network Monitoring, Data Security, Internet Of Things, Virtualization and Virtual Machines
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Vulnerability Management, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Management, Vulnerability Assessments, Cyber Security Strategy, Network Security, Threat Management, Threat Detection, Security Controls, Cyber Governance, Firewall, Virtual Private Networks (VPN), Intrusion Detection and Prevention, Continuous Improvement Process
- Status: Free Trial
New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
- Status: Free Trial
Skills you'll gain: Paid media, Instagram, Social Media, Social Media Campaigns, Advertising, Digital Advertising, Marketing Materials, Social Media Marketing, Facebook, Copywriting, Content Creation, Marketing, Information Privacy, Campaign Management, Target Audience, Brand Management
Erasmus University Rotterdam
Skills you'll gain: Email Security, Human Factors (Security), Cyber Security Policies, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Risk, Computer Security Awareness Training, Patient Safety, Malware Protection, Encryption, Health Technology, Data Security, Safety and Security, Telehealth, Information Privacy, General Data Protection Regulation (GDPR)
In summary, here are 10 of our most popular malware protection courses
- Data Management for Clinical Research:Â Vanderbilt University
- Blockchain Basics:Â University at Buffalo
- Palo Alto Networks Cybersecurity Foundation:Â Palo Alto Networks
- Process Data from Dirty to Clean:Â Google
- Cryptography I:Â Stanford University
- The GRC Approach to Managing Cybersecurity:Â Kennesaw State University
- Real-Time Cyber Threat Detection and Mitigation:Â New York University
- Network Defense Essentials (NDE):Â EC-Council
- The Foundations of Cybersecurity:Â Kennesaw State University
- Cyber Attack Countermeasures:Â New York University