Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "malware protection"
Skills you'll gain: Malware Protection, Cyber Threat Hunting, Cyber Security Assessment, Application Security, Threat Detection, Network Analysis, Virtual Machines, Code Review, Debugging, System Programming, Microsoft Windows, Windows PowerShell, Programming Principles, Computer Architecture, Excel Macros, Linux
Macquarie University
Skills you'll gain: Microsoft Excel, Dashboard, Excel Formulas, Spreadsheet Software, Data Visualization, Excel Macros, Data Validation, Data Analysis Expressions (DAX), Data Cleansing, Data Modeling, Financial Forecasting, Predictive Modeling, Financial Modeling, Workflow Management, Finance, Data Management, Business Intelligence Software, Consolidation, Data Integrity, Data Entry
Johns Hopkins University
Skills you'll gain: Clinical Data Management, Clinical Trials, Sample Size Determination, Clinical Research, Data Quality, Healthcare Ethics, Quality Assurance, Data Cleansing, Regulatory Compliance, Data Integrity, Data Governance, Microsoft Excel, Statistical Reporting, Data Compilation, Data Collection, Scientific Methods, Biostatistics, Data Sharing, Statistical Analysis, Patient Safety
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, Data Security, Software Development Life Cycle
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Intrusion Detection and Prevention, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Skills you'll gain: Excel Formulas, Microsoft Excel, Data Cleansing, Data Analysis, Data Import/Export, Spreadsheet Software, Data Wrangling, Data Quality, Pivot Tables And Charts, Google Sheets, Data Manipulation, Data Visualization Software, Information Privacy
- Status: AI skills
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, System Testing, Cloud Security, Threat Management, Vulnerability Scanning, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
University of Pennsylvania
Skills you'll gain: General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Information Privacy, Personally Identifiable Information, Regulatory Compliance, Data Security, Health Care Procedure and Regulation, Incident Response, Governance
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, Threat Management, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Open Web Application Security Project (OWASP), Cyber Operations, Vulnerability Assessments, Security Information and Event Management (SIEM), Test Planning, Network Analysis, Data Integrity
Skills you'll gain: Dashboard, Data Storytelling, Data Warehousing, SQL, Data Governance, Data Security, Data Migration, Database Design, Data Literacy, Descriptive Statistics, Extract, Transform, Load, Data Mining, Cloud Storage, Data Visualization Software, Data Store, IBM DB2, Data Management, Relational Databases, MySQL, Excel Formulas
Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Information Systems Security, Intrusion Detection and Prevention, Endpoint Security, Network Infrastructure, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Infrastructure Security, Authorization (Computing), Multi-Factor Authentication
In summary, here are 10 of our most popular malware protection courses
- Malware Analysis and Introduction to Assembly Language:Â IBM
- Excel Skills for Business:Â Macquarie University
- Clinical Trials Operations:Â Johns Hopkins University
- Application Security for Developers and DevOps Professionals:Â IBM
- IBM Cybersecurity Analyst:Â IBM
- Excel Basics for Data Analysis:Â IBM
- Microsoft Cybersecurity Analyst:Â Microsoft
- Privacy Law and Data Protection:Â University of Pennsylvania
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM
- IBM Data Management:Â IBM