• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
Log In
Join for Free
Coursera
  • Browse
  • Schutz Vor Malware
Skip to search results

Filter by

Subject
Required
 *

Language
Required
 *

The language used throughout the course, in both instruction and assessments.

Learning Product
Required
 *

Build job-relevant skills in under 2 hours with hands-on tutorials.
Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required
 *

Duration
Required
 *

Skills
Required
 *

Subtitles
Required
 *

Educator
Required
 *

Results for "schutz vor malware"

  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Essentials for Forensics

    Skills you'll gain: Mobile Security, Anomaly Detection, Criminal Investigation and Forensics, Cyber Security Strategy, Cyber Threat Intelligence, Threat Detection, Investigation, Cyber Attacks, File Systems, Intrusion Detection and Prevention, Fraud detection, Mobile Development, Cybersecurity, Applied Machine Learning, Malware Protection, Cyber Security Policies, Apple iOS, Threat Modeling, Artificial Intelligence and Machine Learning (AI/ML), Data Security

    4.5
    Rating, 4.5 out of 5 stars
    ·
    16 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    EDUCBA

    Kali Linux: Ethical Hacking & Pentesting

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Malware Protection, Exploitation techniques, Database Management, Security Testing, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Security Assessment, Cryptography, Cybersecurity, Vulnerability Scanning, Hardening, Threat Detection, Data Import/Export, Public Key Infrastructure, MySQL, Linux, Linux Administration

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    E

    EC-Council

    Cybersecurity Attack and Defense Fundamentals

    Skills you'll gain: Penetration Testing, Network Security, Threat Modeling, Mobile Security, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Threat Detection, Cybersecurity, Authorization (Computing), Security Awareness, Cloud Computing, Encryption, Malware Protection, Intrusion Detection and Prevention, Identity and Access Management, Cyber Attacks, Data Integrity

    4.6
    Rating, 4.6 out of 5 stars
    ·
    752 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    I

    IBM

    Introduction to Cybersecurity Essentials

    Skills you'll gain: Cybersecurity, Cyber Attacks, Data Security, Computer Security Awareness Training, Authentications, Authorization (Computing), Application Security, Security Controls, Personally Identifiable Information, Security Awareness, Identity and Access Management, Information Privacy, Cryptography, Malware Protection, Hardening, Encryption, Vulnerability Assessments, Multi-Factor Authentication, Data Integrity

    4.8
    Rating, 4.8 out of 5 stars
    ·
    1.1K reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    EC-Council

    Information Security Analyst

    Skills you'll gain: Network Security, Incident Response, Computer Security Incident Management, Cryptography, Penetration Testing, Vulnerability Management, Cybersecurity, Application Security, Cyber Security Policies, Security Information and Event Management (SIEM), Threat Detection, Network Monitoring, Cloud Security, Vulnerability Assessments, Malware Protection, Mobile Security, Identity and Access Management, Internet Of Things, Risk Analysis, Web Applications

    4.9
    Rating, 4.9 out of 5 stars
    ·
    34 reviews

    Beginner · Professional Certificate · 3 - 6 Months

  • Status: Preview
    Preview
    I

    IBM

    Malware Analysis and Introduction to Assembly Language

    Skills you'll gain: Malware Protection, Exploitation techniques, Exploit development, Cyber Threat Hunting, Cyber Security Assessment, Application Security, Threat Detection, Virtual Machines, Code Review, Debugging, System Programming, Scripting, Windows PowerShell, Virtual Environment, Linux, File Management

    4.6
    Rating, 4.6 out of 5 stars
    ·
    83 reviews

    Intermediate · Course · 1 - 3 Months

What brings you to Coursera today?

  • Status: Free Trial
    Free Trial
    Status: AI skills
    AI skills
    I

    IBM

    IBM Cybersecurity Analyst

    Skills you'll gain: Operating System Administration, Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Computer Security Incident Management, Linux Commands, Database Management, Network Security, Networking Hardware, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment

    Build toward a degree

    4.6
    Rating, 4.6 out of 5 stars
    ·
    27K reviews

    Beginner · Professional Certificate · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    EDUCBA

    Advanced Penetration Testing with Kali Linux

    Skills you'll gain: Penetration Testing, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Malware Protection, Mobile Security, Cyber Operations, Scripting, Android (Operating System), Command-Line Interface, Authentications, Network Analysis, Automation, Virtual Environment

    Mixed · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    EDUCBA

    Ethical Hacking with Kali Linux: Analyze & Defend

    Skills you'll gain: Penetration Testing, Malware Protection, Cyber Threat Intelligence, Exploitation techniques, Cybersecurity, Threat Detection, Email Security, Vulnerability Assessments, Human Factors (Security), Network Analysis

    Mixed · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Pearson

    Cisco Certified Support Technician IT Support - 100-140

    Skills you'll gain: Cyber Threat Intelligence, Malware Protection, Peripheral Devices, Personally Identifiable Information, Remote Access Systems, Hardware Troubleshooting, Threat Detection, Desktop Support, Help Desk Support, Cyber Attacks, Network Support, Cloud Services, Cybersecurity, Mac OS, Computer Hardware, Microsoft Windows, Technical Support and Services, Electrical Safety, IT Management, Cloud Security

    Beginner · Specialization · 1 - 3 Months

  • I

    ISC2

    ISC2 Systems Security Certified Practitioner (SSCP)

    Skills you'll gain: Authentications, Incident Response, MITRE ATT&CK Framework, Security Controls, Cryptography, Malware Protection, Cryptographic Protocols, Threat Modeling, Endpoint Security, Key Management, Authorization (Computing), Public Key Infrastructure, Vulnerability Assessments, Risk Management, Network Security, Application Security, Asset Management, Cloud Security, OSI Models, Continuous Monitoring

    4.7
    Rating, 4.7 out of 5 stars
    ·
    265 reviews

    Beginner · Specialization · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Pearson

    A+ Core 2 V15 - Pearson Cert Prep

    Skills you'll gain: Mobile Security, Operating System Administration, Microsoft Windows, Malware Protection, Information Technology Operations, Disaster Recovery, Mac OS, Document Management, Command-Line Interface, Incident Response, Network Security, Linux, Information Systems Security, Security Controls, Information Technology, Cybersecurity, Windows PowerShell, Problem Management, Operating Systems, Internet Of Things

    Intermediate · Specialization · 1 - 4 Weeks

1234…19

In summary, here are 10 of our most popular schutz vor malware courses

  • Cyber Security: Essentials for Forensics: Macquarie University
  • Kali Linux: Ethical Hacking & Pentesting: EDUCBA
  • Cybersecurity Attack and Defense Fundamentals: EC-Council
  • Introduction to Cybersecurity Essentials: IBM
  • Information Security Analyst: EC-Council
  • Malware Analysis and Introduction to Assembly Language: IBM
  • IBM Cybersecurity Analyst: IBM
  • Advanced Penetration Testing with Kali Linux: EDUCBA
  • Ethical Hacking with Kali Linux: Analyze & Defend: EDUCBA
  • Cisco Certified Support Technician IT Support - 100-140: Pearson

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Manage Cookie Preferences
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok