Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "malware protection"
Status: Free TrialSkills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Exploitation techniques, Threat Detection, Network Security, Information Systems Security, Security Awareness, Human Factors (Security), Lightweight Directory Access Protocols, Network Protocols
Status: Free TrialSkills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Data Loss Prevention, Cloud Security, Malware Protection, Continuous Monitoring, Vulnerability Management, Data Security, System Monitoring, Security Management, Security Information and Event Management (SIEM), Threat Detection, Information Privacy

Skills you'll gain: Penetration Testing, Vulnerability Assessments, Network Security, Network Analysis, Cyber Security Assessment, Virtual Machines, Virtualization and Virtual Machines, Open Source Technology, Malware Protection, Linux, Microsoft Windows
Status: Free TrialUniversity of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Computer Security Incident Management, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Malware Protection, Endpoint Security, Network Security, Firewall
Status: NewStatus: Free TrialSkills you'll gain: Responsible AI, Threat Modeling, Information Systems Security, Security Engineering, Cybersecurity, Information Assurance, Threat Detection, Data Ethics, Artificial Intelligence, Generative AI, Information Privacy, Data Integrity, Data Governance
Status: NewStatus: Free TrialSkills you'll gain: Exploit development, Penetration Testing, Malware Protection, Network Monitoring, Object Oriented Programming (OOP), Cyber Security Assessment, Intrusion Detection and Prevention, Network Security, Network Protocols, Network Analysis, Scripting, Remote Access Systems, Python Programming, Command-Line Interface
Status: Free TrialSkills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Computer Security Incident Management, Network Security, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Multi-Factor Authentication, Human Factors (Security)
Status: NewStatus: PreviewCoursera Instructor Network
Skills you'll gain: Threat Modeling, Responsible AI, Cyber Security Strategy, Data Ethics, Cyber Security Assessment, Cybersecurity, Threat Detection, Cyber Risk, Cyber Attacks, Vulnerability Assessments, Artificial Intelligence, Data Security, Incident Response, Risk Modeling, Tensorflow, Data Integrity
Status: Free TrialUniversity of Colorado System
Skills you'll gain: Cryptography, Data Integrity, Encryption, Authentications, Data Security, Public Key Cryptography Standards (PKCS), Digital Communications
Status: PreviewSkills you'll gain: Mac OS, Network Security, Threat Management, Endpoint Security, Threat Detection, Computer Security Awareness Training, Security Strategy, Information Systems Security, Security Controls, Network Protocols, Automation
Status: NewStatus: Free TrialSkills you'll gain: Endpoint Security, Zero Trust Network Access, Security Strategy, Cloud Infrastructure, Multi-Factor Authentication, Security Management, Vulnerability Scanning
Status: Free TrialMicrosoft
Skills you'll gain: Microsoft Azure, Application Security, Cloud Security, Infrastructure Security, Kubernetes, Network Security, Security Engineering, Firewall, Endpoint Security, Identity and Access Management, Infrastructure As A Service (IaaS), Role-Based Access Control (RBAC), Virtual Machines, Containerization, Distributed Denial-Of-Service (DDoS) Attacks, Virtual Private Networks (VPN), Encryption
In summary, here are 10 of our most popular malware protection courses
- System Hacking, Malware Threats, and Network Attacks: Packt
- Mitigating Security Vulnerabilities on Google Cloud 日本語版: Google Cloud
- Digital Forensics for Pentesters - Hands-On Learning: Packt
- Detecting and Mitigating Cyber Threats and Attacks: University of Colorado System
- Practical Cybersecurity Fundamentals: Unit 5: Pearson
- Exploit Development, Malware, & Defensive Strategies: Packt
- Introduction to Cybersecurity Tools & Cyberattacks: IBM
- Cybersecurity Strategies for AI-Driven Organizations: Coursera Instructor Network
- Cryptographic Hash and Integrity Protection: University of Colorado System
- Enhancing Mac Security: Strategies for Protection: LearnQuest










