Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "malware protection"
- Status: Free Trial
Advancing Women in Tech
Skills you'll gain: Product Roadmaps, Product Management, Customer Retention, Cross-Functional Team Leadership, Professional Networking, Financial Analysis, Product Strategy, Technical Product Management, Product Requirements, Product Development, Financial Statement Analysis, Product Lifecycle Management, New Product Development, Innovation, Team Leadership, Artificial Intelligence and Machine Learning (AI/ML), User Experience Design, Design, Performance Management, Interviewing Skills
- Status: Free Trial
University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Information Systems Security, Threat Detection, Test Tools
- Status: Free Trial
Skills you'll gain: Estate Planning, Insurance, Goal Setting, Investments, Budgeting, Tax, Mortgage Loans, Return On Investment, Financial Planning, Cash Flow Forecasting, Financial Analysis, Loans, Risk Analysis, Asset Protection, Income Tax, Portfolio Management, Risk Management, Consumer Lending, Credit Risk, Safety and Security
- Status: Free Trial
Skills you'll gain: Cyber Security Policies, Cyber Security Assessment, Risk Management Framework, Security Management, Cyber Risk, Cybersecurity, Cyber Governance, Security Awareness
- Status: Free Trial
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability, Computer Science
- Status: Free Trial
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Computer Networking, Cybersecurity, Cyber Security Strategy, Computer Architecture, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks
- Status: Free Trial
Fortinet, Inc.
Skills you'll gain: Virtual Private Networks (VPN), Firewall, Network Routing, Intrusion Detection and Prevention, Authentications, Network Security, Network Administration, Security Controls, User Accounts, System Configuration, Network Monitoring, Web Servers
- Status: Free Trial
University of Michigan
Skills you'll gain: Database Design, SQL, Relational Databases, PostgreSQL, Database Theory, Database Management, Data Modeling, Databases, Data Integrity
- Status: Preview
University of Pittsburgh
Skills you'll gain: Triage, Mitigation, Emergency Response, Safety and Security, Emergency Medicine, First Aid, Healthcare Ethics, Risk Analysis, Stress Management, Resourcefulness, Adaptability, Water Resources, Cultural Diversity, Activities of Daily Living (ADLs)
- Status: Preview
The University of North Carolina at Chapel Hill
Skills you'll gain: Data Sharing, Data Management, File Management, Data Storage, Information Management, Data Strategy, Metadata Management, Data Governance, Document Management, Data Literacy, Data Quality, Data Integrity, Data Security, Version Control
- Status: Free Trial
Skills you'll gain: Security Controls, Governance, Cybersecurity, Information Assurance, Risk Management Framework, Cyber Security Policies, Cyber Governance, Data Ethics, Cyber Risk, Security Awareness, Data Integrity
- Status: Free Trial
LearnKartS
Skills you'll gain: Cloud Security, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Penetration Testing, Cloud Computing, Mobile Security, Cloud Services, Cloud Infrastructure, Virtualization, Encryption, Cryptography, Vulnerability Assessments, SQL
In summary, here are 10 of our most popular malware protection courses
- Real-World Product Management:Â Advancing Women in Tech
- Proactive Computer Security:Â University of Colorado System
- The Fundamentals of Personal Finance:Â SoFi
- Cybersecurity Policy Foundations:Â Infosec
- Introduction to Applied Cryptography:Â University of Colorado System
- Cyber Security – Technology and Governance: Royal Holloway, University of London
- FortiGate Administrator:Â Fortinet, Inc.
- Database Design and Basic SQL in PostgreSQL:Â University of Michigan
- Disaster Preparedness:Â University of Pittsburgh
- Research Data Management and Sharing:Â The University of North Carolina at Chapel Hill