Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "malware protection"
- Status: Preview
The University of North Carolina at Chapel Hill
Skills you'll gain: Environmental Laws, Environmental Policy, Environmental Regulations, Law, Regulation, and Compliance, Case Law, Pollution Prevention, Environment and Resource Management, Water Resources, Risk Control, Legal Research, Legal Proceedings
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Risk Management Framework, Continuous Monitoring, Cyber Security Assessment, Security Controls, Information Privacy
- Status: Free Trial
Palo Alto Networks
Skills you'll gain: Cybersecurity, Zero Trust Network Access, Cyber Threat Intelligence, Malware Protection, Network Security, Firewall, Threat Detection, Cloud Security, Endpoint Security, Security Controls, Enterprise Security, Software As A Service, Cloud Computing, Cryptography
- Status: Preview
University of Geneva
Skills you'll gain: Social Justice, International Relations, European History, Legal Research, Law, Regulation, and Compliance, World History, Environmental Issue, Political Sciences, Cultural Diversity, Ethical Standards And Conduct
- Status: Free Trial
New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
- Status: Free Trial
New York University
Skills you'll gain: Network Security, Firewall, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
- Status: Free Trial
Skills you'll gain: Paid media, Instagram, Online Advertising, Social Media, Social Media Campaigns, Advertising Campaigns, Advertising, Digital Advertising, Marketing Materials, Social Media Marketing, Social Media Content, Social Media Strategy, Facebook, Copywriting, Content Creation, Marketing, Information Privacy, Campaign Management, Data Collection, Brand Management
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Vulnerability Management, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Management, Vulnerability Assessments, Cyber Security Strategy, Network Security, Threat Management, Threat Detection, Security Controls, Cyber Governance, Firewall, Virtual Private Networks (VPN), Intrusion Detection and Prevention, Continuous Improvement Process
- Status: Free Trial
Skills you'll gain: Encryption, Cybersecurity, Cyber Attacks, Threat Management, Security Strategy, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
- Status: Preview
École Polytechnique Fédérale de Lausanne
Skills you'll gain: Waste Minimization, Environmental Engineering, Pollution Prevention, Environmental Management Systems, Environment and Resource Management, Governance, Environmental Science, Community Development, Environmental Regulations, Environmental Policy
- Status: Preview
Erasmus University Rotterdam
Skills you'll gain: Email Security, Human Factors (Security), Cyber Security Policies, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Risk, Computer Security Awareness Training, Patient Safety, Malware Protection, Encryption, Health Technology, Data Security, Safety and Security, Telehealth, Information Privacy, General Data Protection Regulation (GDPR)
- Status: Free Trial
University of Colorado System
Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, Data Validation
In summary, here are 10 of our most popular malware protection courses
- Introduction to Environmental Law and Policy:Â The University of North Carolina at Chapel Hill
- The GRC Approach to Managing Cybersecurity:Â Kennesaw State University
- Palo Alto Networks Cybersecurity Foundation:Â Palo Alto Networks
- Introduction aux Droits de l’Homme: University of Geneva
- Cyber Attack Countermeasures:Â New York University
- Real-Time Cyber Threat Detection and Mitigation:Â New York University
- Fundamentals of Social Media Advertising:Â Meta
- The Foundations of Cybersecurity:Â Kennesaw State University
- Cybersecurity Threat Vectors and Mitigation:Â Microsoft
- Municipal Solid Waste Management in Developing Countries: École Polytechnique Fédérale de Lausanne