• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Log In
Join for Free
  • Browse
  • Malware Threats

Results for "malware threats"


  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Information Assurance Analysis

    Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Responsible AI, Network Routing, Infrastructure Security, Application Security, Information Systems Security

    4
    Rating, 4 out of 5 stars
    ·
    8 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Free
    Free
    I

    Infosec

    CompTIA Security+ 701

    Skills you'll gain: Cybersecurity, Cyber Attacks, Incident Response, Security Management, Network Security, Security Information and Event Management (SIEM), Security Controls, Identity and Access Management, Cryptography, Threat Detection, Data Security, Computer Security, Encryption, Personally Identifiable Information, Data Governance, Firewall, Vulnerability Assessments, User Accounts, Authorization (Computing), Risk Management

    4.5
    Rating, 4.5 out of 5 stars
    ·
    522 reviews

    Intermediate · Course · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Cybersecurity and Mobility

    Skills you'll gain: Cyber Security Strategy, Cybersecurity, Mobile Security, Cyber Threat Intelligence, Network Security, Internet Of Things, Cyber Governance, Data Security, Wireless Networks, Emerging Technologies, Business Technologies, Enterprise Application Management

    4.5
    Rating, 4.5 out of 5 stars
    ·
    638 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Pearson

    Certified Ethical Hacker (CEH)

    Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Network Security, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Malware Protection, Mobile Security, Threat Modeling, Threat Detection, Encryption, Cloud Security, Web Applications, Internet Of Things, Cloud Computing, Network Architecture

    4.8
    Rating, 4.8 out of 5 stars
    ·
    10 reviews

    Intermediate · Specialization · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    G

    Google Cloud

    Security in Google Cloud 日本語版

    Skills you'll gain: Prompt Engineering, Google Cloud Platform, Cloud Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Identity and Access Management, Kubernetes, Cloud Security, Infrastructure As A Service (IaaS), Generative AI, Authentications, Cloud Services, Containerization, Virtual Machines, Data Loss Prevention, Cloud Storage, Application Development, Network Infrastructure, Malware Protection, Cloud Computing, Continuous Monitoring

    4.5
    Rating, 4.5 out of 5 stars
    ·
    707 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    C

    CertNexus

    Detect and Mitigate Ethical Risks

    Skills you'll gain: Data Ethics, Responsible AI, Accountability, Risk Management, Risk Analysis, Information Privacy, Risk Mitigation, Safety and Security, Business Ethics, Artificial Intelligence, Machine Learning

    4.5
    Rating, 4.5 out of 5 stars
    ·
    95 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Introduction to AI for Cybersecurity

    Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Fraud detection, Email Security, Threat Detection, Jupyter, Authentications, Intrusion Detection and Prevention, Machine Learning Algorithms, Artificial Intelligence, Multi-Factor Authentication, Anomaly Detection, Natural Language Processing, Machine Learning, Deep Learning, Supervised Learning

    4.1
    Rating, 4.1 out of 5 stars
    ·
    74 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    Imperial College London

    Immunology: Immune Failures and Cancer Immunology

    Skills you'll gain: Immunology, Infectious Diseases, Oncology, Internal Medicine, Pathology, Pharmacotherapy, Molecular, Cellular, and Microbiology, Chronic Diseases

    4.7
    Rating, 4.7 out of 5 stars
    ·
    122 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    S

    SkillUp

    Introduction to Ethical Hacking Principles

    Skills you'll gain: Information Systems Security, Cyber Security Policies, Data Ethics, Cyber Governance, Application Security, Cyber Risk, Computer Security, Security Testing, General Data Protection Regulation (GDPR)

    4.7
    Rating, 4.7 out of 5 stars
    ·
    83 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    U

    University of Colorado Boulder

    Primate Conservation

    Skills you'll gain: Natural Resource Management, Environmental Science, Case Studies, Environment, Environmental Issue, Risk Analysis, Biology, Sustainable Development, Taxonomy

    4.5
    Rating, 4.5 out of 5 stars
    ·
    45 reviews

    Beginner · Course · 1 - 3 Months

  • P

    Packt

    Practical Cyber Hacking Skills for Beginners

    Skills you'll gain: Cybersecurity, Cyber Security Assessment, Incident Response, Firewall, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Assessments, Malware Protection, Virtualization and Virtual Machines, Authentications, Linux Commands

    Beginner · Course · 1 - 3 Months

  • Status: Free
    Free
    C

    Check Point Software Technologies Ltd.

    Check Point Jump Start: Harmony Endpoint Security

    Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Management, Cybersecurity, Cyber Attacks, Remote Access Systems, Zero Trust Network Access, Application Deployment, Network Protocols, Software Installation, Systems Architecture, Linux

    4.7
    Rating, 4.7 out of 5 stars
    ·
    13 reviews

    Beginner · Course · 1 - 3 Months

Searches related to malware threats

system hacking, malware threats, and network attacks
1…151617…38

In summary, here are 10 of our most popular malware threats courses

  • Information Assurance Analysis: Johns Hopkins University
  • CompTIA Security+ 701: Infosec
  • Cybersecurity and Mobility: Kennesaw State University
  • Certified Ethical Hacker (CEH): Pearson
  • Security in Google Cloud 日本語版: Google Cloud
  • Detect and Mitigate Ethical Risks: CertNexus
  • Introduction to AI for Cybersecurity: Johns Hopkins University
  • Immunology: Immune Failures and Cancer Immunology: Imperial College London
  • Introduction to Ethical Hacking Principles: SkillUp
  • Primate Conservation: University of Colorado Boulder

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok