Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "malware detection techniques"
- Status: New
Google Cloud
Skills you'll gain: Threat Management, Vulnerability Management, Threat Detection, Cloud Security, Vulnerability Assessments, Multi-Cloud, Security Management, Incident Management, Risk Management Framework, Security Information and Event Management (SIEM), Enterprise Security
University of Colorado Boulder
Skills you'll gain: Computer Vision, Power Electronics, Control Systems, Display Devices, Image Analysis, Computer Displays, Tensorflow, Electronic Systems, Deep Learning, Debugging, Artificial Neural Networks, Electrical Engineering, USB, Technical Design, Electrical Systems, Electronics, Artificial Intelligence and Machine Learning (AI/ML), Computer Programming Tools, Embedded Systems, Technical Documentation
University of Colorado Boulder
Skills you'll gain: Data Visualization, Real-Time Operating Systems, User Research, User Experience Design, Data Presentation, User Experience, Power Electronics, User Interface and User Experience (UI/UX) Design, Usability, Process Control, Verification And Validation, UI/UX Research, Machine Learning Algorithms, Debugging, Persona (User Experience), Internet Of Things, Machine Controls, Embedded Systems, Human Computer Interaction, Embedded Software
University of London
Skills you'll gain: Virtual Reality, Game Design, User Research, Full-Stack Web Development, Agile Software Development, Animations, Data Ethics, Git (Version Control System), Event-Driven Programming, Web Applications, Mobile Development, Data Science, Natural Language Processing, Cryptography, Unsupervised Learning, Combinatorics, Database Design, Web Development, Generative AI, Usability Testing
Coursera Project Network
Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Scanning, Proxy Servers, Security Testing, Penetration Testing, Vulnerability Assessments, Application Security, Vulnerability Management, Web Scraping, Web Applications
- Status: Free Trial
University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Penetration Testing, Vulnerability Assessments, Data Security, Security Controls, Authentications, Vulnerability Management, Web Applications, Javascript
- Status: NewStatus: Preview
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Open Web Application Security Project (OWASP), Vulnerability Assessments, Cyber Security Assessment, Cyber Threat Intelligence, Generative AI, Data Ethics, Prompt Engineering, Artificial Intelligence, Automation
- Status: Free Trial
Infosec
Skills you'll gain: File Systems, Microsoft Windows, Cybersecurity, TCP/IP, Network Protocols, Data Security, Information Systems Security, Litigation Support, Network Security, Operating Systems, Data Structures, General Networking, Data Validation, Record Keeping, Data Integrity, Data Storage, Data Analysis Software, User Accounts, USB, System Configuration
- Status: Free Trial
University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Computer Networking, Cybersecurity, Cyber Security Strategy, Computer Architecture, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks
- Status: NewStatus: Free
Skills you'll gain: Prompt Engineering, ChatGPT, Security Testing, Data Ethics, Penetration Testing, OpenAI, Threat Modeling, Application Security, Cyber Operations, Generative AI, Vulnerability Assessments, Large Language Modeling, Application Programming Interface (API), Artificial Intelligence, Scripting
- Status: Free Trial
Skills you'll gain: Cyber Operations, Cybersecurity, Authentications, Scripting, Python Programming, Data Access, Network Security, User Accounts, System Programming, Network Protocols
- Status: Preview
Johns Hopkins University
Skills you'll gain: DevOps, DevSecOps, CI/CD, GitHub, Continuous Deployment, Continuous Integration, Continuous Delivery, Version Control, Git (Version Control System), Process Improvement, Web Development Tools, Software Development, Information Technology Infrastructure Library, Cross-Functional Collaboration, Automation
In summary, here are 10 of our most popular malware detection techniques courses
- Security Command Center Enterprise 使用入门: Google Cloud
- Power Electronics Graduate Certificate: University of Colorado Boulder
- Industrial Internet of Things Graduate Certificate: University of Colorado Boulder
- Graduate Diploma in Computer Science: University of London
- Web Application Security Testing with OWASP ZAP: Coursera Project Network
- Identifying Security Vulnerabilities: University of California, Davis
- Generative AI for Penetration Testing: Red Team: LearnQuest
- Computer Forensics: Infosec
- Cyber Security – Technology and Governance: University of London
- ChatGPT for Offensive Security: Infosec