Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "malware detection techniques"
- Status: NewStatus: Preview
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Open Web Application Security Project (OWASP), Vulnerability Assessments, Cyber Security Assessment, Cyber Threat Intelligence, Generative AI, Security Testing, Threat Modeling, Prompt Engineering, Artificial Intelligence, Automation
- Status: Free Trial
Infosec
Skills you'll gain: File Systems, Microsoft Windows, Cybersecurity, TCP/IP, Network Protocols, Data Security, Information Systems Security, Litigation Support, Network Security, Operating Systems, Data Structures, General Networking, Data Validation, Record Keeping, Data Integrity, Data Storage, Data Analysis Software, User Accounts, USB, System Configuration
- Status: Free Trial
University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Computer Networking, Cybersecurity, Network Protocols, Cyber Security Strategy, Computer Architecture, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks
- Status: NewStatus: Free
Skills you'll gain: Prompt Engineering, ChatGPT, Security Testing, Data Ethics, Penetration Testing, OpenAI, Threat Modeling, Application Security, Cyber Operations, Generative AI, Vulnerability Assessments, Large Language Modeling, Application Programming Interface (API), Artificial Intelligence, Scripting
- Status: Free Trial
Skills you'll gain: Cyber Operations, Cybersecurity, Authentications, Scripting, Python Programming, Data Access, Network Security, User Accounts, System Programming, Network Protocols
- Status: Preview
Johns Hopkins University
Skills you'll gain: DevOps, DevSecOps, CI/CD, GitHub, Continuous Deployment, Continuous Integration, Continuous Delivery, Version Control, Git (Version Control System), Process Improvement, Web Development Tools, Software Development, Information Technology Infrastructure Library, Cross-Functional Collaboration, Automation
In summary, here are 6 of our most popular malware detection techniques courses
- Generative AI for Penetration Testing: Red Team: LearnQuest
- Computer Forensics: Infosec
- Cyber Security – Technology and Governance: University of London
- ChatGPT for Offensive Security: Infosec
- Establishing Command-and-Control and Finding Credentials: Infosec
- Introduction to DevSecOps: Johns Hopkins University