• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Malware Detection Techniques

Results for "malware detection techniques"


  • Status: Free Trial
    Free Trial
    I

    IBM

    Exploitation and Penetration Testing with Metasploit

    Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Human Factors (Security), Information Systems Security, Data Persistence

    4.3
    Rating, 4.3 out of 5 stars
    ·
    32 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    Exploit Development, Malware, & Defensive Strategies

    Skills you'll gain: Exploit development, Penetration Testing, Cyber Operations, Malware Protection, Exploitation techniques, Network Monitoring, Object Oriented Programming (OOP), Vulnerability Scanning, Network Security, Network Protocols, Network Analysis, Scripting Languages, Scripting, Remote Access Systems, Python Programming, Program Development, Command-Line Interface, Code Reusability, Package and Software Management

    5
    Rating, 5 out of 5 stars
    ·
    9 reviews

    Advanced · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    Edureka

    Penetration Testing and Vulnerability Scanning

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Cyber Security Assessment, Open Web Application Security Project (OWASP), Security Testing, Exploitation techniques, Application Security, Patch Management, Cyber Threat Intelligence, Cyber Engineering, Cyber Governance, Risk Management Framework, Linux Administration, Dashboard Creation, Ethical Standards And Conduct, Linux, Linux Commands, Linux Servers

    Beginner · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    C

    Coursera

    Advanced Techniques in Embedded Software Testing

    Skills you'll gain: Code Coverage, Embedded Software, Real-Time Operating Systems, Performance Testing, System Testing, Software Testing, Verification And Validation, Test Engineering, Performance Stress Testing, Embedded Systems, Test Planning, Simulations, Real Time Data, Safety and Security

    Advanced · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    E

    EDUCBA

    Advanced Penetration Testing with Kali Linux

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Malware Protection, Security Testing, Mobile Security, Test Script Development, Scripting, Android (Operating System), Human Factors (Security), Scripting Languages, Authentications, Network Analysis, Automation, Virtual Networking, Virtual Environment

    4.8
    Rating, 4.8 out of 5 stars
    ·
    13 reviews

    Mixed · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Palo Alto Networks

    Palo Alto Networks Cybersecurity Foundation

    Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Zero Trust Network Access, Malware Protection, IT Security Architecture, Firewall, Computer Security, AI Security, Cyber Threat Intelligence, Endpoint Security, Endpoint Detection and Response, Security Architecture Review, Exploitation techniques, Cloud Security, System Configuration, Cloud Computing, Software As A Service, Cryptography, Authentications

    4.6
    Rating, 4.6 out of 5 stars
    ·
    558 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    E

    EDUCBA

    Ethical Hacking with Kali Linux: Analyze & Defend

    Skills you'll gain: Penetration Testing, Malware Protection, Cyber Security Assessment, Cyber Threat Intelligence, Exploitation techniques, Cybersecurity, Intrusion Detection and Prevention, Email Security, Vulnerability Assessments, Network Security, Human Factors (Security), Network Analysis, Data Persistence

    5
    Rating, 5 out of 5 stars
    ·
    15 reviews

    Mixed · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Introduction to AI for Cybersecurity

    Skills you'll gain: AI Security, Cybersecurity, Cyber Attacks, Fraud detection, Classification Algorithms, Email Security, Threat Detection, Jupyter, Authentications, Machine Learning Algorithms, Artificial Intelligence, Applied Machine Learning, Machine Learning, Supervised Learning

    4.2
    Rating, 4.2 out of 5 stars
    ·
    97 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    Edureka

    Cybersecurity and Network Defense Fundamentals

    Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Hardening, Cyber Threat Hunting, Operating System Administration, Threat Modeling, Exploitation techniques, Linux Commands, Intrusion Detection and Prevention, Cyber Operations, Linux, Cybersecurity, Cyber Security Strategy, Network Security, Network Monitoring, Operating Systems, Cyber Attacks, Cyber Engineering, Network Administration, Security Awareness

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Machine Learning and Emerging Technologies in Cybersecurity

    Skills you'll gain: Model Evaluation, Intrusion Detection and Prevention, Threat Detection, Computer Security Incident Management, Cybersecurity, Model Training, Incident Response, Machine Learning Methods, Anomaly Detection, Applied Machine Learning, Continuous Monitoring, AI Security, Cryptographic Protocols, Network Security, Machine Learning Algorithms, Machine Learning, Predictive Modeling, Network Architecture, Unsupervised Learning, Supervised Learning

    Intermediate · Course · 1 - 3 Months

  • P

    Packt

    Nmap for Penetration Testing: From Beginner to Advanced

    Skills you'll gain: OSI Models, TCP/IP, Vulnerability Scanning, General Networking, Network Protocols, Network Security, Network Monitoring, Network Troubleshooting, Security Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Firewall, Performance Tuning, Threat Detection, Network Analysis, Test Script Development, Scripting, System Configuration

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    G

    Google

    Network Traffic and Logs Using IDS and SIEM Tools

    Skills you'll gain: Computer Security Incident Management, Network Analysis, Anomaly Detection, JSON

    4.8
    Rating, 4.8 out of 5 stars
    ·
    19 reviews

    Beginner · Course · 1 - 4 Weeks

1…456…502

In summary, here are 10 of our most popular malware detection techniques courses

  • Exploitation and Penetration Testing with Metasploit: IBM
  • Exploit Development, Malware, & Defensive Strategies: Packt
  • Penetration Testing and Vulnerability Scanning: Edureka
  • Advanced Techniques in Embedded Software Testing: Coursera
  • Advanced Penetration Testing with Kali Linux: EDUCBA
  • Palo Alto Networks Cybersecurity Foundation: Palo Alto Networks
  • Ethical Hacking with Kali Linux: Analyze & Defend: EDUCBA
  • Introduction to AI for Cybersecurity: Johns Hopkins University
  • Cybersecurity and Network Defense Fundamentals: Edureka
  • Machine Learning and Emerging Technologies in Cybersecurity: Johns Hopkins University

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok