Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "malware protection"
Skills you'll gain: Malware Protection, Cyber Threat Hunting, Cyber Security Assessment, Application Security, Threat Detection, Network Analysis, Virtual Machines, Code Review, Debugging, System Programming, Microsoft Windows, Windows PowerShell, Programming Principles, Computer Architecture, Excel Macros, Linux
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Intrusion Detection and Prevention, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Skills you'll gain: IT Service Management, Cloud Computing, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Linux Administration, Network Security, Network Protocols, Computer Security Incident Management, Cloud Security, Operating Systems, Endpoint Detection and Response, Cyber Risk, Data Ethics, Cyber Governance
Skills you'll gain: Excel Formulas, Microsoft Excel, Data Cleansing, Data Analysis, Data Import/Export, Spreadsheet Software, Data Wrangling, Data Quality, Pivot Tables And Charts, Google Sheets, Data Manipulation, Data Visualization Software, Information Privacy
University of Pennsylvania
Skills you'll gain: General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Information Privacy, Personally Identifiable Information, Regulatory Compliance, Data Security, Health Care Procedure and Regulation, Incident Response, Governance
What brings you to Coursera today?
Skills you'll gain: Computer Networking, Network Troubleshooting, Network Administration, TCP/IP, Network Protocols, Network Routing, Dynamic Host Configuration Protocol (DHCP), Virtual Private Networks (VPN), Network Security, Wireless Networks, Network Model, Data Integrity
Skills you'll gain: Network Security, Information Systems Security, Cybersecurity, Application Security, Encryption, Security Controls, Cyber Attacks, Security Awareness, Data Security, Cryptography, Threat Modeling, Security Management, Network Administration, Computer Security Awareness Training, Information Assurance, Wireless Networks, Hardening, Firewall, Malware Protection, Authentications
- Status: Free
Coursera Instructor Network
Skills you'll gain: General Data Protection Regulation (GDPR), Personally Identifiable Information, Governance Risk Management and Compliance, Information Privacy, Data Governance, Data Security, Cybersecurity, Data Management, Data Storage, Cyber Risk, Data Processing, Data Access, Encryption
Skills you'll gain: Dashboard, Data Storytelling, Data Warehousing, SQL, Data Governance, Data Security, Data Migration, Database Design, Data Literacy, Descriptive Statistics, Extract, Transform, Load, Data Mining, Cloud Storage, Data Visualization Software, Data Store, IBM DB2, Data Management, Relational Databases, MySQL, Excel Formulas
- Status: Free
Northeastern University
Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Ethics, Law, Regulation, and Compliance, Journalism, Emerging Technologies, Media and Communications, Internet Of Things, Artificial Intelligence
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, Data Security, Software Development Life Cycle
Macquarie University
Skills you'll gain: Microsoft Excel, Dashboard, Excel Formulas, Spreadsheet Software, Data Visualization, Excel Macros, Data Validation, Data Analysis Expressions (DAX), Data Cleansing, Data Modeling, Financial Forecasting, Predictive Modeling, Financial Modeling, Workflow Management, Finance, Data Management, Business Intelligence Software, Consolidation, Data Integrity, Data Entry
What brings you to Coursera today?
In summary, here are 10 of our most popular malware protection courses
- Malware Analysis and Introduction to Assembly Language:Â IBM
- IBM Cybersecurity Analyst:Â IBM
- IT Fundamentals for Cybersecurity:Â IBM
- Excel Basics for Data Analysis:Â IBM
- Privacy Law and Data Protection:Â University of Pennsylvania
- The Bits and Bytes of Computer Networking:Â Google
- IT Security: Defense against the digital dark arts :Â Google
- Introduction to Data Protection and Privacy:Â Coursera Instructor Network
- IBM Data Management:Â IBM
- Data Privacy Fundamentals:Â Northeastern University