• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Malware Analysis

Results for "malware+analysis"


  • I

    IBM

    Malware Analysis and Introduction to Assembly Language

    Skills you'll gain: Malware Protection, Exploit development, Cyber Threat Hunting, Cyber Security Assessment, Application Security, Threat Detection, Virtual Machines, Debugging, System Programming, Scripting, Windows PowerShell, Virtualization, Computer Architecture, Excel Macros, Linux

    4.5
    Rating, 4.5 out of 5 stars
    ·
    86 reviews

    Intermediate · Course · 1 - 3 Months

  • E

    Edureka

    Cybersecurity Analyst

    Skills you'll gain: Cyber Threat Intelligence, Cyber Operations, Cyber Threat Hunting, Threat Modeling, Cybersecurity, Cyber Security Strategy, Network Security, MITRE ATT&CK Framework, Intrusion Detection and Prevention, Cyber Attacks, Linux Commands, Linux, Cyber Engineering, Network Administration, Operating System Administration, Hardening, Network Monitoring, Exploitation techniques, Security Awareness, Operating Systems

    Intermediate · Specialization · 3 - 6 Months

  • Status: Job Skills
    Job Skills
    M

    Microsoft

    Microsoft Cybersecurity Analyst

    Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, System Testing, Cloud Security, Vulnerability Scanning, Threat Management, Cloud Computing, Authentications, Active Directory, Operating Systems, Data Management, Computer Security Incident Management

    4.7
    Rating, 4.7 out of 5 stars
    ·
    3K reviews

    Beginner · Professional Certificate · 3 - 6 Months

  • E

    Edureka

    Cybersecurity and Network Defense Fundamentals

    Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Hardening, Cyber Threat Hunting, Operating System Administration, Threat Modeling, Exploitation techniques, Linux Commands, Intrusion Detection and Prevention, Cyber Operations, Linux, Cybersecurity, Cyber Security Strategy, Network Security, Network Monitoring, Operating Systems, Cyber Attacks, Cyber Engineering, Network Administration, Security Awareness

    Beginner · Course · 1 - 4 Weeks

  • C

    Coursera

    Evaluate, Create, and Analyze App Security

    Skills you'll gain: Threat Modeling, Security Testing, Secure Coding, Vulnerability Scanning, Penetration Testing, Vulnerability Management, Dependency Analysis, Application Security, Cyber Security Assessment, Security Requirements Analysis, DevSecOps, Security Strategy, Code Review, Risk Management Framework

    Intermediate · Course · 1 - 4 Weeks

  • P

    Pearson

    CompTIA Cybersecurity Analyst (CySA+) CS0-003

    Skills you'll gain: Computer Security Incident Management, Vulnerability Assessments, Cyber Operations, Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Security Management, Threat Modeling, Cyber Threat Hunting, Information Systems Security, Threat Detection, Cyber Security Strategy, DevSecOps, Continuous Monitoring, Malware Protection, Cloud Security, Cyber Security Assessment, Risk Management Framework, Encryption, Authentications

    4.5
    Rating, 4.5 out of 5 stars
    ·
    20 reviews

    Intermediate · Specialization · 1 - 3 Months

What brings you to Coursera today?

  • J

    Johns Hopkins University

    AI for Cybersecurity

    Skills you'll gain: Generative Adversarial Networks (GANs), Anomaly Detection, AI Security, Generative AI, Fraud detection, Intrusion Detection and Prevention, Model Evaluation, Malware Protection, Cyber Threat Hunting, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Cyber Security Strategy, Applied Machine Learning, Email Security, Network Security, Jupyter

    4.3
    Rating, 4.3 out of 5 stars
    ·
    121 reviews

    Intermediate · Specialization · 3 - 6 Months

  • M

    Macquarie University

    Cyber Security: Essentials for Forensics

    Skills you'll gain: Mobile Security, Digital Forensics, Criminal Investigation and Forensics, Investigation, Cyber Security Strategy, Cyber Threat Intelligence, Threat Detection, Cyber Attacks, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Policies, Mobile Development, Artificial Intelligence and Machine Learning (AI/ML), Cyber Governance, Data Security, Threat Modeling, Computer Security, Application Security, Machine Learning Methods, Digital Assets

    4.5
    Rating, 4.5 out of 5 stars
    ·
    34 reviews

    Intermediate · Specialization · 3 - 6 Months

  • J

    Johns Hopkins University

    Information Assurance Analysis

    Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, AI Security, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Network Monitoring, Responsible AI, Network Routing, Infrastructure Security, Application Security

    4
    Rating, 4 out of 5 stars
    ·
    10 reviews

    Intermediate · Specialization · 3 - 6 Months

  • S

    Starweaver

    Advanced Threat Intelligence Techniques

    Skills you'll gain: Cyber Threat Intelligence, Intelligence Collection and Analysis, Cyber Threat Hunting, MITRE ATT&CK Framework, Threat Modeling, Threat Detection, AI Security, Malware Protection, Cyber Security Assessment, Cybersecurity, Artificial Intelligence, Network Analysis, Requirements Analysis, Technical Communication, Data Quality

    Intermediate · Course · 1 - 4 Weeks

  • J

    Johns Hopkins University

    Intrusion Detection

    Skills you'll gain: Intrusion Detection and Prevention, Model Evaluation, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Hunting, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Threat Management, Continuous Monitoring, Cyber Security Policies, Security Management, System Monitoring, AI Security, Virtual Machines, Network Analysis, Data Analysis

    Intermediate · Specialization · 3 - 6 Months

  • J

    Johns Hopkins University

    Advanced Malware and Network Anomaly Detection

    Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Threat Detection, Network Analysis, AI Security, Applied Machine Learning, Model Evaluation, Network Security, Unsupervised Learning, Performance Testing, Analysis, Classification Algorithms, Microsoft Windows

    4.7
    Rating, 4.7 out of 5 stars
    ·
    22 reviews

    Intermediate · Course · 1 - 4 Weeks

1234…9

In summary, here are 10 of our most popular malware+analysis courses

  • Malware Analysis and Introduction to Assembly Language: IBM
  • Cybersecurity Analyst: Edureka
  • Microsoft Cybersecurity Analyst: Microsoft
  • Cybersecurity and Network Defense Fundamentals: Edureka
  • Evaluate, Create, and Analyze App Security: Coursera
  • CompTIA Cybersecurity Analyst (CySA+) CS0-003: Pearson
  • AI for Cybersecurity: Johns Hopkins University
  • Cyber Security: Essentials for Forensics: Macquarie University
  • Information Assurance Analysis: Johns Hopkins University
  • Advanced Threat Intelligence Techniques: Starweaver

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok