• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Malware Detection Techniques

Results for "malware+detection+techniques"


  • I

    IBM

    Malware Analysis and Introduction to Assembly Language

    Skills you'll gain: Malware Protection, Exploit development, Cyber Threat Hunting, Cyber Security Assessment, Application Security, Threat Detection, Virtual Machines, Debugging, System Programming, Scripting, Windows PowerShell, Virtualization, Computer Architecture, Excel Macros, Linux

    4.5
    Rating, 4.5 out of 5 stars
    ·
    86 reviews

    Intermediate · Course · 1 - 3 Months

  • S

    Starweaver

    Advanced Threat Intelligence Techniques

    Skills you'll gain: Cyber Threat Intelligence, Intelligence Collection and Analysis, Cyber Threat Hunting, MITRE ATT&CK Framework, Threat Modeling, Threat Detection, AI Security, Malware Protection, Cyber Security Assessment, Cybersecurity, Artificial Intelligence, Network Analysis, Requirements Analysis, Technical Communication, Data Quality

    Intermediate · Course · 1 - 4 Weeks

  • E

    Edureka

    Cybersecurity and Network Defense Fundamentals

    Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Hardening, Cyber Threat Hunting, Operating System Administration, Threat Modeling, Exploitation techniques, Linux Commands, Intrusion Detection and Prevention, Cyber Operations, Linux, Cybersecurity, Cyber Security Strategy, Network Security, Network Monitoring, Operating Systems, Cyber Attacks, Cyber Engineering, Network Administration, Security Awareness

    Beginner · Course · 1 - 4 Weeks

  • J

    Johns Hopkins University

    Intrusion Detection

    Skills you'll gain: Intrusion Detection and Prevention, Model Evaluation, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Hunting, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Threat Management, Continuous Monitoring, Cyber Security Policies, Security Management, System Monitoring, AI Security, Virtual Machines, Network Analysis, Data Analysis

    Intermediate · Specialization · 3 - 6 Months

  • G

    Google

    Sound the Alarm: Detection and Response

    Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Threat Detection, Event Monitoring, Security Information and Event Management (SIEM), Incident Management, Security Management, Continuous Monitoring, Network Security, Network Monitoring, Splunk, Network Analysis, TCP/IP, Network Protocols, Query Languages

    4.8
    Rating, 4.8 out of 5 stars
    ·
    3.3K reviews

    Beginner · Course · 1 - 4 Weeks

  • C

    Coursera

    Securing Applications with Checkmarx

    Skills you'll gain: Secure Coding, Open Web Application Security Project (OWASP), DevSecOps, Security Testing, Application Security, Vulnerability Scanning, Vulnerability Assessments, Vulnerability Management, CI/CD, Continuous Monitoring, Docker (Software), Technical Communication, Computer Programming

    Intermediate · Course · 1 - 4 Weeks

What brings you to Coursera today?

  • E

    Edureka

    Incident Response and Cyber Forensics

    Skills you'll gain: Incident Response, Digital Forensics, Distributed Denial-Of-Service (DDoS) Attacks, Security Information and Event Management (SIEM), Computer Security Incident Management, Incident Management, Endpoint Detection and Response, Continuous Monitoring, Event Monitoring, System Monitoring, Intrusion Detection and Prevention, Cyber Threat Intelligence, Cyber Threat Hunting, Anomaly Detection, Cybersecurity, Cyber Security Strategy, Threat Detection, Malware Protection, Cyber Attacks, Cyber Engineering

    Intermediate · Course · 1 - 4 Weeks

  • M

    Macquarie University

    Cyber Security: Essentials for Forensics

    Skills you'll gain: Mobile Security, Digital Forensics, Criminal Investigation and Forensics, Investigation, Cyber Security Strategy, Cyber Threat Intelligence, Threat Detection, Cyber Attacks, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Policies, Mobile Development, Artificial Intelligence and Machine Learning (AI/ML), Cyber Governance, Data Security, Threat Modeling, Computer Security, Application Security, Machine Learning Methods, Digital Assets

    4.5
    Rating, 4.5 out of 5 stars
    ·
    34 reviews

    Intermediate · Specialization · 3 - 6 Months

  • P

    Pearson

    Cybersecurity Prevention and Detection

    Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Incident Response, Security Information and Event Management (SIEM), Cybersecurity, Threat Management, IT Security Architecture, Cloud Security, Cyber Risk, Intrusion Detection and Prevention, Cyber Security Policies, Data Security, Network Security, Cyber Security Strategy, Personally Identifiable Information, Malware Protection, Email Security, Risk Management

    Beginner · Specialization · 1 - 4 Weeks

  • J

    Johns Hopkins University

    Advanced Malware and Network Anomaly Detection

    Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Threat Detection, Network Analysis, AI Security, Applied Machine Learning, Model Evaluation, Network Security, Unsupervised Learning, Performance Testing, Analysis, Classification Algorithms, Microsoft Windows

    4.7
    Rating, 4.7 out of 5 stars
    ·
    22 reviews

    Intermediate · Course · 1 - 4 Weeks

  • U

    University of London

    Cyber Security – Technology and Governance

    Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, IT Security Architecture, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Computer Networking, Cybersecurity, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks

    4.8
    Rating, 4.8 out of 5 stars
    ·
    200 reviews

    Beginner · Specialization · 3 - 6 Months

  • M

    Macquarie University

    Cyber Security: Data, Privacy and AI Security

    Skills you'll gain: Information Privacy, Data Security, Security Testing, Data Ethics, Responsible AI, Data Governance, Cyber Threat Intelligence, Cyber Risk, Cyber Security Strategy, Cloud Security, Data Management, Data Loss Prevention, Cybersecurity, Data Integrity, Security Management, Security Controls, Security Awareness, Cyber Operations, Artificial Intelligence and Machine Learning (AI/ML), Data Science

    4.4
    Rating, 4.4 out of 5 stars
    ·
    26 reviews

    Beginner · Specialization · 3 - 6 Months

1234…9

In summary, here are 10 of our most popular malware+detection+techniques courses

  • Malware Analysis and Introduction to Assembly Language: IBM
  • Advanced Threat Intelligence Techniques: Starweaver
  • Cybersecurity and Network Defense Fundamentals: Edureka
  • Intrusion Detection: Johns Hopkins University
  • Sound the Alarm: Detection and Response: Google
  • Securing Applications with Checkmarx: Coursera
  • Incident Response and Cyber Forensics: Edureka
  • Cyber Security: Essentials for Forensics: Macquarie University
  • Cybersecurity Prevention and Detection: Pearson
  • Advanced Malware and Network Anomaly Detection: Johns Hopkins University

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok