• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Malware Detection Techniques

Results for "malware+detection+techniques"


  • S

    Starweaver

    Advanced Threat Intelligence Techniques

    Skills you'll gain: Cyber Threat Intelligence, Intelligence Collection and Analysis, Cyber Threat Hunting, MITRE ATT&CK Framework, Threat Modeling, Threat Detection, AI Security, Malware Protection, Cyber Security Assessment, Cybersecurity, Artificial Intelligence, Network Analysis, Requirements Analysis, Technical Communication, Data Quality

    Intermediate · Course · 1 - 4 Weeks

  • E

    EDUCBA

    Kali Linux: Ethical Hacking & Pentesting

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Malware Protection, Exploitation techniques, Database Management, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Security Assessment, Brute-force attacks, Cryptography, Cybersecurity, Vulnerability Scanning, Intrusion Detection and Prevention, Data Import/Export, MySQL, Encryption, Mobile Security, Linux, Linux Administration

    4.8
    Rating, 4.8 out of 5 stars
    ·
    76 reviews

    Beginner · Specialization · 3 - 6 Months

  • J

    Johns Hopkins University

    Advanced Malware and Network Anomaly Detection

    Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Threat Detection, Network Analysis, AI Security, Applied Machine Learning, Model Evaluation, Network Security, Unsupervised Learning, Performance Testing, Analysis, Classification Algorithms, Microsoft Windows

    4.7
    Rating, 4.7 out of 5 stars
    ·
    22 reviews

    Intermediate · Course · 1 - 4 Weeks

  • E

    Edureka

    Cybersecurity and Network Defense Fundamentals

    Skills you'll gain: Cyber Threat Intelligence, MITRE ATT&CK Framework, Hardening, Cyber Threat Hunting, Operating System Administration, Threat Modeling, Exploitation techniques, Linux Commands, Intrusion Detection and Prevention, Cyber Operations, Linux, Cybersecurity, Cyber Security Strategy, Network Security, Network Monitoring, Operating Systems, Cyber Attacks, Cyber Engineering, Network Administration, Security Awareness

    Beginner · Course · 1 - 4 Weeks

  • J

    Johns Hopkins University

    Intrusion Detection

    Skills you'll gain: Intrusion Detection and Prevention, Model Evaluation, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Hunting, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Threat Management, Continuous Monitoring, Cyber Security Policies, Security Management, System Monitoring, AI Security, Virtual Machines, Network Analysis, Data Analysis

    Intermediate · Specialization · 3 - 6 Months

  • P

    Pearson

    Cybersecurity Prevention and Detection

    Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Incident Response, Security Information and Event Management (SIEM), Cybersecurity, Threat Management, Computer Security Incident Management, Cloud Security, Cyber Risk, Cyber Security Policies, Data Security, Network Security, Cyber Security Strategy, Personally Identifiable Information, Malware Protection, Cyber Attacks, Security Controls, Risk Management

    Beginner · Specialization · 1 - 4 Weeks

What brings you to Coursera today?

  • I

    IBM

    Malware Analysis and Introduction to Assembly Language

    Skills you'll gain: Malware Protection, Exploit development, Cyber Threat Hunting, Cyber Security Assessment, Application Security, Threat Detection, Virtual Machines, Debugging, System Programming, Scripting, Windows PowerShell, Virtualization, Computer Architecture, Excel Macros, Linux

    4.5
    Rating, 4.5 out of 5 stars
    ·
    86 reviews

    Intermediate · Course · 1 - 3 Months

  • E

    Edureka

    Incident Response and Cyber Forensics

    Skills you'll gain: Incident Response, Digital Forensics, Distributed Denial-Of-Service (DDoS) Attacks, Security Information and Event Management (SIEM), Computer Security Incident Management, Incident Management, Endpoint Detection and Response, Continuous Monitoring, Event Monitoring, System Monitoring, Intrusion Detection and Prevention, Cyber Threat Intelligence, Cyber Threat Hunting, Anomaly Detection, Cybersecurity, Cyber Security Strategy, Threat Detection, Malware Protection, Cyber Attacks, Cyber Engineering

    Intermediate · Course · 1 - 4 Weeks

  • M

    Macquarie University

    Cyber Security: Essentials for Forensics

    Skills you'll gain: Mobile Security, Criminal Investigation and Forensics, Investigation, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Attacks, Intrusion Detection and Prevention, Cybersecurity, Mobile Development, Cyber Security Policies, Apple iOS, Artificial Intelligence and Machine Learning (AI/ML), Cyber Governance, Data Security, Threat Modeling, Android (Operating System), Application Security, Computer Security, Legal Proceedings, Machine Learning Methods

    4.5
    Rating, 4.5 out of 5 stars
    ·
    34 reviews

    Intermediate · Specialization · 3 - 6 Months

  • E

    Edureka

    Penetration Testing and Vulnerability Scanning

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Cyber Security Assessment, Open Web Application Security Project (OWASP), Exploitation techniques, Application Security, Patch Management, Cyber Threat Intelligence, Web Applications, Cyber Engineering, Cyber Security Policies, Cyber Governance, Risk Management Framework, Linux Administration, Ethical Standards And Conduct, Linux, Linux Commands, Linux Servers

    Beginner · Course · 1 - 4 Weeks

  • E

    Edureka

    Cyber Threat Intelligence and Incident Response

    Skills you'll gain: Incident Response, Vulnerability Assessments, Vulnerability Management, Cyber Threat Intelligence, MITRE ATT&CK Framework, Cybersecurity, Endpoint Detection and Response, Intrusion Detection and Prevention, Cyber Attacks, Security Information and Event Management (SIEM), Event Monitoring, Cyber Engineering, Patch Management, Network Security, Malware Protection, Continuous Monitoring, Security Management, Cyber Risk, Digital Forensics, Risk Analysis

    Intermediate · Specialization · 1 - 3 Months

  • C

    Coursera

    Automate AI Anomaly Detection & Response

    Skills you'll gain: Anomaly Detection, Microsoft Azure, Event Monitoring, Application Performance Management, Time Series Analysis and Forecasting, Generative AI, Query Languages, Data Integration, Process Optimization, Data Analysis, User Feedback

    Intermediate · Course · 1 - 4 Weeks

1234…9

In summary, here are 10 of our most popular malware+detection+techniques courses

  • Advanced Threat Intelligence Techniques: Starweaver
  • Kali Linux: Ethical Hacking & Pentesting: EDUCBA
  • Advanced Malware and Network Anomaly Detection: Johns Hopkins University
  • Cybersecurity and Network Defense Fundamentals: Edureka
  • Intrusion Detection: Johns Hopkins University
  • Cybersecurity Prevention and Detection: Pearson
  • Malware Analysis and Introduction to Assembly Language: IBM
  • Incident Response and Cyber Forensics: Edureka
  • Cyber Security: Essentials for Forensics: Macquarie University
  • Penetration Testing and Vulnerability Scanning: Edureka

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok