• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Malware Detection Techniques

Results for "malware detection techniques"


  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    EDUCBA

    Kali Linux: Ethical Hacking & Pentesting

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Malware Protection, Exploitation techniques, Database Management, Security Testing, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Security Assessment, Cryptography, Cybersecurity, Vulnerability Scanning, Hardening, Threat Detection, Data Import/Export, Public Key Infrastructure, MySQL, Linux, Linux Administration

    4.5
    Rating, 4.5 out of 5 stars
    ·
    13 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: New
    New
    Status: Preview
    Preview
    C

    Coursera

    Advanced Techniques in Embedded Software Testing

    Skills you'll gain: Code Coverage, Embedded Software, Real-Time Operating Systems, Performance Testing, System Testing, Software Testing, User Acceptance Testing (UAT), Verification And Validation, Embedded Systems, Scenario Testing, Acceptance Testing, Test Tools, Test Execution Engine, Unit Testing, Test Case, Test Planning, Integration Testing, Simulations, System Requirements, Real Time Data

    Advanced · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Data, Privacy and AI Security

    Skills you'll gain: Responsible AI, Information Privacy, Personally Identifiable Information, Data Security, Threat Modeling, Vulnerability Assessments, Data Ethics, Data Governance, Data Management, Cyber Security Strategy, Data Integrity, Data Loss Prevention, Cloud Security, Cybersecurity, Security Awareness, Artificial Intelligence and Machine Learning (AI/ML), Security Management, Security Controls, Cyber Operations, Data Science

    4
    Rating, 4 out of 5 stars
    ·
    12 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: New
    New
    Status: Preview
    Preview
    S

    Starweaver

    Application Security Testing and Debugging

    Skills you'll gain: Open Web Application Security Project (OWASP), Debugging, DevSecOps, Penetration Testing, Cyber Security Strategy, Security Testing, Application Security, Vulnerability Scanning, Continuous Monitoring, Software Testing, Cybersecurity, Vulnerability Assessments, Threat Modeling, Test Automation, Secure Coding, Technical Communication

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    AI for Cybersecurity

    Skills you'll gain: Anomaly Detection, Generative AI, Fraud detection, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Security Strategy, Threat Modeling, Email Security, System Design and Implementation, Network Security, Jupyter, Authentications, Deep Learning, Machine Learning Software

    4.2
    Rating, 4.2 out of 5 stars
    ·
    89 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: New
    New
    P

    Packt

    Incident Response for Windows

    Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Threat Modeling, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Microsoft Windows, Exploitation techniques, Data Loss Prevention, Cyber Security Strategy, Event Monitoring, Cyber Attacks, Cybersecurity, Cyber Security Policies, Network Security, Anomaly Detection, Cyber Risk, Information Technology

    Beginner · Course · 3 - 6 Months

What brings you to Coursera today?

  • Status: New
    New
    Status: Preview
    Preview
    S

    Starweaver

    Advanced Strategic Threat Intelligence Research & Reporting

    Skills you'll gain: Cyber Threat Intelligence, Threat Modeling, MITRE ATT&CK Framework, Threat Detection, Threat Management, Intelligence Collection and Analysis, Report Writing, Technical Communication, Cyber Security Strategy, Cybersecurity, Research Reports, Data Storytelling, Verbal Communication Skills, Vulnerability Assessments, Incident Response, Business Writing, Risk Analysis, Communication, Presentations, Analysis

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    EDUCBA

    Mask Detector with Python & TensorFlow: Build & Deploy

    Skills you'll gain: Image Analysis, Tensorflow, Amazon Web Services, Cloud Applications, Application Development, Application Deployment, Deep Learning, Artificial Intelligence and Machine Learning (AI/ML), Computer Vision, Data Processing, Front-End Web Development

    Mixed · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Intrusion Detection

    Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Intelligence, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Cybersecurity, Cyber Security Strategy, Threat Management, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Applied Machine Learning, Network Analysis, Data Analysis

    Intermediate · Specialization · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Pearson

    Cybersecurity Prevention and Detection

    Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Incident Response, Threat Modeling, Security Information and Event Management (SIEM), Cybersecurity, Threat Management, Computer Security Incident Management, Cloud Security, MITRE ATT&CK Framework, Cyber Risk, Cyber Security Policies, Data Security, Network Security, Cyber Security Strategy, Personally Identifiable Information, Malware Protection, Risk Management

    Beginner · Specialization · 1 - 4 Weeks

  • Status: New
    New
    P

    Packt

    AI & Cybersecurity Threats, Global Actors, and Trends

    Skills you'll gain: DevSecOps, Cyber Operations, Threat Modeling, AWS Identity and Access Management (IAM), Zero Trust Network Access, Encryption

    Intermediate · Course · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    EDUCBA

    Advanced Penetration Testing with Kali Linux

    Skills you'll gain: Penetration Testing, Vulnerability Assessments, Cyber Security Assessment, Exploitation techniques, Malware Protection, Mobile Security, Cyber Operations, Scripting, Android (Operating System), Command-Line Interface, Authentications, Network Analysis, Automation, Virtual Environment

    Mixed · Course · 1 - 4 Weeks

1234…364

In summary, here are 10 of our most popular malware detection techniques courses

  • Kali Linux: Ethical Hacking & Pentesting: EDUCBA
  • Advanced Techniques in Embedded Software Testing: Coursera
  • Cyber Security: Data, Privacy and AI Security: Macquarie University
  • Application Security Testing and Debugging: Starweaver
  • AI for Cybersecurity: Johns Hopkins University
  • Incident Response for Windows: Packt
  • Advanced Strategic Threat Intelligence Research & Reporting: Starweaver
  • Mask Detector with Python & TensorFlow: Build & Deploy: EDUCBA
  • Intrusion Detection: Johns Hopkins University
  • Cybersecurity Prevention and Detection: Pearson

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok