Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "malware protection"
- Status: NewStatus: Free Trial
Skills you'll gain: Threat Modeling, Risk Management, Risk Appetite, Continuous Monitoring, Risk Mitigation, Vulnerability Management, Threat Detection
- Status: NewStatus: Free Trial
Skills you'll gain: Microsoft Azure, Cloud Security, Data Security, Kubernetes, Security Controls, Hardening, Database Architecture and Administration, Authentications, Identity and Access Management, Infrastructure Security, Authorization (Computing), Data Storage, Role-Based Access Control (RBAC), Network Security, System Configuration, Continuous Monitoring, Encryption, Key Management, Containerization
- Status: Free Trial
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cybersecurity, Cyber Security Strategy, Data Encryption Standard, Threat Management, Cyber Risk, Mobile Security, Enterprise Security, Computer Security, Threat Detection, Cyber Security Policies
- Status: NewStatus: Free Trial
Fractal Analytics
Skills you'll gain: Responsible AI, Data Governance, Data Strategy, Data Ethics, Generative AI, Data Management, Data Pipelines, Data Architecture, Metadata Management, Data Store, Governance, LLM Application, Data Loss Prevention, AI Product Strategy, Data Security, Interoperability, Data Integrity, Docker (Software), Data Storage, Artificial Intelligence and Machine Learning (AI/ML)
- Status: New
Google Cloud
Skills you'll gain: Firewall, Network Security, Cloud Security, Virtual Private Networks (VPN), Cloud Management, Threat Modeling, Network Monitoring, Threat Detection
- Status: NewStatus: Preview
Skills you'll gain: Role-Based Access Control (RBAC), Azure Active Directory, Authentications, Identity and Access Management, User Provisioning, Microsoft Azure, Multi-Factor Authentication, Authorization (Computing), Single Sign-On (SSO), User Accounts, Security Controls, Proxy Servers
- Status: NewStatus: Free Trial
Skills you'll gain: SQL, Database Management, Query Languages, Relational Databases, Database Design, Data Analysis, Data Integrity, Data Manipulation, User Accounts
- Status: NewStatus: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Virtual Private Networks (VPN), Network Security, Firewall, Threat Detection, Network Administration, Endpoint Security, Network Monitoring, Security Controls, System Configuration, Network Troubleshooting, Security Management, UI Components, Email Security, Active Directory
- Status: Preview
The University of North Carolina at Chapel Hill
Skills you'll gain: Environmental Laws, Environmental Policy, Environmental Regulations, Environmental Issue, Law, Regulation, and Compliance, Pollution Prevention, Environment and Resource Management, Risk Control, Water Quality, Water Resource Management, Legal Proceedings, Climate Change Mitigation, Case Studies
- Status: Preview
Vanderbilt University
Skills you'll gain: Clinical Data Management, Electronic Data Capture (EDC), Data Management, Data Collection, Case Report Forms, Data Sharing, Health Informatics, Data Strategy, Data Quality, Good Clinical Practices (GCP), Sampling (Statistics), Data Integrity, Data Validation, Regulatory Compliance
- Status: NewStatus: Free Trial
Skills you'll gain: Cloud Security, Incident Response, Security Controls, Computer Security Incident Management, Data Security, Identity and Access Management, Vulnerability Assessments, Application Security, Security Management, Network Security, Encryption, Vulnerability Management, Data Management, Patch Management
- Status: NewStatus: Free Trial
Skills you'll gain: Firewall, Zero Trust Network Access, Linux Administration, Network Security, Security Strategy, Remote Access Systems, Linux, Security Controls, Unix, Ubuntu, Systems Administration, System Configuration
In summary, here are 10 of our most popular malware protection courses
- The Pearson Complete Course for CISM Certification: Unit 2:Â Pearson
- Securing Compute, Storage, and Databases in Azure:Â Packt
- Introduction to Cyber Security:Â New York University
- Modern Data Strategy for Enterprise Generative AI:Â Fractal Analytics
- Introduction à Cloud Next Generation Firewall: Google Cloud
- Getting Started with Microsoft Entra:Â Whizlabs
- SQL for Any IT Professional: Unit 4:Â Pearson
- Check Point Jump Start: Quantum Spark Network Security:Â Check Point Software Technologies Ltd.
- Introduction to Environmental Law and Policy:Â The University of North Carolina at Chapel Hill
- Data Management for Clinical Research:Â Vanderbilt University