Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "ransomware"
- Status: New
University of Maryland, College Park
Skills you'll gain: Cybersecurity, Cyber Risk, Risk Management, Risk Mitigation, Business Risk Management, Cyber Security Strategy, Operational Risk, Stakeholder Communications, Enterprise Risk Management (ERM), Security Management, Risk Analysis, Cyber Security Assessment, Threat Modeling, Governance, Vulnerability Assessments, Information Privacy, Estimation
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Azure Active Directory, Microsoft Azure, Cyber Security Policies, Cloud Security, Firewall, Cybersecurity, Malware Protection, Identity and Access Management, Network Security, Threat Management, Endpoint Security, Security Information and Event Management (SIEM), Threat Detection, Security Controls, Intrusion Detection and Prevention, Scenario Testing, Role-Based Access Control (RBAC), Encryption, Virtual Machines
Microsoft
Skills you'll gain: Vulnerability Management, Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Intrusion Detection and Prevention, Security Testing, Network Security, Threat Management, System Testing, Threat Detection, Firewall, Cybersecurity, Cloud Security, Microsoft Azure, Virtual Private Networks (VPN), Windows PowerShell, Command-Line Interface
Johns Hopkins University
Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Email Security, Threat Detection, Jupyter, Authentications, Machine Learning Algorithms, Artificial Intelligence, Multi-Factor Authentication, Threat Management, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning
Skills you'll gain: Cloud Security, Security Management, Data Management, Records Management, Cloud Computing Architecture, Data Security, General Data Protection Regulation (GDPR), Cloud Computing, Data Governance, Personally Identifiable Information, Information Privacy, Threat Detection, Microsoft Azure, Cybersecurity, Security Controls
Johns Hopkins University
Skills you'll gain: Personally Identifiable Information, Encryption, Health Information Management and Medical Records, Healthcare Industry Knowledge, Health Care Procedure and Regulation, Data Security, Cyber Attacks, Information Privacy, Regulatory Compliance, Cloud Computing, Cyber Security Policies, Patient Safety, End User Training and Support
Skills you'll gain: Incident Response, Computer Security Incident Management, Business Continuity, Security Management, Disaster Recovery, Risk Management Framework, Threat Management, Risk Management, Security Controls, Information Systems Security, Cybersecurity, Virtualization and Virtual Machines, Information Systems, Vulnerability Assessments, Cloud Computing
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Network Security, Unix, Cybersecurity, Application Security, Linux, Web Applications, Infrastructure Security, Virtual Machines, Web Servers, Software Installation
Skills you'll gain: Risk Management, Cyber Risk, Threat Management, Security Management, Business Risk Management, IT Management, Vulnerability Management, Risk Mitigation, Risk Analysis, Enterprise Risk Management (ERM), Operational Risk, Risk Control, Cybersecurity, Threat Modeling, Vulnerability Assessments, Incident Response
Skills you'll gain: Penetration Testing, Network Protocols, Network Security, Network Analysis, Malware Protection, Cyber Security Assessment, Cyber Threat Intelligence, Vulnerability Assessments, System Configuration, Image Analysis, Open Source Technology, Virtual Machines, Linux, Software Installation, Microsoft Windows
Skills you'll gain: Penetration Testing, Scripting, Scripting Languages, Python Programming, Cyber Security Assessment, Cyber Operations, Computer Programming, Email Security, Cybersecurity, Malware Protection, Command-Line Interface, Program Development, TCP/IP
Searches related to ransomware
In summary, here are 10 of our most popular ransomware courses
- Cybersecurity Risk Management Across Critical Systems:Â University of Maryland, College Park
- Detecting and Mitigating Cyber Threats and Attacks:Â University of Colorado System
- Azure Cybersecurity Solutions And Microsoft Defender :Â Microsoft
- Cybersecurity Testing and Prevention:Â Microsoft
- Introduction to AI for Cybersecurity:Â Johns Hopkins University
- Cybersecurity Planning, Management, and Compliance:Â Microsoft
- Healthcare Data Security, Privacy, and Compliance:Â Johns Hopkins University
- Incident Response and Risk Management:Â Packt
- An Introduction to Ethical Hacking with Kali Linux:Â Packt
- Risk Management for Cybersecurity and IT Managers:Â Packt