Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "ransomware"
- Status: Free
Peking University
Skills you'll gain: Application Security, Authorization (Computing), Security Engineering, Computer Security, Threat Modeling, Operating Systems, Information Systems Security, Security Controls, Continuous Monitoring, Infrastructure Security, Security Requirements Analysis, Virtualization, Data Security, Identity and Access Management, Information Assurance, Virtual Machines, Authentications, Role-Based Access Control (RBAC)
- Status: Free
Coursera Instructor Network
Skills you'll gain: Cybersecurity, Cyber Attacks, Threat Modeling, Risk Analysis, Application Security, Vulnerability Assessments, Network Security, Threat Detection, Data Security, Artificial Intelligence, Risk Mitigation, Generative AI, Natural Language Processing
Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Public Key Infrastructure, Cryptography, Security Testing, Cybersecurity, Vulnerability Assessments, Encryption, Technical Writing, Cyber Threat Intelligence, Cyber Attacks
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Threat Modeling, Cyber Threat Intelligence, Cybersecurity, Threat Detection, Operating Systems, Malware Protection, Application Security, Information Systems Security, Vulnerability Assessments, Vulnerability Management, Computer Architecture
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Mobile Security, Cybersecurity, Cyber Threat Intelligence, Application Security, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Intrusion Detection and Prevention, Encryption, Network Protocols
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Cloud Security, Microsoft Azure, Cloud Infrastructure, Cloud Computing, Infrastructure Security, Cloud Platforms, Network Security, Private Cloud, Threat Detection, Public Cloud, Firewall, Security Management
- Status: New
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Unix, Application Security, Vulnerability Assessments, Cybersecurity, Unix Commands, System Programming, Linux, Debugging, Command-Line Interface, Windows PowerShell, Computer Architecture, Authentications
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Management, Cybersecurity, Zero Trust Network Access, Application Deployment, Network Protocols, Identity and Access Management, Software Installation, Infrastructure Architecture, Solution Architecture, Linux
- Status: New
Johns Hopkins University
Skills you'll gain: Malware Protection, Cybersecurity, Internet Of Things, Network Monitoring, TCP/IP, Network Security, Network Analysis, Border Gateway Protocol, Threat Detection, Network Routing, Network Protocols, Vulnerability Assessments, Docker (Software)
Illinois Tech
Skills you'll gain: Cybersecurity, Network Security, Information Systems Security, Cryptography, Disaster Recovery, Business Continuity, Law, Regulation, and Compliance, NIST 800-53, Infrastructure Security, Encryption, Bash (Scripting Language), Authorization (Computing), Safety and Security, Risk Management, Virtualization
- Status: New
Kennesaw State University
Skills you'll gain: Computer Security Awareness Training, Security Awareness, Cybersecurity, Network Security, General Networking, Internet Of Things, Network Infrastructure
Skills you'll gain: Incident Management, Incident Response, Security Management, Computer Security Incident Management, Continuous Monitoring, Infrastructure Security, Cybersecurity, Cyber Security Policies, Remote Access Systems, Telecommuting, Cyber Security Assessment, Security Strategy, Employee Engagement, Technology Roadmaps
Searches related to ransomware
In summary, here are 10 of our most popular ransomware courses
- 操作系统与虚拟化安全: Peking University
- Introduction to Prompt Injection Vulnerabilities: Coursera Instructor Network
- Cybersecurity Fundamentals: Johns Hopkins University
- Advanced Cybersecurity Topics: Johns Hopkins University
- Advanced Cybersecurity Techniques: Johns Hopkins University
- Check Point Jump Start: Cloud Security : Check Point Software Technologies Ltd.
- Security & Ethical Hacking: Attacking Unix and Windows : University of Colorado Boulder
- Check Point Jump Start: Harmony Endpoint Security: Check Point Software Technologies Ltd.
- Cybersecurity Fundamentals: Johns Hopkins University
- Cyber Security Technologies: Illinois Tech