Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "ransomware"
- Status: Free
Peking University
Skills you'll gain: Authorization (Computing), Security Engineering, Computer Security, Operating Systems, Information Systems Security, Security Controls, Continuous Monitoring, Infrastructure Security, Virtualization, Data Security, Cybersecurity, Identity and Access Management, Virtual Machines
Royal Holloway, University of London
Skills you'll gain: Human Factors (Security), Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Cyber Risk, Threat Modeling, Security Awareness, Social Sciences, Culture, Psychology, Survey Creation
- Status: Free
Coursera Instructor Network
Skills you'll gain: Disaster Recovery, Business Continuity Planning, Contingency Planning, Benchmarking, Business Risk Management, Risk Analysis, Personally Identifiable Information, Data Storage Technologies, Standard Operating Procedure, Data Governance, Threat Management, Compliance Management, Continuous Improvement Process
- Status: New
Kennesaw State University
Skills you'll gain: Computer Security Awareness Training, Security Awareness, Cybersecurity, Network Security, General Networking, Internet Of Things, Network Infrastructure
- Status: New
Skills you'll gain: Mobile Security, Open Web Application Security Project (OWASP), Cybersecurity, Network Security, Wireless Networks, Cryptography, Encryption, Penetration Testing, Application Security, Intrusion Detection and Prevention, Web Applications, Vulnerability Assessments, Infrastructure Security, Threat Detection, Internet Of Things, Cloud Security
- Status: New
Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Cybersecurity, Threat Modeling, Malware Protection, Penetration Testing, Threat Detection, Cyber Attacks, Network Security, Intrusion Detection and Prevention, Information Systems Security, Security Awareness, Lightweight Directory Access Protocols, Network Protocols
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Threat Detection, Network Analysis, Cybersecurity, System Design and Implementation, Network Security, Machine Learning Software, Machine Learning Methods, Performance Testing, Machine Learning Algorithms, Machine Learning, Artificial Intelligence, Supervised Learning, Microsoft Windows
- Status: New
Kennesaw State University
Skills you'll gain: Email Security, Firewall, Threat Detection, Network Security, Cybersecurity, Security Awareness, Cloud Storage, Information Privacy, Cloud Computing, General Networking, Encryption
- Status: New
Board Infinity
Skills you'll gain: Incident Response, Risk Management Framework, Cyber Risk, Risk Management, Security Management, Enterprise Risk Management (ERM), Business Risk Management, Cyber Threat Intelligence, Threat Management, Governance Risk Management and Compliance, Continuous Monitoring, Cybersecurity, Cyber Security Strategy, Risk Analysis, Cyber Operations, Security Information and Event Management (SIEM), Security Controls, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Key Performance Indicators (KPIs)
Skills you'll gain: Incident Management, Incident Response, Security Management, Computer Security Incident Management, Continuous Monitoring, Infrastructure Security, Cybersecurity, Cyber Security Policies, Remote Access Systems, Telecommuting, Cyber Security Assessment, Security Strategy, Employee Engagement, Technology Roadmaps
- Status: New
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Disaster Recovery, Business Continuity, Application Security, IT Security Architecture, Infrastructure Security, Cryptography, Regulation and Legal Compliance, Bash (Scripting Language), Encryption, Authorization (Computing), Risk Management, Virtualization
- Status: New
Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Public Key Infrastructure, Cryptography, Security Testing, Cybersecurity, Vulnerability Assessments, Encryption, Technical Writing, Cyber Threat Intelligence, Cyber Attacks
Searches related to ransomware
In summary, here are 10 of our most popular ransomware courses
- 操作系统与虚拟化安全: Peking University
- Cybercrime: Royal Holloway, University of London
- Disaster Recovery Planning for Organizations: Coursera Instructor Network
- Cybersecurity Awareness For Everyone: Final Assessment: Kennesaw State University
- Advanced Network Attacks, Web Hacking, and Cryptography: Packt
- System Hacking, Malware Threats, and Network Attacks: Packt
- Advanced Malware and Network Anomaly Detection: Johns Hopkins University
- Cybersecurity: Protecting your Information at Home: Kennesaw State University
- Advanced Cybersecurity Risk Management: Board Infinity
- Incident Management and Continuous Improvement: LearnQuest