Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "ransomware"
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Cloud Security, Microsoft Azure, Cloud Infrastructure, Cloud Computing, Infrastructure Security, Cloud Platforms, Network Security, Private Cloud, Threat Detection, Public Cloud, Firewall, Security Management
- Status: New
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Threat Modeling, Cyber Threat Intelligence, Cybersecurity, Threat Detection, Operating Systems, Malware Protection, Application Security, Information Systems Security, Vulnerability Assessments, Vulnerability Management, Computer Architecture
- Status: New
Kennesaw State University
Skills you'll gain: Wireless Networks, Mobile Security, Proxy Servers, Network Security, Cybersecurity, Virtual Private Networks (VPN), Computer Networking, Computer Security Awareness Training, Information Privacy, Emerging Technologies
- Status: New
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Mobile Security, Cybersecurity, Cyber Threat Intelligence, Application Security, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Intrusion Detection and Prevention, Encryption, Network Protocols
Kennesaw State University
Skills you'll gain: Cybersecurity, Cyber Security Policies, Computer Security Awareness Training, Cyber Attacks, Threat Management, Cyber Risk, Personally Identifiable Information, Threat Detection, Information Privacy, Authentications, General Data Protection Regulation (GDPR), Identity and Access Management
- Status: New
Kennesaw State University
Skills you'll gain: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Personally Identifiable Information, Threat Detection, Information Privacy, Safety and Security, Multi-Factor Authentication
- Status: New
Board Infinity
Skills you'll gain: Cyber Risk, Risk Management Framework, Risk Management, IT Management, Threat Management, Risk Mitigation, Vulnerability Management, Business Risk Management, Security Management, Enterprise Risk Management (ERM), Risk Analysis, Operational Risk, Risk Control, Cybersecurity, Governance Risk Management and Compliance, ISO/IEC 27001, Continuous Monitoring, Business Continuity, Incident Response, Governance
- Status: New
FAIR Institute
Skills you'll gain: Incident Response, Cyber Risk, Cyber Governance, Cyber Security Strategy, Enterprise Risk Management (ERM), Business Risk Management, Operational Risk, Mergers & Acquisitions, Cybersecurity, Risk Analysis, Security Management, Risk Management, Safety Culture, Compliance Management, Regulatory Requirements
- Status: New
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Cybersecurity, Virtual Private Networks (VPN), Remote Access Systems, Network Protocols, Vulnerability Assessments, Encryption, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
University of California San Diego
Skills you'll gain: Pedagogy, Blockchain, Data Ethics, Teaching, Emerging Technologies, Computer Networking, Internet Of Things, Instructional Strategies, Cybersecurity, Information Privacy, Encryption, Virtual Private Networks (VPN), Social Studies, Distributed Denial-Of-Service (DDoS) Attacks
- Status: Free
Universidades Anáhuac
Skills you'll gain: Cybersecurity, Cyber Attacks, Information Systems Security, Data Security, Malware Protection, Computer Security Awareness Training, Security Controls, Vulnerability Assessments, Threat Detection, Network Security, Security Awareness, Human Factors (Security)
- Status: NewStatus: Free
Ball State University
Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Key Management, Public Key Infrastructure, Data Integrity
Searches related to ransomware
In summary, here are 10 of our most popular ransomware courses
- Check Point Jump Start: Cloud Security :Â Check Point Software Technologies Ltd.
- Advanced Cybersecurity Topics:Â Johns Hopkins University
- Cybersecurity: Protecting your Information on the Go:Â Kennesaw State University
- Advanced Cybersecurity Techniques:Â Johns Hopkins University
- What Is Cybersecurity?:Â Kennesaw State University
- Cybersecurity: What to Do When You Are a Victim:Â Kennesaw State University
- Risk Assessment and Management in Cybersecurity:Â Board Infinity
- Understanding Cyber Risk Reporting with FAIRâ„¢:Â FAIR Institute
- Security & Ethical Hacking: Attacking the Network:Â University of Colorado Boulder
- Teaching Impacts of Technology: Global Society:Â University of California San Diego