Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "ransomware"
- Status: New
FAIR Institute
Skills you'll gain: Incident Response, Cyber Risk, Cyber Governance, Cyber Security Strategy, Enterprise Risk Management (ERM), Business Risk Management, Operational Risk, Mergers & Acquisitions, Cybersecurity, Risk Analysis, Security Management, Risk Management, Safety Culture, Compliance Management, Regulatory Requirements
- Status: New
Kennesaw State University
Skills you'll gain: Wireless Networks, Mobile Security, Proxy Servers, Network Security, Cybersecurity, Virtual Private Networks (VPN), Computer Networking, Computer Security Awareness Training, Information Privacy, Emerging Technologies
- Status: New
Board Infinity
Skills you'll gain: Cyber Risk, Risk Management Framework, Risk Management, IT Management, Threat Management, Risk Mitigation, Vulnerability Management, Business Risk Management, Security Management, Enterprise Risk Management (ERM), Risk Analysis, Operational Risk, Risk Control, Cybersecurity, Governance Risk Management and Compliance, ISO/IEC 27001, Continuous Monitoring, Business Continuity, Incident Response, Governance
Kennesaw State University
Skills you'll gain: Cybersecurity, Cyber Security Policies, Computer Security Awareness Training, Cyber Attacks, Threat Management, Cyber Risk, Personally Identifiable Information, Threat Detection, Information Privacy, Authentications, General Data Protection Regulation (GDPR), Identity and Access Management
- Status: New
Kennesaw State University
Skills you'll gain: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Personally Identifiable Information, Threat Detection, Information Privacy, Safety and Security, Multi-Factor Authentication
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Microsoft Intune (Mobile Device Management Software), Mobile Security, Application Deployment, Endpoint Security, Threat Management, Apple iOS, System Configuration, Threat Detection, Cyber Security Policies, Application Security
- Status: New
Johns Hopkins University
Skills you'll gain: Malware Protection, Cybersecurity, Internet Of Things, Network Monitoring, TCP/IP, Network Security, Network Analysis, Border Gateway Protocol, Threat Detection, Network Routing, Network Protocols, Vulnerability Assessments, Docker (Software)
- Status: Free
Universidades Anáhuac
Skills you'll gain: Cybersecurity, Cyber Attacks, Information Systems Security, Data Security, Malware Protection, Computer Security Awareness Training, Security Controls, Vulnerability Assessments, Threat Detection, Network Security, Security Awareness, Human Factors (Security)
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Management, Cybersecurity, Zero Trust Network Access, Application Deployment, Network Protocols, Identity and Access Management, Software Installation, Infrastructure Architecture, Solution Architecture, Linux
- Status: New
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Unix, Application Security, Vulnerability Assessments, Cybersecurity, Unix Commands, System Programming, Linux, Debugging, Command-Line Interface, Windows PowerShell, Computer Architecture, Authentications
University of California San Diego
Skills you'll gain: Technical Communication, Digital Transformation, Cloud Computing, Computational Thinking, Big Data, Hypertext Markup Language (HTML), Cloud Storage, Data Science, Artificial Intelligence and Machine Learning (AI/ML), Amazon Web Services, SQL, Databases
University of California San Diego
Skills you'll gain: Pedagogy, Blockchain, Data Ethics, Teaching, Emerging Technologies, Computer Networking, Internet Of Things, Instructional Strategies, Cybersecurity, Information Privacy, Encryption, Virtual Private Networks (VPN), Social Studies, Distributed Denial-Of-Service (DDoS) Attacks
Searches related to ransomware
In summary, here are 10 of our most popular ransomware courses
- Understanding Cyber Risk Reporting with FAIRâ„¢:Â FAIR Institute
- Cybersecurity: Protecting your Information on the Go:Â Kennesaw State University
- Risk Assessment and Management in Cybersecurity:Â Board Infinity
- What Is Cybersecurity?:Â Kennesaw State University
- Cybersecurity: What to Do When You Are a Victim:Â Kennesaw State University
- Check Point Jump Start: Harmony Mobile:Â Check Point Software Technologies Ltd.
- Cybersecurity Fundamentals:Â Johns Hopkins University
- Digital Shield: Cybersecurity for Data and System Protection: Universidades Anáhuac
- Check Point Jump Start: Harmony Endpoint Security:Â Check Point Software Technologies Ltd.
- Security & Ethical Hacking: Attacking Unix and Windows :Â University of Colorado Boulder