Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "ransomware"
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Management, Cybersecurity, Zero Trust Network Access, Application Deployment, Network Protocols, Identity and Access Management, Software Installation, Infrastructure Architecture, Solution Architecture, Linux
- Status: New
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Unix, Application Security, Vulnerability Assessments, Cybersecurity, Unix Commands, System Programming, Linux, Debugging, Command-Line Interface, Windows PowerShell, Computer Architecture, Authentications
- Status: Free
Universidades Anáhuac
Skills you'll gain: Cybersecurity, Cyber Attacks, Information Systems Security, Data Security, Malware Protection, Computer Security Awareness Training, Security Controls, Vulnerability Assessments, Threat Detection, Network Security, Security Awareness, Human Factors (Security)
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Threat Detection, Network Analysis, Cybersecurity, System Design and Implementation, Network Security, Machine Learning Software, Machine Learning Methods, Performance Testing, Machine Learning Algorithms, Machine Learning, Artificial Intelligence, Supervised Learning, Microsoft Windows
- Status: New
Johns Hopkins University
Skills you'll gain: Malware Protection, Cybersecurity, Internet Of Things, Network Monitoring, TCP/IP, Network Security, Network Analysis, Border Gateway Protocol, Threat Detection, Network Routing, Network Protocols, Vulnerability Assessments, Docker (Software)
Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Cyber Threat Intelligence, Threat Detection, Security Strategy, Intrusion Detection and Prevention, Threat Management, Cybersecurity, Continuous Monitoring, Security Information and Event Management (SIEM), Technical Communication
- Status: New
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Mobile Security, Cybersecurity, Cyber Threat Intelligence, Application Security, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Intrusion Detection and Prevention, Encryption, Network Protocols
University of California San Diego
Skills you'll gain: Pedagogy, Blockchain, Data Ethics, Teaching, Emerging Technologies, Computer Networking, Internet Of Things, Instructional Strategies, Cybersecurity, Information Privacy, Encryption, Virtual Private Networks (VPN), Social Studies, Distributed Denial-Of-Service (DDoS) Attacks
University of California San Diego
Skills you'll gain: Technical Communication, Digital Transformation, Cloud Computing, Computational Thinking, Big Data, Hypertext Markup Language (HTML), Cloud Storage, Data Science, Artificial Intelligence and Machine Learning (AI/ML), Amazon Web Services, SQL, Databases
- Status: New
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Cybersecurity, Virtual Private Networks (VPN), Remote Access Systems, Network Protocols, Vulnerability Assessments, Encryption, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
- Status: New
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Threat Modeling, Cyber Threat Intelligence, Cybersecurity, Threat Detection, Operating Systems, Malware Protection, Application Security, Information Systems Security, Vulnerability Assessments, Vulnerability Management, Computer Architecture
- Status: New
Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Public Key Infrastructure, Cryptography, Security Testing, Cybersecurity, Vulnerability Assessments, Encryption, Technical Writing, Cyber Threat Intelligence, Cyber Attacks
Searches related to ransomware
In summary, here are 10 of our most popular ransomware courses
- Check Point Jump Start: Harmony Endpoint Security:Â Check Point Software Technologies Ltd.
- Security & Ethical Hacking: Attacking Unix and Windows :Â University of Colorado Boulder
- Digital Shield: Cybersecurity for Data and System Protection: Universidades Anáhuac
- Advanced Malware and Network Anomaly Detection:Â Johns Hopkins University
- Cybersecurity Fundamentals:Â Johns Hopkins University
- Advanced Threat Hunting and Incident Response:Â LearnQuest
- Advanced Cybersecurity Techniques:Â Johns Hopkins University
- Teaching Impacts of Technology: Global Society:Â University of California San Diego
- Teaching Impacts of Technology: Workplace of the Future:Â University of California San Diego
- Security & Ethical Hacking: Attacking the Network:Â University of Colorado Boulder