Malware

Sort options

Palo Alto Networks Cybersecurity Foundation (Coursera)

In this course, students will learn fundamental principles associated with the current cybersecurity landscape and identify concepts required to recognize and potentially mitigate attacks against enterprise networks as well as mission critical infrastructure. Students will also learn how to initially setup and configure security zones, authentication, and policies on [...]

Digital Shield: Cybersecurity for Data and System Protection (Coursera)

Digital Shield: Cybersecurity for Data and Systems Protection" is a course designed to provide a solid introduction to the protection of sensitive data and the infrastructure supporting various information systems. This MOOC was created in collaboration with CYBERPRO Global, a leading international provider of cyber education programs with over [...]

Check Point Jump Start: Harmony Endpoint Security (Coursera)

Harmony Endpoint is a complete solution that protects the remote workforce from today’s complex threat landscape. It prevents the most imminent threats to the endpoint such as ransomware, phishing, or drive-by malware, while quickly minimizing breach impact with autonomous detection and response.

Palo Alto Networks Cloud Security Fundamentals (Coursera)

In this Cloud Security Fundamentals course you will learn basic principles associated with securing the cloud and SaaS-based applications through Secure Access Service Edge architecture and identify concepts required to recognize and potentially mitigate attacks against traditional and hybrid datacenters as well as mission critical [...]

Introduction to Cybersecurity Tools & Cyber Attacks (Coursera)

This course gives you the background needed to understand basic Cybersecurity. You will learn the history of Cybersecurity, types and motives of cyber attacks to further your knowledge of current threats to organizations and individuals. Key terminology, basic system concepts and tools will be examined as an [...]

Malware Analysis and Introduction to Assembly Language (Coursera)

Malicious software, or malware, is typically delivered over a network and is designed to cause disruption to a computer, client, server, or network. Disruptions can include leaked private information, unauthorized access to information or systems, blocked user access, interference with security and privacy, or numerous other variations of attacking [...]

Ethical Hacking Essentials (EHE) (Coursera)

Nov 25th 2024
Ethical Hacking Essentials (EHE) (Coursera)
Course Auditing
Categories
Effort
Languages
Ethical Hacking Essentials is an introductory cybersecurity course that covers ethical hacking and penetration testing fundamentals and prepares learners for a career in cybersecurity. This course will introduce learners to computer and network security concepts such as threats and vulnerabilities, password cracking, web application attacks, IoT and OT attacks, [...]

Digital Forensics Essentials (DFE) (Coursera)

Nov 25th 2024
Digital Forensics Essentials (DFE) (Coursera)
Course Auditing
Categories
Effort
Languages
Digital Forensics Essentials helps learners increase their competency and expertise in digital forensics and information security skills, thereby adding value to their workplace and employer. This course will introduce learners to Computer Forensics Fundamentals as well as the Computer Forensics Investigation Process. Plan to learn about Dark Web, Windows, [...]

Security Awareness Training (Coursera)

Nov 25th 2024
Security Awareness Training (Coursera)
Free Course
Categories
Effort
Languages
The security of an organization is of the utmost importance and every member of the organization's staff plays a vital role in defending against cyber threats. One of the best ways to protect the organization is to institute a company-wide security-awareness training initiative.

Aruba Network Security Basics (Coursera)

In Aruba Network Security Basics, you will explore what threats pose a risk to a basic computer network and what security technologies are available to harden your devices against these attacks. How do messages get encrypted? What exactly is Malware? What technologies can we deploy that will allow networks [...]