Malware

Sort options

Ethical Hacking Essentials (EHE) (Coursera)

Apr 1st 2024
Ethical Hacking Essentials (EHE) (Coursera)
Course Auditing
Categories
Effort
Languages
Ethical Hacking Essentials is an introductory cybersecurity course that covers ethical hacking and penetration testing fundamentals and prepares learners for a career in cybersecurity. This course will introduce learners to computer and network security concepts such as threats and vulnerabilities, password cracking, web application attacks, IoT and OT attacks, [...]

Digital Forensics Essentials (DFE) (Coursera)

Apr 1st 2024
Digital Forensics Essentials (DFE) (Coursera)
Course Auditing
Categories
Effort
Languages
Digital Forensics Essentials helps learners increase their competency and expertise in digital forensics and information security skills, thereby adding value to their workplace and employer. This course will introduce learners to Computer Forensics Fundamentals as well as the Computer Forensics Investigation Process. Plan to learn about Dark Web, Windows, [...]

Aruba Network Security Basics (Coursera)

In Aruba Network Security Basics, you will explore what threats pose a risk to a basic computer network and what security technologies are available to harden your devices against these attacks. How do messages get encrypted? What exactly is Malware? What technologies can we deploy that will allow networks [...]

Palo Alto Networks Cybersecurity Foundation (Coursera)

In this course, students will learn fundamental principles associated with the current cybersecurity landscape and identify concepts required to recognize and potentially mitigate attacks against enterprise networks as well as mission critical infrastructure. Students will also learn how to initially setup and configure security zones, authentication, and policies on [...]

Malware Analysis and Introduction to Assembly Language (Coursera)

Malicious software, or malware, is typically delivered over a network and is designed to cause disruption to a computer, client, server, or network. Disruptions can include leaked private information, unauthorized access to information or systems, blocked user access, interference with security and privacy, or numerous other variations of attacking [...]

Palo Alto Networks Cloud Security Fundamentals (Coursera)

In this Cloud Security Fundamentals course you will learn basic principles associated with securing the cloud and SaaS-based applications through Secure Access Service Edge architecture and identify concepts required to recognize and potentially mitigate attacks against traditional and hybrid datacenters as well as mission critical [...]

Introduction to Cybersecurity Tools & Cyber Attacks (Coursera)

This course gives you the background needed to understand basic Cybersecurity. You will learn the history of Cybersecurity, types and motives of cyber attacks to further your knowledge of current threats to organizations and individuals. Key terminology, basic system concepts and tools will be examined as an [...]

Security Awareness Training (Coursera)

Mar 18th 2024
Security Awareness Training (Coursera)
Free Course
Categories
Effort
Languages
The security of an organization is of the utmost importance and every member of the organization's staff plays a vital role in defending against cyber threats. One of the best ways to protect the organization is to institute a company-wide security-awareness training initiative.

Check Point Jump Start: Harmony Endpoint Security (Coursera)

Harmony Endpoint is a complete solution that protects the remote workforce from today’s complex threat landscape. It prevents the most imminent threats to the endpoint such as ransomware, phishing, or drive-by malware, while quickly minimizing breach impact with autonomous detection and response.

Unlocking Information Security II: An Internet Perspective (edX)

Continue learning how systems are hacked and defended. Information Security is everywhere: as the world becomes more and more digitized, so it becomes more and more hackable. Cyber attacks, data breaches, and even cyber warfare are all very real - so it's infinitely important to understand how hackers think [...]