Malware Protection

Malware Protection is a critical aspect of cybersecurity, involving the detection, prevention, and removal of malicious software that can compromise computer systems. Coursera's Malware Protection catalogue equips you with the knowledge and skills required to effectively safeguard digital assets. You'll learn about various types of malware such as viruses, worms, trojans, ransomware, and spyware, along with the techniques to identify and combat them. The curriculum also covers the implementation of robust security policies, the use of advanced anti-malware tools and the application of proactive defensive strategies. By mastering these skills, you'll be prepared to enhance the security posture of organizations, protect sensitive information, and mitigate potential cyber threats.
25credentials
1online degree
79courses

Most popular

Trending now

New releases

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "malware protection"

  • Status: New
    Status: Free Trial

    Skills you'll gain: Mobile Security, Operating System Administration, Microsoft Windows, Malware Protection, Information Technology Operations, Disaster Recovery, Mac OS, Document Management, Command-Line Interface, Incident Response, Network Security, Linux, Information Systems Security, Security Controls, Information Technology, Cybersecurity, Windows PowerShell, Problem Management, Operating Systems, Internet Of Things

  • Status: Free Trial

    Skills you'll gain: IT Security Architecture, Network Security, Computer Security, Application Security, Security Controls, Cybersecurity, Security Awareness, Cyber Attacks, Encryption, Data Security, Cryptography, Security Management, Authorization (Computing), Threat Management, Firewall, Network Administration, Authentications, Threat Detection, Hardening, Malware Protection

  • Status: New
    Status: Free Trial

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Encryption, Cybersecurity, Threat Detection, Data Encryption Standard, Threat Modeling, Cryptography, Cyber Attacks, Data Security, Databases, Malware Protection, Penetration Testing, Vulnerability Assessments, Application Security, Security Engineering, Authentications, Data Structures, Data Integrity, Artificial Intelligence, SQL

  • Status: Free Trial

    Johns Hopkins University

    Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Responsible AI, Network Routing, Infrastructure Security, Application Security, Information Systems Security

  • Status: Free Trial

    Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Threat Detection, Network Analysis, Cybersecurity, System Design and Implementation, Network Security, Machine Learning Software, Machine Learning Methods, Performance Testing, Machine Learning Algorithms, Machine Learning, Supervised Learning, Microsoft Windows

  • Status: New
    Status: Free Trial

    Skills you'll gain: Cyber Threat Intelligence, Malware Protection, Peripheral Devices, Personally Identifiable Information, Remote Access Systems, Hardware Troubleshooting, Threat Detection, Desktop Support, Help Desk Support, Cyber Attacks, Network Support, Cloud Services, Cybersecurity, Mac OS, Computer Hardware, Microsoft Windows, Technical Support and Services, Electrical Safety, IT Management, Cloud Security

  • Status: New
    Status: Free Trial

    Skills you'll gain: Incident Response, Threat Modeling, Threat Detection, Computer Security Incident Management, Malware Protection, Cybersecurity, Cyber Attacks, Network Analysis, Microsoft Windows, Operating Systems, Virtual Environment

  • Status: Free Trial

    Skills you'll gain: Security Information and Event Management (SIEM), Cloud Security, Cyber Security Policies, Microsoft Azure, Identity and Access Management, Cybersecurity, Malware Protection, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Firewall, Security Controls, Endpoint Security, Threat Detection, Virtual Machines, Encryption, Event Management

  • Status: Free Trial

    Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, TCP/IP, Internet Of Things, Network Security, Threat Detection, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Docker (Software)

  • Status: Free Trial

    Johns Hopkins University

    Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Threat Intelligence, Cyber Operations, Cyber Security Assessment, Cybersecurity, Operating Systems, Hardening, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Intrusion Detection and Prevention, System Programming, Authentications, Computer Architecture

  • Status: Free Trial

    Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Zero Trust Network Access, Malware Protection, Firewall, Endpoint Security, Cyber Threat Intelligence, Cloud Security, System Configuration, Cloud Computing, Software As A Service, Cryptography, Authentications, Artificial Intelligence

  • Status: Free Trial

    Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Network Security, Cryptography, Exploit development, Information Systems Security, Threat Detection, Intrusion Detection and Prevention, Cloud Security

What brings you to Coursera today?

Leading partners

  • Packt
  • Pearson
  • Google Cloud
  • IBM
  • Johns Hopkins University
  • Macquarie University
  • Cisco Learning and Certifications
  • EC-Council