Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat detection"
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Record Keeping, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
University of Minnesota
Skills you'll gain: Enterprise Resource Planning, Business Systems Analysis, Systems Analysis, Requirements Analysis, Cybersecurity, Business Requirements, Business Systems, Cyber Threat Intelligence, Cloud Computing, Cloud Services, IT Management, Change Management, Business Technologies, Organizational Change, Technology Strategies, System Implementation, User Requirements Documents, Information Technology, Portfolio Management, Governance
DeepLearning.AI
Skills you'll gain: Generative AI, Tensorflow, Computer Vision, Image Analysis, Deep Learning, Keras (Neural Network Library), Artificial Neural Networks, Machine Learning Methods, Distributed Computing, Unsupervised Learning, Network Model, Scalability, Visualization (Computer Graphics), Network Architecture, Performance Tuning, Machine Learning, API Design
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, DevOps, Data Security, Software Development Life Cycle, Encryption
DeepLearning.AI
Skills you'll gain: Extract, Transform, Load, Data Pipelines, Image Analysis, Data Import/Export, Tensorflow, iOS Development, Application Deployment, Android Development, Data Processing, Computer Vision, MLOps (Machine Learning Operations), Swift Programming, Mobile Development, Data Transformation, JSON, Applied Machine Learning, Data Sharing, Javascript, Deep Learning, Artificial Neural Networks
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Computer Security Incident Management, Cyber Security Policies, Cyber Security Strategy, Cyber Governance, Human Factors (Security), Business Risk Management, Cybersecurity, Threat Management, Security Awareness, Law, Regulation, and Compliance, Information Management, Mobile Security, Business Ethics, Performance Measurement, Network Security
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Management, Security Information and Event Management (SIEM), Data Integrity
Skills you'll gain: Computer Vision, Image Analysis, Artificial Neural Networks, IBM Cloud, Keras (Neural Network Library), Cloud Applications, Deep Learning, Tensorflow, PyTorch (Machine Learning Library), Artificial Intelligence and Machine Learning (AI/ML), Computer Programming, Cloud Computing, Augmented Reality, Application Development, Computer Science, Machine Learning, Data Processing
Skills you'll gain: Anomaly Detection, Computer Vision, Artificial Intelligence, Microsoft Azure, Natural Language Processing, Artificial Intelligence and Machine Learning (AI/ML), Data Ethics, Machine Learning, Generative AI
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Cyber Attacks, Network Security, Vulnerability Assessments, Cloud Services, Data Security, Human Factors (Security), Personally Identifiable Information
Kennesaw State University
Skills you'll gain: Internet Of Things, Cybersecurity, Cyber Security Strategy, Mobile Security, Security Awareness, Wireless Networks, Information Privacy, Network Security, Data Security, Emerging Technologies, Risk Management Framework
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
Searches related to threat detection
In summary, here are 10 of our most popular threat detection courses
- Sound the Alarm: Detection and Response: Google
- Information Systems: University of Minnesota
- TensorFlow: Advanced Techniques: DeepLearning.AI
- Application Security for Developers and DevOps Professionals: IBM
- TensorFlow: Data and Deployment: DeepLearning.AI
- Cybersecurity: Developing a Program for Your Business: Kennesaw State University
- Incident Response and Digital Forensics: IBM
- Introduction to Computer Vision and Image Processing: IBM
- Artificial Intelligence on Microsoft Azure: Microsoft
- Cyber Threats and Attack Vectors: University of Colorado System