Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat detection"
Skills you'll gain: Security Management, Threat Management, Cybersecurity, Cyber Risk, Risk Management, Incident Response, Risk Mitigation, Security Information and Event Management (SIEM), Security Controls, Threat Modeling, Security Strategy, Continuous Monitoring, Data Security, Information Systems Security, Computer Security, Enterprise Security, Risk Analysis, Information Assurance, Open Web Application Security Project (OWASP), Auditing
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, Data Security, Software Development Life Cycle
DeepLearning.AI
Skills you'll gain: Computer Vision, Image Analysis, Deep Learning, Artificial Neural Networks, Applied Machine Learning, Artificial Intelligence, Network Architecture, Machine Learning, Data Processing, Algorithms
Skills you'll gain: Threat Modeling, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Vulnerability Assessments, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Personally Identifiable Information, Encryption
MathWorks
Skills you'll gain: Computer Vision, Image Analysis, Deep Learning, Matlab, Data Visualization, Applied Machine Learning, Data Cleansing, Data Analysis, Machine Learning, Performance Tuning
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
Skills you'll gain: Cybersecurity, Security Controls, Cyber Threat Intelligence, Security Management, Information Systems Security Assessment Framework (ISSAF), Computer Security, Security Strategy, Security Awareness, Risk Management Framework, Incident Response, Cyber Risk, Security Information and Event Management (SIEM), Threat Modeling, Information Assurance, Data Ethics, Network Analysis
Skills you'll gain: Cloud Computing, Linux, Linux Servers, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Security Controls, Virtual Machines, Firewall, Virtualization, User Accounts
DeepLearning.AI
Skills you'll gain: Extract, Transform, Load, Data Pipelines, Image Analysis, Data Import/Export, Tensorflow, iOS Development, Application Deployment, Android Development, Data Processing, Computer Vision, MLOps (Machine Learning Operations), Swift Programming, Mobile Development, Data Transformation, JSON, Applied Machine Learning, Data Sharing, Javascript, Deep Learning, Artificial Neural Networks
University at Buffalo
Skills you'll gain: Model Based Systems Engineering, Peer Review, Systems Engineering, Product Lifecycle Management, Intrusion Detection and Prevention, Security Controls, Performance Measurement, Anomaly Detection, Machine Controls, Incident Response, Digital Transformation, Vulnerability Assessments, Software Development Life Cycle, Product Engineering, Cybersecurity, Supply Chain Management, Manufacturing Processes, Data Sharing, Manufacturing Operations, Plan Execution
Skills you'll gain: Computer Vision, Image Analysis, Artificial Neural Networks, IBM Cloud, Keras (Neural Network Library), Cloud Applications, Deep Learning, Tensorflow, PyTorch (Machine Learning Library), Artificial Intelligence and Machine Learning (AI/ML), Computer Programming, Cloud Computing, Augmented Reality, Application Development, Computer Science, Machine Learning, Data Processing
Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Network Architecture, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Intrusion Detection and Prevention, Cyber Threat Intelligence, Computer Networking, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
Searches related to threat detection
In summary, here are 10 of our most popular threat detection courses
- Play It Safe: Manage Security Risks: Google
- Application Security for Developers and DevOps Professionals: IBM
- Convolutional Neural Networks: DeepLearning.AI
- Assets, Threats, and Vulnerabilities: Google
- Deep Learning for Object Detection: MathWorks
- IT Fundamentals for Cybersecurity: IBM
- Foundations of Cybersecurity: Google
- Operating Systems: Overview, Administration, and Security: IBM
- TensorFlow: Data and Deployment: DeepLearning.AI
- Digital Manufacturing & Design Technology: University at Buffalo