Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat detection"
Skills you'll gain: Image Analysis, Matlab, Computer Vision, Automation, Anomaly Detection, Spatial Data Analysis, Engineering Calculations, Spatial Analysis, 3D Modeling, Quantitative Research, Visualization (Computer Graphics), Data Analysis Software, Data Import/Export, Algorithms, Data Structures, Data Store
- Status: Free
Coursera Instructor Network
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Data Security, Threat Modeling, Personally Identifiable Information, Malware Protection, Email Security, Incident Response
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Cyber Attacks, Network Security, Vulnerability Assessments, Cloud Services, Data Security, Human Factors (Security), Personally Identifiable Information
DeepLearning.AI
Skills you'll gain: Unsupervised Learning, Artificial Intelligence and Machine Learning (AI/ML), Data Ethics, Machine Learning, Machine Learning Algorithms, Supervised Learning, Artificial Intelligence, Reinforcement Learning, Artificial Neural Networks, Deep Learning, Anomaly Detection, Dimensionality Reduction, Algorithms, Regression Analysis
- Status: Free
Yale University
Skills you'll gain: Political Sciences, Policy Analysis, Social Justice, Public Policies, Social Sciences, Law, Regulation, and Compliance, Governance, Ethical Standards And Conduct, Socioeconomics, Economics
Skills you'll gain: Cyber Threat Intelligence, Security Information and Event Management (SIEM), Generative AI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Natural Language Processing, Anomaly Detection, Vulnerability Management, Incident Management, Artificial Intelligence
- Status: AI skills
Google Cloud
Skills you'll gain: Cloud Security, Identity and Access Management, Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Threat Management, Cyber Threat Hunting, Risk Management Framework, Cyber Operations, Vulnerability Management, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Generative AI, DevSecOps, Cloud Computing, Data Security, Google Cloud Platform, Cybersecurity
Infosec
Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Cybersecurity, Network Security, Cyber Security Strategy, System Monitoring, Cyber Operations, Continuous Monitoring, Cyber Threat Intelligence, Cyber Attacks, Incident Response, Scripting, IT Automation, Network Monitoring, Command-Line Interface, Python Programming, Data Access, Authorization (Computing), Intrusion Detection and Prevention
- Status: Free
Eindhoven University of Technology
Skills you'll gain: Business Process, Process Analysis, Process Improvement, Business Process Management, Data Mining, Business Process Modeling, Process Optimization, Operational Analysis, Performance Analysis, Data Analysis, Real Time Data, Data Science, Verification And Validation
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
Skills you'll gain: Network Security, Hardening, Network Protocols, Cloud Security, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, Cybersecurity, General Networking, Network Infrastructure, Firewall, Cloud Computing, Virtual Private Networks (VPN)
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
Searches related to threat detection
In summary, here are 10 of our most popular threat detection courses
- Image Processing for Engineering and Science:Â MathWorks
- Introduction to Cybersecurity Fundamentals:Â Coursera Instructor Network
- Cyber Threats and Attack Vectors:Â University of Colorado System
- Unsupervised Learning, Recommenders, Reinforcement Learning:Â DeepLearning.AI
- Moral Foundations of Politics :Â Yale University
- Generative AI: Boost Your Cybersecurity Career :Â IBM
- Google Cloud Cybersecurity:Â Google Cloud
- Python for Cybersecurity:Â Infosec
- Process Mining: Data science in Action:Â Eindhoven University of Technology
- Detecting and Mitigating Cyber Threats and Attacks:Â University of Colorado System