Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cybersecurity threat detection"
New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Cybersecurity, Information Systems Security, Network Monitoring, Network Analysis
LearnKartS
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Penetration Testing, Cloud Computing, Cybersecurity, Mobile Security, Application Security, Cyber Threat Intelligence, Virtualization, Encryption, Cryptography, Vulnerability Assessments, SQL
- Status: Free
Coursera Instructor Network
Skills you'll gain: Generative AI, Regulatory Compliance, Regulatory Requirements, Compliance Management, Governance, Governance Risk Management and Compliance, Risk Management, Financial Regulation, Anomaly Detection, Artificial Intelligence, Threat Detection, Artificial Intelligence and Machine Learning (AI/ML), Predictive Analytics
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Cyber Attacks, Network Security, Vulnerability Assessments, Cloud Services, Data Security, Human Factors (Security), Personally Identifiable Information
- Status: Free
National Taiwan University
Skills you'll gain: Autodesk Revit, Building Information Modeling, Autodesk, AutoCAD, Construction Estimating, Simulation and Simulation Software, 3D Modeling, Construction Management, Cost Estimation
Kennesaw State University
Skills you'll gain: Risk Management, Cyber Governance, Cost Benefit Analysis, Security Management, Risk Management Framework, Vulnerability Management, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Operational Risk, Risk Analysis, Enterprise Risk Management (ERM), Business Risk Management, Risk Mitigation, Cyber Threat Intelligence, Vulnerability Assessments, ISO/IEC 27001, Threat Detection, Risk Modeling
University of Toronto
Skills you'll gain: Computer Vision, Image Analysis, Deep Learning, Artificial Neural Networks, Visualization (Computer Graphics), Artificial Intelligence, Machine Learning, Python Programming, NumPy, Linear Algebra
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Network Planning And Design, Network Protocols, Network Model, Cloud Computing, TCP/IP
University of London
Skills you'll gain: Computer Science, Computer Systems, Development Environment, Web Applications, Debugging, Graphing, Program Development, Computer Networking, Computational Thinking, Computer Programming Tools, Usability, Arithmetic, Applied Mathematics, Mathematical Modeling, Cybersecurity, Software Development Tools, Visualization (Computer Graphics), Computer Programming, Computer Graphics, Numerical Analysis
Skills you'll gain: Network Security, Cloud Computing, Network Infrastructure, Microsoft Azure, Firewall, Computer Networking, Virtualization and Virtual Machines, Networking Hardware, Cybersecurity, Network Protocols, Artificial Intelligence and Machine Learning (AI/ML)
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Threat Detection, Amazon Web Services, Incident Response, Continuous Monitoring, Cloud Security, Data Security, Identity and Access Management, Amazon Elastic Compute Cloud, Network Security, Cloud Computing
In summary, here are 10 of our most popular cybersecurity threat detection courses
- Cyber Attack Countermeasures:Â New York University
- Introduction to Intrusion Detection Systems (IDS):Â Johns Hopkins University
- Advanced Cybersecurity:Â LearnKartS
- GenAI for Fraud Detection and Compliance:Â Coursera Instructor Network
- Cyber Threats and Attack Vectors:Â University of Colorado System
- BIM Application for Engineers:Â National Taiwan University
- Cybersecurity Risk Management Frameworks:Â Kennesaw State University
- Visual Perception for Self-Driving Cars:Â University of Toronto
- Network Security:Â ISC2
- Introduction to Computer Science and Programming:Â University of London