Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cybersecurity threat detection"
University of California San Diego
Skills you'll gain: Cryptographic Protocols, Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Algorithms, Theoretical Computer Science, Computational Thinking, Python Programming, Logical Reasoning
MathWorks
Skills you'll gain: Image Analysis, Computer Vision, Matlab, Anomaly Detection, Geospatial Information and Technology, Applied Machine Learning, Data Transformation, Algorithms
Skills you'll gain: Vulnerability Scanning, Threat Modeling, Vulnerability Management, Vulnerability Assessments, Secure Coding, Security Testing, Threat Management, Cyber Governance, Cyber Security Policies, Cyber Security Assessment, Cyber Attacks, Application Security, Open Web Application Security Project (OWASP), Threat Detection, Cybersecurity, Risk Management Framework, Security Management, Security Controls, Code Review, Incident Response
Skills you'll gain: Image Analysis, Computer Vision, Deep Learning, Matlab, Artificial Intelligence and Machine Learning (AI/ML), Visualization (Computer Graphics), Machine Learning
Microsoft
Skills you'll gain: Generative AI, System Monitoring, Data Ethics, ChatGPT, OpenAI, Cybersecurity, Artificial Intelligence, Image Analysis, Deep Learning, Artificial Intelligence and Machine Learning (AI/ML), Automation, Threat Detection, Emerging Technologies, Machine Learning
MathWorks
Skills you'll gain: Computer Vision, Image Analysis, Deep Learning, Matlab, Data Visualization, Applied Machine Learning, Data Cleansing, Data Analysis, Machine Learning, Performance Tuning
Johns Hopkins University
Skills you'll gain: Epidemiology, Event Monitoring, Health Care, Descriptive Analytics, Continuous Monitoring, Technical Communication, Preventative Care, Anomaly Detection, Media and Communications, Infectious Diseases, Law, Regulation, and Compliance, Data Ethics, Information Privacy
University of Minnesota
Skills you'll gain: Cloud Security, Application Security, Network Security, Cloud Computing, Cybersecurity, Information Systems Security, Infrastructure Security, Public Key Infrastructure, Cryptography, Private Cloud, Vulnerability Assessments, Virtualization, Virtual Machines, Authentications, Encryption, Authorization (Computing)
Skills you'll gain: Information Technology, Computer Hardware, Cloud Computing, Network Troubleshooting, Software Installation, Technical Support and Services, Cybersecurity, Cloud Infrastructure, Hardware Troubleshooting, Data Storage, General Networking, Operating Systems, Computer Security Awareness Training, Serverless Computing, Computer Programming, Databases
Skills you'll gain: System Configuration, Configuration Management, Cybersecurity, Security Awareness, Data Security, Security Controls, Event Monitoring, Encryption, Network Security, Continuous Monitoring, Cyber Security Policies, Information Technology Operations, System Monitoring, Key Management, General Networking, Data Integrity
Universidad de los Andes
Skills you'll gain: IT Security Architecture, Computer Security Incident Management, Network Security, Incident Response, Cryptography, Security Requirements Analysis, Penetration Testing, Information Systems Security, Human Factors (Security), Cybersecurity, Threat Detection, Cloud Security, Vulnerability Assessments, Cyber Attacks, Encryption, Vulnerability Management, Risk Management Framework, Data Security, Security Management, Personally Identifiable Information
Fortinet, Inc.
Skills you'll gain: Firewall, Virtual Private Networks (VPN), Network Troubleshooting, Network Routing, Network Security, Intrusion Detection and Prevention, Network Administration, Authentications, Network Monitoring, Event Monitoring, Lightweight Directory Access Protocols, Security Information and Event Management (SIEM), Security Engineering, Threat Management, Network Performance Management, Enterprise Security, Systems Administration, Network Architecture, Security Management, Network Infrastructure
In summary, here are 10 of our most popular cybersecurity threat detection courses
- Number Theory and Cryptography:Â University of California San Diego
- Introduction to Computer Vision:Â MathWorks
- Vulnerability Types and Concepts:Â Packt
- Object Tracking and Motion Detection with Computer Vision:Â MathWorks
- Copilot for Cybersecurity:Â Microsoft
- Deep Learning for Object Detection:Â MathWorks
- Surveillance Systems: Analysis, Dissemination, and Special Systems:Â Johns Hopkins University
- Cloud Security Basics:Â University of Minnesota
- Information Technology (IT) Fundamentals for Everyone:Â IBM
- Security Operations:Â ISC2