Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cybersecurity threat detection"
Board Infinity
Skills you'll gain: Incident Response, Risk Management Framework, Cyber Risk, Risk Management, Security Management, Enterprise Risk Management (ERM), Business Risk Management, Cyber Threat Intelligence, Threat Management, Governance Risk Management and Compliance, Continuous Monitoring, Cybersecurity, Cyber Security Strategy, Risk Analysis, Cyber Operations, Security Information and Event Management (SIEM), Security Controls, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Key Performance Indicators (KPIs)
Skills you'll gain: Azure Active Directory, Data Security, Multi-Factor Authentication, Microsoft Azure, Role-Based Access Control (RBAC), Cloud Security, Active Directory, Threat Modeling, Security Strategy, Authentications, Data Storage, Application Security, Database Architecture and Administration, Virtual Machines, Infrastructure Security, Kubernetes, Continuous Monitoring, Web Applications, System Monitoring, Network Security
Infosec
Skills you'll gain: Cyber Threat Hunting, Threat Detection, Cyber Security Strategy, System Monitoring, Cybersecurity, Cyber Operations, Continuous Monitoring, Network Security, Incident Response, Network Monitoring, Anomaly Detection, Scripting
Queen Mary University of London
Skills you'll gain: Cloud Services, Cloud Computing, Cloud Computing Architecture, Contract Negotiation, Cloud Security, Vendor Contracts, Cyber Risk, Infrastructure As A Service (IaaS), Contract Review, Law, Regulation, and Compliance, Contract Management, Regulation and Legal Compliance, Service Level Agreement, Data Security, Data Governance
University of Michigan
Skills you'll gain: Computational Thinking, Programming Principles, Problem Solving, Computer Science, Disaster Recovery, Algorithms, Threat Detection, Epidemiology
Queen Mary University of London
Skills you'll gain: General Data Protection Regulation (GDPR), Cloud Services, Cloud Computing, Tax, Tax Laws, Law, Regulation, and Compliance, Cloud Security, Personally Identifiable Information, Cloud Computing Architecture, Tax Compliance, Data Security, Regulation and Legal Compliance, Sales Tax, Information Privacy, Contract Negotiation, Vendor Contracts, Corporate Tax, Cybersecurity, Cyber Risk, Infrastructure As A Service (IaaS)
University of California San Diego
Skills you'll gain: Cryptographic Protocols, Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Algorithms, Theoretical Computer Science, Computational Thinking, Python Programming, Logical Reasoning
Skills you'll gain: Continuous Monitoring, Business Continuity, ISO/IEC 27001, Security Management, Security Controls, Threat Management, Information Systems Security, Risk Management, Risk Analysis, Business Risk Management, Cyber Risk, Cyber Governance, Threat Modeling, Governance Risk Management and Compliance, Cyber Security Strategy, NIST 800-53, Cybersecurity, Compliance Management, Cyber Security Policies, Regulatory Requirements
University of California San Diego
Skills you'll gain: Internet Of Things, Wireless Networks, Emerging Technologies, Digital Communications, General Networking, Computer Networking, Network Protocols, Global Positioning Systems, Cybersecurity
Columbia University
Skills you'll gain: Image Analysis, Computer Vision, Computer Graphics, Computational Thinking, Algorithms, Machine Learning Algorithms, Machine Learning
Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Vulnerability Assessments, Application Security, Vulnerability Management, Event Monitoring, Secure Coding, Security Controls, Data Integrity, Security Testing, Cybersecurity, Patch Management, Authorization (Computing), Network Security, Cryptography, Extensible Markup Language (XML), System Configuration, Scripting, Encryption, Software Design
Coursera Project Network
Skills you'll gain: Image Analysis, Amazon Web Services, Data Manipulation, Computer Vision, Amazon S3, Anomaly Detection, Predictive Modeling, Software Quality Assurance, Applied Machine Learning, Analytics
In summary, here are 10 of our most popular cybersecurity threat detection courses
- Advanced Cybersecurity Risk Management:Â Board Infinity
- Microsoft Azure Security Engineer Associate (AZ-500):Â Microsoft
- Python for Active Defense:Â Infosec
- Cloud Computing Law: Transactions:Â Queen Mary University of London
- Problem Solving Using Computational Thinking:Â University of Michigan
- Cloud Computing Law:Â Queen Mary University of London
- Number Theory and Cryptography:Â University of California San Diego
- Security and Risk Management:Â Packt
- Internet of Things: How did we get here?:Â University of California San Diego
- Features and Boundaries:Â Columbia University