Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cybersecurity threat detection"
University of Colorado Boulder
Skills you'll gain: Internet Of Things, IBM Cloud, Wireless Networks, Cloud Platforms, Computer Networking, Network Protocols, Cybersecurity, Emerging Technologies, Market Analysis, Encryption, Automation, Operating Systems, Interviewing Skills
LearnKartS
Skills you'll gain: Penetration Testing, Cybersecurity, Cyber Attacks, Network Security, Security Testing, Information Systems Security, Cyber Threat Intelligence, Application Security, Vulnerability Assessments, Data Ethics, Security Awareness, Web Servers, Network Analysis
Vanderbilt University
Skills you'll gain: Criminal Investigation and Forensics, Social Justice, Policy Analysis, Sociology, Diversity Awareness, Law, Regulation, and Compliance, Research, Ethical Standards And Conduct, Psychology
University of Washington
Skills you'll gain: Unsupervised Learning, Supervised Learning, Machine Learning Methods, Predictive Analytics, Analytics, Data Analysis, Statistical Methods, Decision Tree Learning, Statistical Inference, Statistical Analysis, Machine Learning Algorithms, Machine Learning, Statistics, Graph Theory, Probability & Statistics, Network Analysis, Big Data, Sampling (Statistics), Random Forest Algorithm, Algorithms
Skills you'll gain: Generative AI, CI/CD, ChatGPT, Software Development, Software Development Life Cycle, DevSecOps, Data Ethics, Artificial Intelligence, OpenAI, Natural Language Processing, Prototyping, Software Architecture, Software Testing, Debugging
New York University
Skills you'll gain: Cyber Attacks, Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cybersecurity, IT Security Architecture, Cloud Security, NIST 800-53, Cyber Threat Intelligence, Hybrid Cloud Computing, Cloud Computing Architecture, Payment Card Industry (PCI) Data Security Standards, Security Controls, Risk Management Framework, Blockchain, Internet Of Things, Data Integrity
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Contingency Planning, Risk Management, Cyber Security Strategy, Security Management, Cybersecurity, Governance, Information Technology, Staff Management, Proposal Development, Organizational Structure, Presentations
- Status: Free
The University of Hong Kong
Skills you'll gain: Infectious Diseases, Epidemiology, Biostatistics, Mitigation, Emergency Response, Public Safety and National Security, Health Care, Medical Science and Research, Research, Preventative Care, Health Systems, Risk Management, Risk Analysis, Media and Communications, Community Outreach, Investigation, Big Data, Cultural Sensitivity
University of Colorado System
Skills you'll gain: Computer Security, OSI Models, Systems Administration, Virtualization, Network Security, Information Technology, Information Systems Security, Enterprise Security, General Networking, Network Administration, Information Systems, Computer Networking, Virtual Machines, Computer Systems, Data Integrity
University of Colorado Boulder
Skills you'll gain: Data Security, Cybersecurity, Cyber Attacks, Data Ethics, Authentications, Data Encryption Standard, Cryptography, Cyber Security Policies, Authorization (Computing), Security Controls, Data Integrity, Information Privacy, Security Awareness
Skills you'll gain: Digital Transformation, Cloud Computing Architecture, Business Transformation, Cloud Computing, System Design and Implementation, Software Architecture, SAP Applications, Cybersecurity, Cloud Platforms, Software As A Service, Cloud Services, Information Technology Architecture, Solution Architecture, Enterprise Resource Planning, Business Technologies, Customer Insights, Business Process Automation, Advanced Analytics, Application Development
University of Colorado Boulder
Skills you'll gain: Embedded Systems, Reliability, Performance Tuning, Hardware Architecture, Software Architecture, Verification And Validation, Software Design, Debugging, System Design and Implementation, Hardware Design, Real Time Data, System Programming, Software Systems, Linux, Systems Architecture, Systems Design, Operating Systems, Systems Analysis, Performance Testing, Technical Communication
In summary, here are 10 of our most popular cybersecurity threat detection courses
- Industrial IoT Markets and Security:Â University of Colorado Boulder
- Ethical Hacking Fundamentals:Â LearnKartS
- Hot Topics in Criminal Justice:Â Vanderbilt University
- Practical Predictive Analytics: Models and Methods:Â University of Washington
- Generative AI:Â Elevate your Software Development Career:Â IBM
- Enterprise and Infrastructure Security:Â New York University
- Road to the CISO – Culminating Project Course: Kennesaw State University
- Epidemics:Â The University of Hong Kong
- Enterprise System Management and Security :Â University of Colorado System
- Cybersecurity for Data Science:Â University of Colorado Boulder