Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cybersecurity threat detection"
Columbia University
Skills you'll gain: Image Analysis, Computer Vision, Computer Graphics, Computational Thinking, Algorithms, Machine Learning Algorithms, Machine Learning
Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Vulnerability Assessments, Application Security, Vulnerability Management, Event Monitoring, Secure Coding, Security Controls, Data Integrity, Security Testing, Cybersecurity, Patch Management, Authorization (Computing), Network Security, Cryptography, Extensible Markup Language (XML), System Configuration, Scripting, Encryption, Software Design
Coursera Project Network
Skills you'll gain: Image Analysis, Amazon Web Services, Data Manipulation, Computer Vision, Amazon S3, Anomaly Detection, Predictive Modeling, Software Quality Assurance, Applied Machine Learning, Analytics
Skills you'll gain: Network Troubleshooting, Computer Networking, Cloud Management, Linux, IT Infrastructure, Cybersecurity, Microsoft Windows, Network Security, Network Protocols, TCP/IP, Systems Administration, Remote Access Systems, Desktop Support, Technical Support, File Systems, Security Strategy, Lightweight Directory Access Protocols, Security Awareness, System Support, Help Desk Support
Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Cyber Threat Hunting, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Network Security, Network Monitoring, Data Security, Network Analysis, Malware Protection, Vulnerability Assessments, Operating Systems, OS Process Management
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Cybersecurity, Computer Networking, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks, Cyber Risk
Infosec
Skills you'll gain: Authentications, Application Security, Secure Coding, Serverless Computing, Cryptography, Risk Management Framework, Threat Modeling, Cloud Security, Infrastructure Security, Package and Software Management, Node.JS, Web Applications, Javascript, Vulnerability Management, Cloud Services, Cloud Platforms, Web Development, Identity and Access Management, Dependency Analysis, Vulnerability Assessments
- Status: Free
DeepLearning.AI
Skills you'll gain: Anomaly Detection, Google Cloud Platform, Text Mining, Applied Machine Learning, Natural Language Processing, Semantic Web, Unsupervised Learning, Artificial Intelligence and Machine Learning (AI/ML)
Kennesaw State University
Skills you'll gain: Network Security, Security Management, Firewall, Cyber Attacks, Network Monitoring, Cybersecurity, Cyber Security Assessment, Network Protocols, Computer Networking, Virtual Private Networks (VPN), Wireless Networks, Vulnerability Assessments, Cloud Security, Continuous Monitoring, TCP/IP, Intrusion Detection and Prevention, Threat Detection, Mobile Security, Cryptography, Encryption
University of Colorado System
Skills you'll gain: Cryptography, Cybersecurity, Encryption, Public Key Infrastructure, Data Integrity
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Threat Management, Disaster Recovery, Cyber Operations, Cybersecurity, Threat Detection, Intrusion Detection and Prevention, Event Monitoring, Business Continuity, Vulnerability Assessments, Technical Communication
Skills you'll gain: Azure Active Directory, Active Directory, Microsoft Azure, Security Controls, Identity and Access Management, Security Information and Event Management (SIEM), Generative AI, Cloud Security, Data Governance, Authentications, Network Security, Role-Based Access Control (RBAC), Data Security, Cybersecurity, System Monitoring, Threat Detection, Multi-Factor Authentication, Encryption
In summary, here are 10 of our most popular cybersecurity threat detection courses
- Features and Boundaries:Â Columbia University
- OWASP Top 10 - 2021:Â Infosec
- Build Image Quality Inspection using AWS Lookout for Vision:Â Coursera Project Network
- Google شهادة تقنية المعلومات من: Google
- Technical Deep Dive with Incident Response Tools:Â Infosec
- Cyber Security – Technology and Governance: Royal Holloway, University of London
- JavaScript Security:Â Infosec
- Understanding and Applying Text Embeddings:Â DeepLearning.AI
- Managing Network Security:Â Kennesaw State University
- Classical Cryptosystems and Core Concepts:Â University of Colorado System