Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cybersecurity threat detection"
FAIR Institute
Skills you'll gain: Cyber Risk, Threat Management, Continuous Monitoring, Cyber Security Strategy, Risk Management, Risk Appetite, Enterprise Risk Management (ERM), Governance Risk Management and Compliance, Cybersecurity, Business Risk Management, Risk Modeling, Risk Mitigation, Risk Analysis, Governance, Goal Setting, Automation
Johns Hopkins University
Skills you'll gain: Game Theory, Reinforcement Learning, Data-Driven Decision-Making, Clinical Trials, Bioinformatics, Data Analysis, Image Analysis, Analytics, Markov Model, Bayesian Statistics, Time Series Analysis and Forecasting, Predictive Analytics, Business Analytics, Biostatistics, Data Science, Decision Making, Statistical Methods, Anomaly Detection, Cybersecurity, Algorithms
Skills you'll gain: Cloud Security, Threat Detection, Google Cloud Platform, Threat Management, Intrusion Detection and Prevention, Network Security, Firewall, Security Information and Event Management (SIEM), Incident Response, Endpoint Security
- Status: Free
IIT Roorkee
Skills you'll gain: Unsupervised Learning, Supervised Learning, Anomaly Detection, Data Mining, Scikit Learn (Machine Learning Library), Big Data, Data Cleansing, Data Visualization, Python Programming, Machine Learning, Data-Driven Decision-Making, NumPy, Exploratory Data Analysis, Deep Learning, Regression Analysis
Skills you'll gain: Cyber Risk, Risk Management, Enterprise Risk Management (ERM), Risk Analysis, Risk Modeling, Security Management, Operational Risk, Cybersecurity, Business Risk Management, Compliance Management, Stakeholder Communications, Continuous Improvement Process, Compliance Reporting, Decision Making, Financial Analysis
Johns Hopkins University
Skills you'll gain: Game Theory, Data-Driven Decision-Making, Cybersecurity, Data Science, Algorithms, Machine Learning, Artificial Intelligence, Risk Modeling
Skills you'll gain: Command-Line Interface, Linux Administration, Package and Software Management, Linux, Unix Commands, Linux Servers, Linux Commands, OS Process Management, File Systems, Red Hat Enterprise Linux, Software Installation, Unix, File Management, Service Management, Authorization (Computing), Systems Administration, Data Storage, Operating Systems, System Configuration
Tecnológico de Monterrey
Skills you'll gain: Health Care, Health Care Administration, Technology Solutions, Remote Access Systems, Technology Strategies, Patient Treatment, Emerging Technologies, Cybersecurity, Data Mining, Continuous Monitoring, Vital Signs
Skills you'll gain: Network Security, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Information Systems Security, Command-Line Interface, Security Controls, Virtual Private Networks (VPN), Hardening, Firewall, Vulnerability Scanning, Local Area Networks, Vulnerability Assessments, Zero Trust Network Access, Wireless Networks, Malware Protection, Threat Detection, Security Information and Event Management (SIEM), Encryption, Network Analysis
Skills you'll gain: Application Security, Security Testing, Software Testing, Cyber Security Assessment, Cryptography, Penetration Testing, Encryption, Authentications, Identity and Access Management, Business Logic, Test Case, Vulnerability Assessments, Web Servers, Data Validation, Network Protocols
Skills you'll gain: Network Monitoring, Data Centers, Network Security, Wide Area Networks, Virtualization and Virtual Machines, Network Troubleshooting, Network Administration, Network Architecture, System Monitoring, Wireless Networks, Virtualization, Virtual Private Networks (VPN), Network Infrastructure, Computer Networking, Firewall, TCP/IP, Routing Protocols, Cloud Computing, Internet Of Things, Cybersecurity
Skills you'll gain: Microsoft Intune (Mobile Device Management Software), Endpoint Security, Microsoft Windows, Patch Management, Mobile Security, System Configuration, System Monitoring, Endpoint Detection and Response, Vulnerability Management, Azure Active Directory, Cloud Management, Cyber Security Policies, Security Controls, Active Directory, Security Strategy, Enterprise Security, Remote Access Systems, Continuous Monitoring, Network Monitoring, Mobile Development Tools
In summary, here are 10 of our most popular cybersecurity threat detection courses
- Advancing FAIRâ„¢ within Risk Management Programs:Â FAIR Institute
- Data Science Decisions in Time:Â Johns Hopkins University
- Enhanced Network Security Approach on Google Cloud:Â Google Cloud
- Data Mining for Smart Cities:Â IIT Roorkee
- Practical Applications of FAIRâ„¢ for Cyber Risk Management:Â FAIR Institute
- Data Science Decisions in Time: Information Theory & Games:Â Johns Hopkins University
- LPIC-1 Linux Administrator (101-500):Â Packt
- TecnologÃa como facilitador en soluciones de Telemedicina: Tecnológico de Monterrey
- Securing Systems and Networks:Â Packt
- Software Security Testing:Â Packt