Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cybersecurity threat detection"
ISC2
Skills you'll gain: Cloud Computing Architecture, Cloud Computing, Cloud Standards, Cloud Infrastructure, Cloud Solutions, Cloud Platforms, Cloud Services, Resource Allocation, Cloud Security, Infrastructure As A Service (IaaS), Virtualization, Hybrid Cloud Computing, Containerization, Software As A Service, Platform As A Service (PaaS), Brokerage, Scalability
Skills you'll gain: Network Security, Hardening, Endpoint Security, Virtual Private Networks (VPN), Firewall, Network Administration, Cloud Security, Infrastructure Security, Cybersecurity, Role-Based Access Control (RBAC), Identity and Access Management, Security Controls, Enterprise Security, System Configuration, Email Security, Wide Area Networks
Skills you'll gain: Threat Detection, Software-Defined Networking, Network Architecture, Network Planning And Design, Network Security, Cybersecurity, Cloud Computing Architecture, Network Infrastructure, Internet Of Things, Multi-Cloud, Cloud Security, Wide Area Networks, Technical Consulting
Skills you'll gain: Cybersecurity, Network Security, Cloud Security, Application Security, Information Systems Security, Data Security, Cryptography, Endpoint Security, OSI Models, Encryption, Wireless Networks, Malware Protection, Public Key Infrastructure, Mobile Security, Computer Networking, Virtualization
Skills you'll gain: Unstructured Data, Data Processing, Text Mining, Generative AI, Semantic Web, Data Transformation, Development Environment, Application Frameworks, Data Cleansing, Information Architecture, Document Management, Application Programming Interface (API), Image Analysis, Metadata Management, Hypertext Markup Language (HTML)
Skills you'll gain: Penetration Testing, Network Security, Intrusion Detection and Prevention, Wireless Networks, Cybersecurity, Vulnerability Assessments, Computer Networking, Linux, Encryption, Network Analysis, Command-Line Interface, Virtual Machines
Skills you'll gain: Authentications, Security Management, Risk Management Framework, Cyber Risk, Identity and Access Management, Security Awareness, Computer Security Awareness Training, Information Systems Security, Security Controls, Cybersecurity, Authorization (Computing), Single Sign-On (SSO), Information Technology, Data Ethics, Multi-Factor Authentication
Skills you'll gain: Network Performance Management, Software-Defined Networking, Network Administration, Network Routing, Wide Area Networks, Network Monitoring, Disaster Recovery, Performance Tuning, General Networking, Virtual Local Area Network (VLAN), Network Troubleshooting, Network Security, Cyber Security Assessment, Vulnerability Scanning, Continuous Monitoring, Patch Management, Application Performance Management, Network Analysis
Skills you'll gain: Linux Administration, Linux, Linux Servers, Authentications, Virtual Machines, Virtualization, Security Controls, User Accounts, Red Hat Enterprise Linux, System Configuration, Identity and Access Management, Virtual Environment, Cybersecurity
Skills you'll gain: PostgreSQL, Data Maintenance, Database Administration, Database Architecture and Administration, SQL, Database Systems, Disaster Recovery, Secure Coding, Database Management, Relational Databases, Query Languages, Security Controls, Data Access, Data Security, Role-Based Access Control (RBAC), Threat Management, Threat Detection
- Status: Free
University of Colorado Boulder
Skills you'll gain: Internet Of Things, Network Protocols, Computer Networking, Wireless Networks, Security Engineering, Cybersecurity, Emerging Technologies, Software-Defined Networking, Cloud Platforms, Encryption, Real Time Data, Embedded Systems
Institut Mines-Télécom
Skills you'll gain: Safety and Security, Emerging Technologies, Data Security, Digital Communications, Digital Transformation, Cybersecurity, Media and Communications, Communication, Personally Identifiable Information, Technology Strategies, Innovation, Digital Content, Law, Regulation, and Compliance, Competitive Intelligence, Information Privacy
In summary, here are 10 of our most popular cybersecurity threat detection courses
- Cloud Basics: ISC2
- Advanced Network Security and Endpoint Strategies: Packt
- Designing Software-Defined Branch Infrastructures: LearnQuest
- Cryptography, Network Security, and Application Security: Packt
- Preprocessing Unstructured Data for LLMs and RAG Systems: Packt
- Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux: Packt
- SSCP Fundamentals and Access Controls: Packt
- Managing and Optimizing SD-Branch Networks: LearnQuest
- Linux PAM Security Administration: Packt
- SQL for Security Specialist: Codio