Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cybersecurity threat detection"
Skills you'll gain: Cyber Threat Intelligence, Security Information and Event Management (SIEM), Generative AI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Natural Language Processing, Anomaly Detection, Vulnerability Management, Incident Management, Artificial Intelligence
Infosec
Skills you'll gain: Penetration Testing, Cyber Security Policies, Linux Commands, Cyber Security Assessment, Command-Line Interface, Cybersecurity, Cloud Computing, Linux, Risk Management Framework, Network Monitoring, Security Management, Operating Systems, Cyber Risk, Cloud Services, Cloud Platforms, General Networking, Windows PowerShell, Cyber Governance, Unix Commands, Cyber Security Strategy
- Status: [object Object]
Skills you'll gain: Generative AI, New Product Development, Product Management, Product Lifecycle Management, Product Development, Innovation, Product Roadmaps, ChatGPT, Product Planning, Commercialization, Product Strategy, Artificial Intelligence, Project Management Life Cycle, Data Ethics, OpenAI, Product Marketing, Stakeholder Management, Competitive Analysis, Artificial Intelligence and Machine Learning (AI/ML), Product Testing
Kennesaw State University
Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Cryptography, Cyber Security Assessment, Cyber Risk, Secure Coding, Systems Development Life Cycle, Security Controls, Cyber Security Policies, Infrastructure Security, Security Awareness, Identity and Access Management
Google Cloud
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Infrastructure As A Service (IaaS), Cloud Applications, Cloud Security, Kubernetes, Cloud Computing, OAuth, Security Controls, Cloud Storage, Network Infrastructure, Containerization, Threat Management, Application Security, Virtual Private Networks (VPN), Data Security, Authorization (Computing)
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Computer Security Incident Management, Cyber Threat Intelligence, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Continuous Monitoring, System Monitoring, Network Analysis, Virtual Machines, Network Security, Information Systems Security, Network Monitoring, NIST 800-53, Applied Machine Learning, Machine Learning Algorithms
Coursera Project Network
Skills you'll gain: Bash (Scripting Language), Shell Script, Unix Shell, Scripting, Linux Commands, Unix Commands, Scripting Languages, Command-Line Interface, Linux, File Management, Unix, File Systems
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Computer Security Incident Management, Cyber Security Policies, Cyber Security Strategy, Cyber Governance, Human Factors (Security), Business Risk Management, Cybersecurity, Threat Management, Security Awareness, Law, Regulation, and Compliance, Information Management, Mobile Security, Business Ethics, Performance Measurement, Network Security
- Status: Free
Coursera Project Network
Skills you'll gain: Linux Commands, Linux, TCP/IP, Scripting, Shell Script, Network Monitoring, Network Analysis, Network Security, Network Protocols
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Cybersecurity, Cyber Operations, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Security Information and Event Management (SIEM), Threat Detection, Cloud Security, Threat Management, System Monitoring, Automation
DeepLearning.AI
Skills you'll gain: Generative AI, Tensorflow, Computer Vision, Image Analysis, Deep Learning, Keras (Neural Network Library), Artificial Neural Networks, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning Methods, Distributed Computing, Unsupervised Learning, Network Model, Scalability, Visualization (Computer Graphics), Network Architecture, Performance Tuning, Machine Learning
Skills you'll gain: Continuous Monitoring, Incident Response, NIST 800-53, Risk Management Framework, Computer Security Incident Management, Business Continuity, Security Management, Disaster Recovery, Security Controls, Authorization (Computing), Risk Management, System Monitoring, Security Testing, Threat Management, Security Strategy, Cyber Security Policies, Cybersecurity, Cyber Risk, Configuration Management, Information Systems Security
In summary, here are 10 of our most popular cybersecurity threat detection courses
- Generative AI: Boost Your Cybersecurity Career :Â IBM
- Cybersecurity Foundations:Â Infosec
- IBM AI Product Manager:Â IBM
- Cybersecurity and Its Ten Domains:Â Kennesaw State University
- Security in Google Cloud:Â Google Cloud
- Intrusion Detection:Â Johns Hopkins University
- Introduction to Bash Shell Scripting:Â Coursera Project Network
- Cybersecurity: Developing a Program for Your Business:Â Kennesaw State University
- Analyze Network Traffic with TCPDump: Build a Logging Tool:Â Coursera Project Network
- Detect, Respond, and Recover from Cloud Cybersecurity Attacks:Â Google Cloud