Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cybersecurity threat detection"
Coursera Project Network
Skills you'll gain: Anomaly Detection, Jupyter, Exploratory Data Analysis, Application Deployment, Unsupervised Learning, Data Visualization, Applied Machine Learning, Machine Learning, Machine Learning Software, Machine Learning Algorithms
Palo Alto Networks
Skills you'll gain: Network Security, General Networking, TCP/IP, Cryptography, Endpoint Security, Firewall, Cybersecurity, Encryption, Network Infrastructure, Computer Networking, Public Key Infrastructure, Zero Trust Network Access, Network Protocols
University of California San Diego
Skills you'll gain: Internet Of Things, Wireless Networks, Emerging Technologies, Mobile Development, Digital Communications, General Networking, Network Architecture, Computer Networking, Network Protocols, Global Positioning Systems, Cybersecurity
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, DevOps, Data Security, Software Development Life Cycle, Encryption
Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Role-Based Access Control (RBAC), Containerization
- Status: New
Board Infinity
Skills you'll gain: Incident Response, Risk Management Framework, Cyber Risk, Computer Security Incident Management, Risk Management, Security Management, Enterprise Risk Management (ERM), Incident Management, Operational Risk, Business Risk Management, Cyber Threat Intelligence, Risk Control, Threat Management, Governance Risk Management and Compliance, Performance Measurement, Continuous Monitoring, Cybersecurity, Cyber Security Strategy, Risk Analysis, Security Strategy
Johns Hopkins University
Skills you'll gain: Artificial Intelligence, Image Analysis, Computer Vision, Radiology, Data Processing, Bayesian Network, Artificial Neural Networks, Applied Machine Learning, Machine Learning Methods, Epidemiology, Deep Learning, Health Care, Medical Science and Research
University of Maryland, College Park
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Cyber Governance, Cyber Risk, Security Strategy, Cyber Security Policies, Security Management, Security Awareness, Threat Modeling, Information Privacy, Infrastructure Security, Risk Management, Dependency Analysis
- Status: Free
Johns Hopkins University
Skills you'll gain: Epidemiology, Business Metrics, Infectious Diseases, Interactive Data Visualization, Analysis, Threat Detection, Data Presentation, Decision Support Systems
Imperial College London
Skills you'll gain: Sanitation, Infection Control, Infectious Diseases, Environment Health And Safety, Epidemiology, Preventative Care, Emergency Response, Water Resources, Health And Safety Standards, Health Care, Public Safety and National Security, Pollution Prevention, Medical Science and Research, Environmental Issue, Environmental Monitoring, Ethical Standards And Conduct
Akamai Technologies, Inc.
Skills you'll gain: Routing Protocols, OSI Models, TCP/IP, General Networking, Network Protocols, Network Troubleshooting, Computer Networking, Networking Hardware, Network Security, Network Infrastructure, Network Model, Virtual Private Networks (VPN), Wireless Networks, Network Routers, Dynamic Host Configuration Protocol (DHCP), Intrusion Detection and Prevention, Network Analysis, Security Controls
LearnQuest
Skills you'll gain: Network Monitoring, Network Administration, Network Security, Routing Protocols, Network Troubleshooting, OSI Models, TCP/IP, Computer Networking, Network Routers, Network Switches, General Networking, Command-Line Interface, Networking Hardware, Network Architecture, Local Area Networks, Network Infrastructure, Cybersecurity, Network Protocols
In summary, here are 10 of our most popular cybersecurity threat detection courses
- Machine Learning - Anomaly Detection via PyCaret:Â Coursera Project Network
- Palo Alto Networks Network Security Fundamentals:Â Palo Alto Networks
- Internet of Things: How did we get here?:Â University of California San Diego
- Application Security for Developers and DevOps Professionals:Â IBM
- Cloud Security Risks: Identify and Protect Against Threats:Â Google Cloud
- Advanced Cybersecurity Risk Management:Â Board Infinity
- Artificial Intelligence for Breast Cancer Detection:Â Johns Hopkins University
- A Strategic Approach to Cybersecurity:Â University of Maryland, College Park
- Measuring and Maximizing Impact of COVID-19 Contact Tracing:Â Johns Hopkins University
- Foundations of Public Health Practice: Health Protection:Â Imperial College London