Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cybersecurity threat detection"
Kennesaw State University
Skills you'll gain: Cybersecurity, Cyber Security Policies, Computer Security Awareness Training, Cyber Attacks, Threat Management, Cyber Risk, Personally Identifiable Information, Threat Detection, Information Privacy, Authentications, General Data Protection Regulation (GDPR), Identity and Access Management
Technical University of Munich (TUM)
Skills you'll gain: Global Positioning Systems, Digital Transformation, Environmental Monitoring, Aerospace Basic Quality System Standards, Manufacturing and Production, Geospatial Information and Technology, Image Analysis, Big Data, Industrial Engineering, Production Process, Cybersecurity, Spatial Data Analysis, Artificial Intelligence, Automation, Cloud Services, Technology Strategies, Data Storage
University of Colorado Boulder
Skills you'll gain: Internet Of Things, API Design, Amazon Web Services, Application Programming Interface (API), Network Protocols, Microservices, Cloud Applications, Cloud Platforms, Embedded Systems, Serverless Computing, Cybersecurity, Cloud Computing, Software Development, Wireless Networks
Palo Alto Networks
Skills you'll gain: Cyber Operations, Endpoint Detection and Response, Endpoint Security, Security Information and Event Management (SIEM), Zero Trust Network Access, Cybersecurity, Cyber Threat Intelligence, Threat Modeling, Continuous Monitoring, Security Controls, IT Security Architecture, Threat Detection, Incident Response, Malware Protection, Automation, Authentications, Data Lakes
- Status: New
Skills you'll gain: Threat Management, Vulnerability Assessments, Incident Response, Computer Security Incident Management, IT Security Architecture, Disaster Recovery, Vulnerability Management, Hardening, Public Key Infrastructure, Threat Detection, Cyber Security Assessment, Risk Management, Compliance Management, Governance Risk Management and Compliance, Network Security, Security Engineering, Infrastructure Security, Regulatory Requirements, Application Security, Software-Defined Networking
University of Colorado System
Skills you'll gain: Cryptography, Arithmetic, Algorithms, Applied Mathematics, Probability
Cisco Learning and Certifications
Skills you'll gain: File Systems, Endpoint Security, Linux, Microsoft Windows, Windows PowerShell, Linux Administration, Windows Servers, Operating Systems, Linux Commands, Network Administration, Active Directory, System Monitoring, System Configuration, OS Process Management, Network Security, Security Controls, Command-Line Interface, Systems Administration
University of California, Irvine
Skills you'll gain: Data Ethics, Predictive Modeling, Unsupervised Learning, Natural Language Processing, Analysis, Predictive Analytics, Data Analysis, Classification And Regression Tree (CART), Regression Analysis, Data Mining, Statistical Analysis, Data Science, Social Media, Text Mining, Anomaly Detection, Business Analytics, Decision Tree Learning, Statistical Modeling, Big Data, Cloud Computing
Imperial College London
Skills you'll gain: Infectious Diseases, Epidemiology, Respiration, Internal Medicine, Life Sciences, Medical Science and Research
- Status: New
Skills you'll gain: Generative AI, Anomaly Detection, Predictive Modeling, Text Mining, Predictive Analytics, Advanced Analytics, Data Cleansing, Natural Language Processing, Unstructured Data, Data Analysis, Data Quality, Time Series Analysis and Forecasting, Artificial Intelligence, Big Data, Software Documentation
Skills you'll gain: NoSQL, Databases, Relational Databases, Database Architecture and Administration, Database Management, Data Storage Technologies, Data Management, Scalability
Microsoft
Skills you'll gain: Generative AI, Data Ethics, Feature Engineering, Performance Tuning, Deep Learning, Artificial Intelligence, Application Deployment, Text Mining, Applied Machine Learning, Unstructured Data, Anomaly Detection, Data Synthesis, Data Security, Information Privacy
In summary, here are 10 of our most popular cybersecurity threat detection courses
- What Is Cybersecurity?:Â Kennesaw State University
- Digitalisation in Space Research:Â Technical University of Munich (TUM)
- M2M & IoT Interface Design & Protocols for Embedded Systems:Â University of Colorado Boulder
- Palo Alto Networks Security Operations Fundamentals:Â Palo Alto Networks
- CompTIA CASP+ (CAS-004):Â Packt
- Mathematical Foundations for Cryptography:Â University of Colorado System
- Endpoints and Systems:Â Cisco Learning and Certifications
- Data Science Fundamentals:Â University of California, Irvine
- Immunology: Immune System and Infectious Diseases:Â Imperial College London
- Advanced Data Analysis with Generative AI:Â Microsoft