Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cybersecurity threat detection"
Skills you'll gain: Cloud Computing Architecture, Cloud Services, Cloud Security, Cloud Infrastructure, Cloud Platforms, Cloud Computing, Cloud Storage, Infrastructure As A Service (IaaS), Emerging Technologies, Hybrid Cloud Computing, IBM Cloud, Serverless Computing, Virtualization, Microservices, Containerization
Skills you'll gain: Identity and Access Management, Endpoint Security, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Data Security, Cyber Security Strategy, Secure Coding, Firewall, Application Security, Authentications, Security Controls, Authorization (Computing), Security Information and Event Management (SIEM), Data Governance, Incident Response
Infosec
Skills you'll gain: Penetration Testing, Cyber Security Policies, Linux Commands, Cyber Security Assessment, Command-Line Interface, Cybersecurity, Cloud Computing, Linux, Risk Management Framework, Network Monitoring, Security Management, Operating Systems, Cyber Risk, Cloud Services, Cloud Platforms, General Networking, Windows PowerShell, Cyber Governance, Unix Commands, Cyber Security Strategy
- Status: Free
Erasmus University Rotterdam
Skills you'll gain: Email Security, Human Factors (Security), Cyber Security Policies, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Risk, Computer Security Awareness Training, Threat Management, Malware Protection, Healthcare Industry Knowledge, Encryption, Data Security, Information Privacy, General Data Protection Regulation (GDPR), Digital Communications
Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Cyber Risk, Cyber Governance, NIST 800-53, Regulatory Compliance, Auditing, Cybersecurity, Cyber Security Policies, Compliance Management, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Security Controls, Artificial Intelligence, Open Web Application Security Project (OWASP), Risk Management, Payment Card Industry (PCI) Data Security Standards, General Data Protection Regulation (GDPR), Business Ethics
- Status: Free
Infosec
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Detection, Threat Management, Threat Modeling, MITRE ATT&CK Framework, Endpoint Detection and Response, Cybersecurity, Malware Protection, Security Information and Event Management (SIEM), Anomaly Detection, Generative AI, Network Analysis
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
- Status: AI skills
Microsoft
Skills you'll gain: Microsoft 365, Network Security, Business Software, Computer Hardware, Cybersecurity, Desktop Support, Virtual Private Networks (VPN), Network Troubleshooting, Technical Support, Hardware Troubleshooting, Hardware Architecture, Generative AI, Operating Systems, Network Protocols, TCP/IP, Application Security, Microsoft Teams, Productivity Software, Information Systems Security, Multi-Factor Authentication
Kennesaw State University
Skills you'll gain: Network Security, Incident Response, Vulnerability Management, Cybersecurity, Contingency Planning, Cyber Governance, Cyber Attacks, Disaster Recovery, Computer Security Incident Management, Cyber Security Policies, Security Management, Firewall, Network Monitoring, Cyber Security Strategy, Crisis Management, Vulnerability Assessments, Cyber Security Assessment, Cyber Risk, Network Protocols, Risk Management
- Status: NewStatus: Free
Coursera Instructor Network
Skills you'll gain: Generative AI, Regulatory Requirements, Compliance Management, Governance, Governance Risk Management and Compliance, Risk Management, Data Ethics, Financial Regulation, Anomaly Detection, Artificial Intelligence, Artificial Intelligence and Machine Learning (AI/ML), Forecasting, Predictive Analytics
University at Buffalo
Skills you'll gain: Model Based Systems Engineering, Systems Engineering, Product Lifecycle Management, Intrusion Detection and Prevention, Security Controls, Performance Measurement, Anomaly Detection, Machine Controls, Incident Response, Digital Transformation, Vulnerability Assessments, Software Development Life Cycle, Product Engineering, Cybersecurity, Supply Chain Management, Manufacturing Processes, Supply Chain Planning, Data Sharing, Manufacturing Operations, Constructive Feedback
Edureka
Skills you'll gain: Cybersecurity, Secure Coding, Cyber Security Strategy, Threat Detection, Network Security, Application Security, IT Security Architecture, Generative AI, Endpoint Security, Incident Response, Artificial Intelligence, Automation
In summary, here are 10 of our most popular cybersecurity threat detection courses
- Introduction to Cloud Computing:Â IBM
- Cybersecurity Architecture:Â IBM
- Cybersecurity Foundations:Â Infosec
- Cybersecurity in Healthcare (Hospitals & Care Centres):Â Erasmus University Rotterdam
- Cybersecurity Compliance Framework, Standards & Regulations:Â IBM
- Cyber Threat Hunting:Â Infosec
- Cybersecurity Threat Vectors and Mitigation:Â Microsoft
- Microsoft IT Support Specialist:Â Microsoft
- Managing Cybersecurity:Â Kennesaw State University
- GenAI for Fraud Detection and Compliance:Â Coursera Instructor Network