Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cybersecurity threat detection"
University of Colorado System
Skills you'll gain: Application Security, Vulnerability Assessments, Software Design, Threat Modeling, Vulnerability Management, Secure Coding, Software Design Patterns, Software Architecture, Software Visualization, Cryptography, Cybersecurity, Blockchain
- Status: New
Skills you'll gain: Identity and Access Management, Cryptography, Encryption, Risk Management Framework, Information Systems Security, Threat Management, Cybersecurity, Authentications, Data Security, Personally Identifiable Information, Security Controls, User Accounts, Information Privacy, Infrastructure Security, Multi-Factor Authentication, Authorization (Computing)
Skills you'll gain: Incident Response, Disaster Recovery, Computer Security Incident Management, Business Continuity, Cybersecurity, Cyber Security Policies, Investigation, Event Monitoring, Threat Detection, Contingency Planning, Communication Planning
University of Illinois Urbana-Champaign
Skills you'll gain: Internal Controls, Data Visualization, Robotic Process Automation, Auditing, Internal Auditing, Alteryx, Financial Auditing, Accounting, Business Process Automation, Analytics, Data Analysis, Text Mining, R Programming, Natural Language Processing, Blockchain, Cybersecurity
- Status: New
Skills you'll gain: Digital Transformation, Generative AI, ChatGPT, Software Development Tools, Business Transformation, Computer Programming Tools, Software Development, Program Development, Automation, User Interface (UI), Artificial Intelligence
- Status: NewStatus: Free
Coursera Instructor Network
Skills you'll gain: Anomaly Detection, Data Visualization, Generative AI, Risk Management, Data-Driven Decision-Making, ChatGPT, Data Synthesis, Compliance Management, Regulatory Compliance, Threat Detection, Data Pipelines, Automation, Predictive Analytics, Artificial Intelligence
ISC2
Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Data Security, Cybersecurity, Authentications, Network Security, Data Integrity, Algorithms
Skills you'll gain: Field-Programmable Gate Array (FPGA), Application Specific Integrated Circuits, Computational Logic, Computer Architecture, Hardware Design, Electronic Hardware, Hardware Architecture, Microarchitecture, Electronic Systems, Computer Hardware, Semiconductors, Computer Engineering, Electronic Components, Functional Design, Verification And Validation, Data Storage, Data Storage Technologies
Skills you'll gain: Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Threat Management, Security Controls, Google Cloud Platform, Vulnerability Management, Threat Detection, Infrastructure Security, Continuous Monitoring, Cloud Management, IT Automation, Identity and Access Management
L&T EduTech
Skills you'll gain: Design Reviews, Autodesk Revit, Building Information Modeling, Visualization (Computer Graphics), Augmented and Virtual Reality (AR/VR), Virtual Reality, Engineering Analysis, Architectural Engineering, Autodesk, Structural Engineering, Construction Management, Augmented Reality, Technical Standard
Johns Hopkins University
Skills you'll gain: Generative AI, Feature Engineering, Cybersecurity, Threat Modeling, Security Engineering, Deep Learning, Anomaly Detection, Artificial Intelligence, Artificial Neural Networks, Data Processing, Applied Machine Learning, Reinforcement Learning, Data Modeling, Machine Learning, Performance Tuning
MathWorks
Skills you'll gain: Computer Vision, Image Analysis, Matlab, Applied Machine Learning, Machine Learning, Supervised Learning, Visualization (Computer Graphics), Data Cleansing, Performance Tuning
In summary, here are 10 of our most popular cybersecurity threat detection courses
- Software Design Threats and Mitigations:Â University of Colorado System
- Security Fundamentals and Identity Management:Â Packt
- Incident Response and Recovery:Â ISC2
- Applying Data Analytics in Accounting:Â University of Illinois Urbana-Champaign
- Generative AI in Software Development:Â Amazon
- GenAI for Fraud Analysts: Improving Detection Efficiency:Â Coursera Instructor Network
- Cryptography :Â ISC2
- Fundamentals of Digital Design for VLSI Chip Design:Â L&T EduTech
- Mitigating Security Vulnerabilities on Google Cloud:Â Google Cloud
- BIM Coordination:Â L&T EduTech