Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cybersecurity threat detection"
Skills you'll gain: Incident Response, Computer Security Incident Management, Business Continuity, Security Management, Disaster Recovery, Risk Management Framework, Threat Management, Risk Management, Security Controls, Information Systems Security, Cybersecurity, Virtualization and Virtual Machines, Information Systems, Vulnerability Assessments, Cloud Computing
Infosec
Skills you'll gain: Security Controls, Security Requirements Analysis, Cyber Security Policies, Information Assurance, Information Systems Security, Personally Identifiable Information, Computer Security Awareness Training, Configuration Management, Document Management, Change Control
L&T EduTech
Skills you'll gain: Big Data, Data Mining, Data Processing, Artificial Intelligence and Machine Learning (AI/ML), Anomaly Detection, Image Analysis, Process Analysis, Production Process, Machine Learning, Python Programming, Natural Resource Management
- Status: Free
University of Geneva
Skills you'll gain: Scientific Methods, Experimentation, Research, Quantitative Research, Physics, Mathematical Modeling, Simulation and Simulation Software
University of London
Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Vulnerability Assessments, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, Authentications, TCP/IP, Network Analysis
Northeastern University
Skills you'll gain: Health Care Administration, Digital Transformation, Health Systems, Healthcare Industry Knowledge, Health Information Management and Medical Records, IT Management, Personally Identifiable Information, Electronic Medical Record, Medical Records, Information Systems, Emerging Technologies, Information Privacy, Technology Strategies, Cybersecurity, Data Security, Regulatory Compliance, Platform As A Service (PaaS), Interoperability, Innovation
- Status: New
Skills you'll gain: Penetration Testing, Incident Response, Network Security, Intrusion Detection and Prevention, Cybersecurity, Computer Security Incident Management, Cyber Security Strategy, Application Security, Open Web Application Security Project (OWASP), Cyber Attacks, Information Systems Security, Identity and Access Management, Vulnerability Assessments, Cryptography, Secure Coding, Encryption, Risk Management Framework, Command-Line Interface, Hardening, Threat Management
- Status: New
Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Cybersecurity, Threat Modeling, Malware Protection, Penetration Testing, Threat Detection, Cyber Attacks, Network Security, Intrusion Detection and Prevention, Information Systems Security, Security Awareness, Lightweight Directory Access Protocols, Network Protocols
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Malware Protection, Network Security, Threat Detection, Firewall, Code Review, Routing Protocols, Proxy Servers, Linux, Internet Of Things, Servers
University of Colorado Boulder
Skills you'll gain: Data Ethics, Security Awareness, Ethical Standards And Conduct, Computer Security Awareness Training, Cybersecurity, Diversity Awareness, Generative AI, Artificial Intelligence, Information Technology, Information Privacy, Machine Learning, Media and Communications, Vulnerability, Threat Detection, Cultural Diversity, Personally Identifiable Information, Law, Regulation, and Compliance, Artificial Intelligence and Machine Learning (AI/ML), Emerging Technologies, Health Care
University of Michigan
Skills you'll gain: Data Quality, Data Cleansing, Data Collection, Data Validation, Data Analysis, Exploratory Data Analysis, Data Processing, Threat Detection, Data Access, Sampling (Statistics)
University of Colorado Boulder
Skills you'll gain: Data Mining, Unsupervised Learning, Data Warehousing, Data Pipelines, Data Science, Data Modeling, Data Integration, Applied Machine Learning, Big Data, Supervised Learning, Machine Learning Methods, Data Cleansing, Classification And Regression Tree (CART), Anomaly Detection, Unstructured Data, Data Transformation, Machine Learning Algorithms, Data Analysis, Data Presentation, Analytical Skills
In summary, here are 10 of our most popular cybersecurity threat detection courses
- Incident Response and Risk Management: Packt
- NIST 800-171: Infosec
- AI & ML Applications in Oil and Gas Industry: L&T EduTech
- The Diversity of Exoplanets: University of Geneva
- Introduction to Computer Security: University of London
- Healthcare Data Management and Information Systems: Northeastern University
- CompTIA Security+ Certification (SY0-701): The Total Course: Packt
- System Hacking, Malware Threats, and Network Attacks: Packt
- DDoS Attacks and Defenses: University of Colorado System
- Computing, Ethics, and Society: University of Colorado Boulder