Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cybersecurity threat detection"
DeepLearning.AI
Skills you'll gain: Generative AI, Tensorflow, Computer Vision, Image Analysis, Deep Learning, Keras (Neural Network Library), Artificial Neural Networks, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning Methods, Distributed Computing, Unsupervised Learning, Network Model, Scalability, Visualization (Computer Graphics), Network Architecture, Performance Tuning, Machine Learning
New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Information Systems Security, Network Security, Computer Security, Malware Protection, Data Integrity
Johns Hopkins University
Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Email Security, Threat Detection, Jupyter, Authentications, Machine Learning Algorithms, Artificial Intelligence, Multi-Factor Authentication, Threat Management, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning
Skills you'll gain: Exploratory Data Analysis, Feature Engineering, Unsupervised Learning, Supervised Learning, Dimensionality Reduction, Applied Machine Learning, Statistical Methods, Regression Analysis, Statistical Inference, Machine Learning, Data Access, Anomaly Detection, Machine Learning Algorithms, Classification And Regression Tree (CART), Scikit Learn (Machine Learning Library), Statistical Analysis, Data Analysis, Data Cleansing, Data Manipulation, Predictive Modeling
Coursera Project Network
Skills you'll gain: Network Protocols, TCP/IP, General Networking, Network Security, Network Analysis, Web Servers, Linux, Software Installation
University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Risk Management Framework, Infrastructure Security, Cyber Attacks, Cyber Risk, Cyber Threat Intelligence, Cyber Security Policies, Public Safety and National Security, Cyber Security Assessment, Cyber Governance, Continuous Monitoring, Security Management, Incident Response, Security Strategy, Technology Roadmaps, Network Infrastructure, Technology Solutions, Transportation Operations, Infrastructure Architecture
Coursera Project Network
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Vulnerability Management, Cybersecurity, Information Systems Security, Data Ethics, Command-Line Interface, Technical Documentation
University of California San Diego
Skills you'll gain: Graph Theory, Logical Reasoning, Cryptographic Protocols, Combinatorics, Computational Logic, Deductive Reasoning, Cryptography, Probability, Key Management, Computational Thinking, Encryption, Mathematical Theory & Analysis, Network Analysis, Public Key Cryptography Standards (PKCS), Algorithms, Theoretical Computer Science, Python Programming, Data Structures, Cybersecurity, Mathematical Modeling
University of Colorado System
Skills you'll gain: Windows Servers, Computer Security, Linux Administration, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, OSI Models, User Accounts, Group Policy, Security Management, System Monitoring, System Implementation, Systems Administration, Virtualization, Network Security, Linux Commands
University of Illinois Urbana-Champaign
Skills you'll gain: Data Visualization, Data Visualization Software, Text Mining, Data Presentation, Data Mining, Interactive Data Visualization, Data Storytelling, Dashboard, Visualization (Computer Graphics), Tableau Software, Plot (Graphics), Natural Language Processing, Unsupervised Learning, Unstructured Data, Statistical Analysis, Graphing, Big Data, Anomaly Detection, Analytics, Machine Learning Algorithms
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Threat Detection, Network Analysis, Cybersecurity, System Design and Implementation, Network Security, Machine Learning Software, Machine Learning Methods, Performance Testing, Machine Learning Algorithms, Machine Learning, Artificial Intelligence, Supervised Learning, Microsoft Windows
University at Buffalo
Skills you'll gain: Model Based Systems Engineering, Systems Engineering, Product Lifecycle Management, Intrusion Detection and Prevention, Security Controls, Performance Measurement, Anomaly Detection, Machine Controls, Incident Response, Digital Transformation, Vulnerability Assessments, Software Development Life Cycle, Product Engineering, Cybersecurity, Supply Chain Management, Manufacturing Processes, Supply Chain Planning, Data Sharing, Manufacturing Operations, Constructive Feedback
In summary, here are 10 of our most popular cybersecurity threat detection courses
- TensorFlow: Advanced Techniques:Â DeepLearning.AI
- Introduction to Cyber Attacks:Â New York University
- Introduction to AI for Cybersecurity:Â Johns Hopkins University
- IBM Introduction to Machine Learning:Â IBM
- Wireshark for Beginners: Capture Packets:Â Coursera Project Network
- Homeland Security and Cybersecurity:Â University of Colorado System
- Metasploit for Beginners: Ethical Penetration Testing:Â Coursera Project Network
- Introduction to Discrete Mathematics for Computer Science:Â University of California San Diego
- Computer Security and Systems Management:Â University of Colorado System
- Data Mining:Â University of Illinois Urbana-Champaign