Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cybersecurity threat detection"
Skills you'll gain: Computer Vision, Image Analysis, Artificial Neural Networks, IBM Cloud, Keras (Neural Network Library), Cloud Applications, Deep Learning, Tensorflow, PyTorch (Machine Learning Library), Artificial Intelligence and Machine Learning (AI/ML), Computer Programming, Cloud Computing, Augmented Reality, Application Development, Computer Science, Machine Learning, Data Processing
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Endpoint Detection and Response, Threat Management, Cyber Operations, Cybersecurity, Disaster Recovery, Cyber Threat Hunting, Security Management, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Event Monitoring, Network Security, Network Monitoring, Data Security, Business Continuity
DeepLearning.AI
Skills you'll gain: Computer Vision, Tensorflow, Image Analysis, Keras (Neural Network Library), Deep Learning, Artificial Neural Networks, Visualization (Computer Graphics), Machine Learning
- Status: New
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Computer Security Incident Management, Cyber Threat Intelligence, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Threat Management, Threat Modeling, System Monitoring, Network Analysis, Virtual Machines, Network Security, Information Systems Security, Network Monitoring, NIST 800-53, Applied Machine Learning, Machine Learning Algorithms
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Threat Management, Cybersecurity, Cyber Security Strategy, Cyber Security Assessment, Application Security, Threat Detection, Security Strategy, Microsoft Azure, Cloud Security, Internet Of Things, Secure Coding, Network Security, Security Controls, Data Security, Vulnerability Assessments, Identity and Access Management
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Human Factors (Security), Threat Management, Security Awareness, Cybersecurity, Cyber Risk, Cyber Attacks, Security Strategy, Compliance Training, Employee Training
University of Pennsylvania
Skills you'll gain: Financial Data, Financial Analysis, Financial Statement Analysis, Financial Forecasting, Business Analytics, Predictive Analytics, Analytics, Accounting, Business Metrics, Performance Analysis, Operational Analysis, Anomaly Detection, Return On Investment, Key Performance Indicators (KPIs)
- Status: Free
Technical University of Denmark (DTU)
Skills you'll gain: Bioinformatics, Infectious Diseases, Medical Science and Research, Epidemiology, Network Analysis, Life Sciences, Database Development, Taxonomy, Scientific Methods, Statistical Analysis, Data Processing, Data Quality, Data Storage
MathWorks
Skills you'll gain: Computer Vision, Image Analysis, Anomaly Detection, Deep Learning, Applied Machine Learning, Artificial Neural Networks, Matlab, Application Deployment, PyTorch (Machine Learning Library), Machine Learning, Supervised Learning, Data Visualization, Automation, Artificial Intelligence and Machine Learning (AI/ML), Data Cleansing, Spatial Data Analysis, Machine Learning Methods, Visualization (Computer Graphics), Data Synthesis, Geospatial Information and Technology
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
University of Minnesota
Skills you'll gain: Enterprise Resource Planning, Business Systems Analysis, Systems Analysis, Requirements Analysis, Cybersecurity, Business Requirements, Business Systems, Cyber Threat Intelligence, Cloud Computing, Cloud Services, IT Management, Change Management, Business Technologies, Organizational Change, Technology Strategies, System Implementation, User Requirements Documents, Information Technology, Portfolio Management, Governance
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Penetration Testing, Application Security, Data Security, Vulnerability Assessments, Cybersecurity, Security Testing, Software Design, Authorization (Computing), Verification And Validation, Linux, Programming Principles, Debugging, C++ (Programming Language), Personally Identifiable Information
In summary, here are 10 of our most popular cybersecurity threat detection courses
- Introduction to Computer Vision and Image Processing:Â IBM
- Cyber Incident Response:Â Infosec
- Advanced Computer Vision with TensorFlow:Â DeepLearning.AI
- Intrusion Detection:Â Johns Hopkins University
- Advanced Cybersecurity Concepts and Capstone Project:Â Microsoft
- Cybersecurity and the X-Factor:Â Kennesaw State University
- Accounting Analytics:Â University of Pennsylvania
- Whole genome sequencing of bacterial genomes - tools and applications:Â Technical University of Denmark (DTU)
- MathWorks Computer Vision Engineer:Â MathWorks
- Detecting and Mitigating Cyber Threats and Attacks:Â University of Colorado System