Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cybersecurity threat detection"
Microsoft
Skills you'll gain: Business Software, Computer Hardware, Hardware Architecture, Generative AI, Operating Systems, Data Storage Technologies, Computer Systems, Data Maintenance, Enterprise Security, System Software, Information Technology, OS Process Management, Data Storage, System Configuration, Microsoft Windows, Technical Support, Servers, Cybersecurity
Kennesaw State University
Skills you'll gain: Cyber Governance, Vulnerability Management, Cyber Attacks, Cybersecurity, Cyber Risk, Threat Management, Cyber Threat Intelligence, Security Management, Vulnerability Assessments, Threat Detection, Cyber Security Strategy, Risk Management, Security Awareness, Information Systems Security, Cyber Operations, Cyber Security Policies, Incident Response, Computer Security Incident Management, Network Security, Risk Analysis
Skills you'll gain: Exploratory Data Analysis, Feature Engineering, Statistical Methods, Statistical Inference, Data Access, Anomaly Detection, Statistical Analysis, Data Analysis, Data Cleansing, Data Manipulation, Data Science, Machine Learning, Probability & Statistics, Jupyter, Pandas (Python Package), Artificial Intelligence
University of Pennsylvania
Skills you'll gain: Big Data, Credit Risk, Risk Management, Personalized Service, Digital Transformation, Customer Insights, Machine Learning, Marketing Analytics, Customer Engagement, Risk Analysis, Advanced Analytics, Data-Driven Decision-Making, Anomaly Detection, Financial Data, Consumer Behaviour, Artificial Intelligence, Retail Banking
- Status: Free
The State University of New York
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Policies, Cybersecurity, International Relations, Cyber Risk, Cyber Operations, Cyber Governance, Infrastructure Security, Law, Regulation, and Compliance, Security Management, Political Sciences, Media and Communications, Computer Networking, Psychology
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Risk Analysis, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Cloud Security, Security Strategy, Information Systems Security, Computer Security Awareness Training, Risk Management, Vulnerability Assessments, Enterprise Security
Kennesaw State University
Skills you'll gain: Internet Of Things, Cybersecurity, Cyber Security Strategy, Mobile Security, Security Awareness, Wireless Networks, Information Privacy, Network Security, Data Security, Emerging Technologies, Risk Management Framework
Skills you'll gain: Peripheral Devices, Computer Hardware, Computer Systems, Operating Systems, Desktop Support, System Configuration, Microsoft Windows, Linux Administration, Hardware Troubleshooting, Networking Hardware, Data Storage, Information Technology, General Networking, System Support, Mac OS, Technical Support, File Systems
- Status: Free
Eindhoven University of Technology
Skills you'll gain: Business Process, Process Analysis, Process Improvement, Business Process Management, Data Mining, Business Process Modeling, Process Optimization, Operational Analysis, Performance Analysis, Data Analysis, Real Time Data, Data Science, Verification And Validation
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Network Planning And Design, Network Protocols, Network Model, Cloud Computing, TCP/IP
EC-Council
Skills you'll gain: Penetration Testing, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Vulnerability Assessments, Network Security, Threat Detection, Vulnerability Scanning, Security Awareness, Cyber Threat Intelligence, Cybersecurity, Intrusion Detection and Prevention, Cyber Attacks, Application Security, Web Applications, Mobile Security, Internet Of Things, Authentications, Encryption, Wireless Networks
- Status: Free
The Pennsylvania State University
Skills you'll gain: Infectious Diseases, Epidemiology, Preventative Care, Health Care, Social Sciences, Medical Science and Research, Pharmaceuticals, Socioeconomics, Environmental Issue, Mathematical Modeling, Data Collection
In summary, here are 10 of our most popular cybersecurity threat detection courses
- Introduction to Computers:Â Microsoft
- Cybersecurity Foundations for Risk Management:Â Kennesaw State University
- Exploratory Data Analysis for Machine Learning:Â IBM
- AI Applications in Marketing and Finance:Â University of Pennsylvania
- International Cyber Conflicts:Â The State University of New York
- Cybersecurity for Business:Â University of Colorado System
- Cybersecurity and the Internet of Things:Â Kennesaw State University
- Introduction to Hardware and Operating Systems:Â IBM
- Process Mining: Data science in Action:Â Eindhoven University of Technology
- Network Security:Â ISC2