Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cybersecurity threat detection"
University of Colorado System
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Risk Management, Enterprise Security, Cyber Security Assessment, Vulnerability Assessments, Encryption, Network Security, Data Security, Cryptography, Security Awareness, Information Assurance
University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Vulnerability Management, Databases, Software Architecture, Secure Coding, Software Design Patterns, Systems Design, Software Engineering, Software Development Tools, Software Development Life Cycle, Technical Design, Security Engineering
University of London
Skills you'll gain: Key Management, Security Management, Cyber Attacks, Cryptography, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, Information Assurance, Security Controls, Incident Response
Google Cloud
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Load Balancing, Network Monitoring, Network Architecture, Network Security, Network Routing, Network Planning And Design, Virtual Private Networks (VPN), Cloud Computing Architecture, Google Cloud Platform, Firewall, Computer Networking, Multi-Cloud, TCP/IP, Hybrid Cloud Computing, Network Troubleshooting, Cloud Security, Intrusion Detection and Prevention, Cloud Computing, Network Performance Management
Skills you'll gain: Cloud Development, Image Analysis, Anomaly Detection, Microsoft Azure, Cloud Storage, Data Storage, Cloud Applications, Computer Vision, Text Mining, Microsoft Development Tools, Unsupervised Learning, Data Storage Technologies, Natural Language Processing, Data Ethics, Continuous Deployment, Application Deployment, Virtual Machines, ASP.NET, GitHub, Generative AI
University of Maryland, College Park
Skills you'll gain: Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Intrusion Detection and Prevention, Application Specific Integrated Circuits, Cryptography, Encryption, Technical Design, Emerging Technologies, System Design and Implementation
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Threat Management, Disaster Recovery, Cyber Operations, Cybersecurity, Threat Detection, Intrusion Detection and Prevention, Event Monitoring, Business Continuity, Vulnerability Assessments, Technical Communication
Microsoft
Skills you'll gain: Virtual Private Networks (VPN), Cybersecurity, Multi-Factor Authentication, Authentications, Information Systems Security, Network Security, Technical Support and Services, Information Privacy, Servers, Cloud Computing, Cloud Security, Network Administration, Encryption, Identity and Access Management, Mac OS
Skills you'll gain: Security Information and Event Management (SIEM), Splunk, Threat Detection, System Monitoring, Cybersecurity, Event Monitoring, Continuous Monitoring, Incident Response, Data Analysis Software, Data Management, Data Storage, Software Installation, Query Languages, User Interface (UI)
Cisco Learning and Certifications
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Cyber Threat Intelligence, Threat Detection, General Networking, Network Security, Cybersecurity, Cyber Security Policies, Infrastructure Security, Computer Networking, Technical Services, Technical Support and Services
- Status: New
Skills you'll gain: Cybersecurity, Network Security, Cyber Attacks, Cryptography, Threat Modeling, Information Systems Security, Identity and Access Management, Application Security, Computer Security, Firewall, Threat Management, Encryption, Threat Detection, Security Management, Public Key Infrastructure, Network Administration, Infrastructure Security, Security Controls, Authentications, Risk Management Framework
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Threat Detection, Amazon Web Services, Incident Response, Continuous Monitoring, Cloud Security, Data Security, Identity and Access Management, Amazon Elastic Compute Cloud, Network Security, Cloud Computing
In summary, here are 10 of our most popular cybersecurity threat detection courses
- Introduction to Cybersecurity for Business:Â University of Colorado System
- Secure Software Design:Â University of Colorado System
- Cyber Security Fundamentals:Â University of London
- Networking in Google Cloud:Â Google Cloud
- Building AI Cloud Apps with Microsoft Azure:Â Microsoft
- Hardware Security:Â University of Maryland, College Park
- Stages of Incident Response:Â Infosec
- Cybersecurity and Privacy:Â Microsoft
- Introduction to SIEM (Splunk):Â EDUCBA
- Threat Response:Â Cisco Learning and Certifications