Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat detection techniques"
Skills you'll gain: Generative AI, Data Ethics, Anomaly Detection, Advanced Analytics, Threat Detection, Artificial Intelligence and Machine Learning (AI/ML), Deep Learning, Data Security, Applied Machine Learning, Artificial Neural Networks, Email Security, Natural Language Processing
Skills you'll gain: Debugging, Technical Communication, Network Troubleshooting, Performance Tuning, Problem Management, Technical Documentation, Technical Support, System Monitoring, System Support, Capacity Management, Incident Management, Performance Testing, Application Performance Management, Network Performance Management, Continuous Monitoring, Virtual Machines, Scripting
Rutgers the State University of New Jersey
Skills you'll gain: Demand Planning, Forecasting, Supply Chain Planning, Sales Management, Time Series Analysis and Forecasting, Supply Chain Management, Estimation, Trend Analysis, Decision Making
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
Skills you'll gain: Cloud Services, Puppet (Configuration Management Tool), Infrastructure as Code (IaC), Configuration Management, CI/CD, Cloud Infrastructure, Cloud Computing, Docker (Software), Containerization, Kubernetes, Load Balancing, System Configuration, System Monitoring, Scalability, IT Automation, DevOps, Automation, Debugging
University of Pennsylvania
Skills you'll gain: Big Data, Credit Risk, Risk Management, Personalized Service, Digital Transformation, Customer Insights, Machine Learning, Marketing Analytics, Customer Engagement, Risk Analysis, Advanced Analytics, Data-Driven Decision-Making, Anomaly Detection, Financial Data, Consumer Behaviour, Artificial Intelligence, Retail Banking
University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Penetration Testing, Vulnerability Assessments, Data Security, Authentications, Cybersecurity, Security Testing, Personally Identifiable Information, Identity and Access Management, Web Applications, Data Validation
- Status: Free
University of Washington
Skills you'll gain: Machine Learning Methods, Supervised Learning, Network Model, Matlab, Machine Learning Algorithms, Artificial Neural Networks, Computer Vision, Reinforcement Learning, Computational Thinking, Mathematical Modeling, Linear Algebra, Data Analysis, Information Architecture, Probability & Statistics
University of Minnesota
Skills you'll gain: User Story, Agile Software Development, Agile Methodology, Agile Project Management, Scrum (Software Development), Sprint Planning, Software Development Methodologies, Sprint Retrospectives, Backlogs, Continuous Integration, Test Driven Development (TDD), Release Management
- Status: Free
The Museum of Modern Art
Skills you'll gain: Creativity, Design Elements And Principles, Aesthetics, Color Theory, Liberal Arts
University of California, Irvine
Skills you'll gain: Peer Review, Instructional Design, Parent Communication, Instructional Strategies, Student Engagement, Teaching, Course Development, Constructive Feedback, Developing Training Materials, Curriculum Development, Virtual Environment, Data Management, Performance Analysis, Performance Management, Augmented Reality, End User Training and Support, Telecommuting, Emerging Technologies, Technology Strategies, Digital Communications
Skills you'll gain: Penetration Testing, Network Security, Threat Management, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Vulnerability Scanning, Cybersecurity, Authorization (Computing), Security Awareness, Cyber Threat Intelligence, Malware Protection, Data Security, Cyber Attacks, Threat Detection, Computer Security Awareness Training
In summary, here are 10 of our most popular threat detection techniques courses
- Gen AI for Fraud Detection Analytics:Â Edureka
- Troubleshooting and Debugging Techniques:Â Google
- Supply Chain Planning:Â Rutgers the State University of New Jersey
- Detecting and Mitigating Cyber Threats and Attacks:Â University of Colorado System
- Configuration Management and the Cloud:Â Google
- AI Applications in Marketing and Finance:Â University of Pennsylvania
- Identifying Security Vulnerabilities:Â University of California, Davis
- Computational Neuroscience:Â University of Washington
- Agile Software Development:Â University of Minnesota
- In the Studio: Postwar Abstract Painting:Â The Museum of Modern Art