Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cybersecurity threat detection"
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Data Quality, Data Security, Technical Communication, Automation, Requirements Analysis, Machine Learning
New York University
Skills you'll gain: Cyber Attacks, Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cybersecurity, IT Security Architecture, Cloud Security, NIST 800-53, Cyber Threat Intelligence, Hybrid Cloud Computing, Cloud Computing Architecture, Payment Card Industry (PCI) Data Security Standards, Security Controls, Risk Management Framework, Blockchain, Internet Of Things, Data Integrity
- Status: New
Skills you'll gain: Incident Response, Vulnerability Scanning, Threat Modeling, Identity and Access Management, Vulnerability Management, Threat Detection, Vulnerability Assessments, Secure Coding, Encryption, Security Testing, Cybersecurity, Threat Management, Cyber Governance, Computer Security Incident Management, Cyber Security Policies, Cyber Threat Intelligence, Cyber Security Assessment, Incident Management, Intrusion Detection and Prevention, Technical Communication
Skills you'll gain: Cybersecurity, Application Security, Information Systems Security, Software Installation, System Configuration, Data Management, Information Management, Security Controls, Computer Hardware, Data Security, Hardware Architecture, Data Storage, Microsoft Windows, Firewall, Encryption, Identity and Access Management
Skills you'll gain: Malware Protection, Cyber Threat Hunting, Application Security, Cybersecurity, Threat Detection, Virtual Machines, Code Review, Debugging, System Programming, Windows PowerShell, Virtualization, Operating Systems, Programming Principles, Computer Architecture, Linux
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Information Systems Security, Cybersecurity, Computer Security, Authentications, Information Assurance, Data Security, Theoretical Computer Science, Algorithms
Queen Mary University of London
Skills you'll gain: General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Cloud Security, Personally Identifiable Information, Data Security, Regulation and Legal Compliance, Information Privacy, Cybersecurity, Cloud Services, Cloud Computing, Data Governance, Data Sharing
University of California San Diego
Skills you'll gain: Data Ethics, Interactive Learning, Big Data, Cybersecurity, Student Engagement, Teaching, Pedagogy, Blockchain, Diversity Awareness, Algorithms, Data Security, Cryptography, Technical Communication, Information Privacy, Emerging Technologies, Computer Networking, Digital Transformation, Computer Science, Cloud Computing, Information Technology
Skills you'll gain: Linux Commands, Linux, Penetration Testing, Open Web Application Security Project (OWASP), Vulnerability Scanning, Command-Line Interface, Security Testing, Scripting, Vulnerability Assessments, Scripting Languages, Intrusion Detection and Prevention, General Networking, Python Programming, Network Security, Cybersecurity, Application Security, Firewall, Web Applications, Cyber Security Assessment, Cyber Operations
Coursera Project Network
Skills you'll gain: Exploratory Data Analysis, Deep Learning, Text Mining, Artificial Neural Networks, Matplotlib, Data Cleansing, Data Import/Export, Pandas (Python Package), Data Analysis, Natural Language Processing, Python Programming, Machine Learning, Automation
EIT Digital
Skills you'll gain: Cybersecurity, Threat Modeling, Information Systems Security, Security Management, Cyber Security Strategy, Cyber Threat Intelligence, Cyber Security Policies, Threat Management, Cyber Risk, Threat Detection, Cyber Security Assessment, Network Security, Application Security, Risk Management, Security Controls, Security Awareness, Data Security, Information Privacy, Vulnerability Assessments, Business Economics
University of Colorado System
Skills you'll gain: Infrastructure Security, Public Safety and National Security, Cybersecurity, Security Management, Cyber Attacks, Cyber Security Policies, Security Strategy, Threat Modeling, Policty Analysis, Research, and Development, Risk Management Framework
In summary, here are 10 of our most popular cybersecurity threat detection courses
- Introduction to the Threat Intelligence Lifecycle :Â IBM
- Enterprise and Infrastructure Security:Â New York University
- CompTIA CySA+ (CS0-003):Â Packt
- Essential Aspects of Software, Hardware, and Data Backup:Â Microsoft
- Malware Analysis and Introduction to Assembly Language:Â IBM
- Applied Cryptography:Â University of Colorado System
- Cloud Computing Law: Data Protection and Cybersecurity:Â Queen Mary University of London
- Teaching Impacts of Technology in K-12 Education:Â University of California San Diego
- The Complete Ethical Hacking Bootcamp: Beginner To Advanced:Â Packt
- Fake News Detection with Machine Learning:Â Coursera Project Network