Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cybersecurity threat detection"
University of Colorado System
Skills you'll gain: Infrastructure Security, Public Safety and National Security, Cybersecurity, Security Management, Cyber Attacks, Cyber Security Policies, Security Strategy, Threat Modeling, Policty Analysis, Research, and Development, Risk Management Framework
Kennesaw State University
Skills you'll gain: Email Security, Firewall, Threat Detection, Network Security, Cybersecurity, Security Awareness, Cloud Storage, Information Privacy, Cloud Computing, General Networking, Encryption
EIT Digital
Skills you'll gain: Technical Standard, General Data Protection Regulation (GDPR), Personally Identifiable Information, Information Privacy, Law, Regulation, and Compliance, Ethical Standards And Conduct, Data Ethics, Technology Roadmaps, International Relations, Cultural Sensitivity, Data Security, Interoperability, Social Studies, Health Information Management and Medical Records, Regulation and Legal Compliance, Cybersecurity, Emerging Technologies, Political Sciences, Health Care Procedure and Regulation, Data Sharing
Skills you'll gain: Generative AI, Data Ethics, Anomaly Detection, Advanced Analytics, Threat Detection, Artificial Intelligence and Machine Learning (AI/ML), Deep Learning, Data Security, Applied Machine Learning, Artificial Neural Networks, Email Security, Natural Language Processing
EC-Council
Skills you'll gain: Malware Protection, Cybersecurity, Data Security, Cyber Attacks, Threat Detection, Computer Security Awareness Training, Network Security, Cyber Threat Intelligence, Data Integrity, Incident Response, Network Analysis, Microsoft Windows, Mac OS, Linux Commands, Linux, Operating Systems, Web Applications, File Systems, Web Servers
- Status: New
Johns Hopkins University
Skills you'll gain: Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Detection, Computer Security Incident Management, Cybersecurity, Anomaly Detection, Applied Machine Learning, Network Security, Machine Learning Algorithms, Machine Learning, Predictive Modeling, Data Mining, Artificial Neural Networks
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Cloud Infrastructure, Cloud Security, Load Balancing, User Accounts, Authorization (Computing), Network Security, Identity and Access Management, Threat Detection, Information Systems Security, Cybersecurity, Encryption, Geospatial Information and Technology
University of Colorado System
Skills you'll gain: Computer Security, OSI Models, Systems Administration, Virtualization, Network Security, Information Technology, Information Systems Security, Enterprise Security, General Networking, Network Administration, Information Systems, Computer Networking, Virtual Machines, Computer Systems, Data Integrity
MathWorks
Skills you'll gain: Image Analysis, Computer Vision, Matlab, Anomaly Detection, Geospatial Information and Technology, Applied Machine Learning, Data Transformation, Algorithms
University of Colorado System
Skills you'll gain: Cryptography, Cybersecurity, Encryption, Public Key Infrastructure, Data Integrity
University at Buffalo
Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Incident Response, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Information Systems Security, Cyber Security Assessment, Threat Detection, Information Assurance, Network Security, Risk Management Framework, Personally Identifiable Information, Cloud Security
Howard University
Skills you'll gain: Design Thinking, Business Software, Information Systems, Cloud Computing, Business Systems, Solution Design, Business Technologies, Cloud Computing Architecture, Customer Analysis, Cloud Security, Virtualization, Cloud Platforms, Digital Transformation, Cloud Services, Management Information Systems, Product Design, Business Solutions, Information Technology, Process Design, Cloud Infrastructure
In summary, here are 10 of our most popular cybersecurity threat detection courses
- Homeland Security & Cybersecurity Connection - It's Not About the Terrorists:Â University of Colorado System
- Cybersecurity: Protecting your Information at Home:Â Kennesaw State University
- Privacy and Standardisation:Â EIT Digital
- Gen AI for Fraud Detection Analytics:Â Edureka
- Digital Forensics Essentials (DFE):Â EC-Council
- Machine Learning and Emerging Technologies in Cybersecurity:Â Johns Hopkins University
- Advanced System Security Design:Â University of Colorado System
- Enterprise System Management and Security :Â University of Colorado System
- Introduction to Computer Vision:Â MathWorks
- Classical Cryptosystems and Core Concepts:Â University of Colorado System