Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cybersecurity threat detection"
Skills you'll gain: NoSQL, Databases, Relational Databases, Database Architecture and Administration, Database Management, Data Storage Technologies, Data Management, Scalability
University of Colorado System
Skills you'll gain: Cryptography, Cryptographic Protocols, Encryption, Information Systems Security, Cybersecurity, Computer Security, Theoretical Computer Science
- Status: New
Skills you'll gain: Security Management, Incident Management, Computer Security Incident Management, Threat Management, Cyber Governance, Cyber Security Strategy, Risk Management Framework, Cyber Security Policies, Information Assurance, Security Controls, Vulnerability Assessments, Cyber Risk, Disaster Recovery
Skills you'll gain: MITRE ATT&CK Framework, Network Security, Cybersecurity, Cyber Operations, Python Programming, Data Access, Authorization (Computing), Authentications, Scripting, Scripting Languages, Computer Programming, User Accounts
Skills you'll gain: Splunk, Dashboard, Data Transformation, Data Analysis, Statistical Analysis, Pivot Tables And Charts, Query Languages, Data Visualization Software, Stored Procedure, Ad Hoc Reporting, Event Monitoring, Continuous Monitoring
Skills you'll gain: Continuous Monitoring, Personally Identifiable Information, Risk Management, Risk Management Framework, Regulatory Compliance, Data Management, Information Privacy, Health Care Procedure and Regulation, Healthcare Industry Knowledge, Security Management, Health Information Management and Medical Records, Risk Analysis, Health Care, Patient Safety, Security Awareness, Data Security, Cybersecurity, ISO/IEC 27001, Security Controls, Information Assurance
Microsoft
Skills you'll gain: Vulnerability Management, Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Intrusion Detection and Prevention, Security Testing, Network Security, Threat Management, System Testing, Threat Detection, Firewall, Cybersecurity, Cloud Security, Microsoft Azure, Virtual Private Networks (VPN), Windows PowerShell, Command-Line Interface
Skills you'll gain: Embedded Systems, Cybersecurity, Internet Of Things, Software Development, Electronic Components, Systems Integration, Debugging, C (Programming Language), Reliability, Real Time Data
Kennesaw State University
Skills you'll gain: Cybersecurity, Interviewing Skills, Cyber Security Strategy, Cyber Risk, Cyber Security Policies, Organizational Structure, Cyber Governance, Workforce Development, Security Management, Professional Networking
- Status: New
University of Illinois Urbana-Champaign
Skills you'll gain: Automation, Artificial Intelligence, Data Ethics, Advanced Analytics, Business Process Automation, Robotic Process Automation, Predictive Analytics, Machine Learning, Emerging Technologies, Cloud Computing, Internet Of Things, Computer Hardware, Cybersecurity, Logistics
Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Risk Management, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Network Security, Threat Management, Event Monitoring, Role-Based Access Control (RBAC), Identity and Access Management, Business Risk Management, Security Controls
Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Containerization, Encryption
In summary, here are 10 of our most popular cybersecurity threat detection courses
- Vector Databases: An Introduction with Chroma DB:Â IBM
- Cryptography and Information Theory:Â University of Colorado System
- Certified Information Security Manager (CISM):Â Packt
- Credential Access, discovery, lateral movement & collection:Â Infosec
- Splunk Query Language and Data Analysis:Â EDUCBA
- ISC2 Healthcare Certificate:Â ISC2
- Cybersecurity Testing and Prevention:Â Microsoft
- Introduction to Automotive Embedded Systems:Â Starweaver
- Cybersecurity Job Search and Interviews: Getting Started:Â Kennesaw State University
- Advanced Topics in Artificial Intelligence:Â University of Illinois Urbana-Champaign