Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cybersecurity threat detection"
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Cybersecurity, Cyber Attacks, Threat Modeling, Vulnerability Assessments, Network Security, Scenario Testing, Network Analysis, Problem Management
Skills you'll gain: Feature Engineering, Big Data, Anomaly Detection, Google Cloud Platform, Unsupervised Learning, Applied Machine Learning, Decision Tree Learning, Supervised Learning, Predictive Modeling, Predictive Analytics
LearnQuest
Skills you'll gain: Network Architecture, Emerging Technologies, Internet Of Things, Network Security, Network Protocols, Wireless Networks, Network Performance Management, Network Planning And Design, Network Infrastructure, Computer Networking, Cybersecurity, Digital Communications, Technology Roadmaps, Artificial Intelligence and Machine Learning (AI/ML), Vulnerability Assessments, Automation, Real Time Data, Artificial Intelligence
Skills you'll gain: Cyber Operations, Threat Management, Threat Detection, Cybersecurity, Scripting, IT Automation, Command-Line Interface, Python Programming, Network Security, Encryption
Universidad de los Andes
Skills you'll gain: Penetration Testing, Threat Detection, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Risk Management Framework, Cyber Attacks, Security Testing, Information Technology, Cyber Risk, Application Security, Human Factors (Security), Web Servers, Servers, Web Applications
Fortinet, Inc.
Skills you'll gain: Virtual Private Networks (VPN), Firewall, Network Routing, Intrusion Detection and Prevention, Authentications, Lightweight Directory Access Protocols, Network Security, Network Administration, Security Controls, System Configuration, Network Monitoring
University of Michigan
Skills you'll gain: Data Quality, Data Cleansing, Data Collection, Data Validation, Data Analysis, Exploratory Data Analysis, Data Processing, Threat Detection, Data Access, Sampling (Statistics)
University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Penetration Testing, Application Security, Vulnerability Assessments, Secure Coding, Authorization (Computing), Cybersecurity, Dependency Analysis, Docker (Software), JSON, Git (Version Control System)
- Status: Free
Princeton University
Skills you'll gain: Risk Analysis, Analysis, Systems Thinking, International Relations, Financial Systems, Socioeconomics, Governance, Epidemiology, Complex Problem Solving, Cultural Diversity, Economics, Supply Chain
University of Colorado System
Skills you'll gain: Risk Management Framework, Infrastructure Security, Cyber Security Policies, Continuous Monitoring, Security Management, Cyber Governance, Cybersecurity, Cyber Security Strategy, Security Strategy, Cyber Risk
Skills you'll gain: Network Analysis, Network Security, Cyber Operations, Intrusion Detection and Prevention, MITRE ATT&CK Framework, Cybersecurity, Threat Detection, Network Monitoring, Cyber Threat Hunting, Penetration Testing, Anomaly Detection, Scripting, Command-Line Interface, Python Programming, Data Access, System Monitoring, User Accounts, Scripting Languages, System Programming, Automation
- Status: New
Skills you'll gain: Cybersecurity, TCP/IP, Cyber Attacks, General Networking, Network Security, Cyber Threat Intelligence, Threat Detection, Infrastructure Security, Endpoint Security, Routing Protocols, Information Systems Security, Firewall, Incident Response, Cloud Security, Information Technology Infrastructure Library, Identity and Access Management
In summary, here are 10 of our most popular cybersecurity threat detection courses
- CEH (v12) Practice Projects and Exam Simulators:Â LearnKartS
- Fraud Detection on Financial Transactions with Machine Learning on Google Cloud:Â Google Cloud
- 5G Mobile Networks:Â LearnQuest
- Python for Command-and-control, Exfiltration and Impact:Â Infosec
- Vulnerabilidades y pruebas de penetración: Universidad de los Andes
- FortiGate Administrator:Â Fortinet, Inc.
- The Total Data Quality Framework:Â University of Michigan
- Exploiting and Securing Vulnerabilities in Java Applications:Â University of California, Davis
- Global Systemic Risk :Â Princeton University
- Cybersecurity Policy for Water and Electricity Infrastructures:Â University of Colorado System