Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat detection"
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Record Keeping, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Security Management, Vulnerability Scanning, Vulnerability Assessments, Threat Modeling, Security Information and Event Management (SIEM), Security Awareness
Skills you'll gain: Threat Modeling, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Vulnerability Assessments, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Encryption
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Threat Modeling, Email Security, Security Engineering, System Design and Implementation, Network Security, Jupyter, Authentications, Deep Learning, Machine Learning Software
Google Cloud
Skills you'll gain: Google Cloud Platform, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Kubernetes, Cloud Security, Containerization, OAuth, Cloud Storage, Cloud Services, Application Deployment, Virtual Machines, Security Controls, Cloud Computing, Threat Management, Generative AI, Application Security, Virtual Private Networks (VPN), Data Security
Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Incident Response, Cyber Threat Hunting, Key Management, Data Security, Threat Modeling, Computer Security Incident Management, File Systems, Threat Detection, Endpoint Security, Cryptography, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Linux, Malware Protection, Encryption, Cyber Threat Intelligence, Incident Management, Information Systems Security, Threat Management
DeepLearning.AI
Skills you'll gain: Computer Vision, Image Analysis, Deep Learning, Artificial Neural Networks, Keras (Neural Network Library), Tensorflow, Applied Machine Learning, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning, Data Processing, Algorithms
Skills you'll gain: Anomaly Detection, Image Analysis, Text Mining, Unsupervised Learning, Computer Vision, Artificial Intelligence, Natural Language Processing, Microsoft Azure, Artificial Intelligence and Machine Learning (AI/ML), Applied Machine Learning, Data Ethics, Machine Learning Software, Machine Learning, Regression Analysis, Predictive Modeling, Machine Learning Methods, Machine Learning Algorithms, Classification And Regression Tree (CART), Unstructured Data, Analytics
- Status: AI skills
Google Cloud
Skills you'll gain: Cloud Security, Identity and Access Management, Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Threat Management, Cyber Threat Hunting, Risk Management Framework, Cyber Operations, Vulnerability Management, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Generative AI, DevSecOps, Cloud Computing, Data Security, Google Cloud Platform, Cybersecurity
University of Colorado Boulder
Skills you'll gain: Semiconductors, Display Devices, Computer Displays, Systems Design, Electrical Engineering, Technical Design, Electronic Systems, Power Electronics, Equipment Design, Electronic Components, Technology Solutions, Mathematical Modeling, Physics, Simulations, Scalability, Applied Mathematics
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Security Engineering, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, DevOps, Data Security, Software Development Life Cycle, Encryption
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
Searches related to threat detection
In summary, here are 10 of our most popular threat detection courses
- Sound the Alarm: Detection and Response:Â Google
- Security Analyst Fundamentals:Â IBM
- Assets, Threats, and Vulnerabilities:Â Google
- AI for Cybersecurity:Â Johns Hopkins University
- Security in Google Cloud:Â Google Cloud
- Cybersecurity Operations Fundamentals:Â Cisco Learning and Certifications
- Convolutional Neural Networks:Â DeepLearning.AI
- Microsoft Azure AI Fundamentals AI-900 Exam Prep:Â Microsoft
- Google Cloud Cybersecurity:Â Google Cloud
- Active Optical Devices:Â University of Colorado Boulder