Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat detection techniques"
Johns Hopkins University
Skills you'll gain: Rmarkdown, Exploratory Data Analysis, Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Data Visualization, Statistical Programming, Ggplot2, Dimensionality Reduction, Data Visualization Software, Data Integration, Knitr, Data Analysis, Data Import/Export, General Science and Research, Data Sharing, Statistical Reporting
- Status: Free
Coursera Instructor Network
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Assessment, Cybersecurity, Threat Detection, Incident Response, Cyber Operations, Generative AI, Data Ethics, Security Testing, Vulnerability Assessments
Edureka
Skills you'll gain: Cybersecurity, Secure Coding, Cyber Security Strategy, Threat Detection, Network Security, Application Security, IT Security Architecture, Generative AI, Endpoint Security, Incident Response, Artificial Intelligence, Automation
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Network Analysis, Document Management, Technical Documentation, Record Keeping
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Threat Detection, Amazon Web Services, Incident Response, Continuous Monitoring, Cloud Security, Data Security, Identity and Access Management, Amazon Elastic Compute Cloud, Network Security, Cloud Computing
Cisco Learning and Certifications
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Malware Protection, Network Monitoring, Network Administration, TCP/IP, Network Infrastructure, Infrastructure Security, Intrusion Detection and Prevention, Network Protocols, Load Balancing, Firewall, Cybersecurity, General Networking, Authorization (Computing), Web Applications, Security Controls, Web Servers, Authentications
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Threat Detection, Network Analysis, Cybersecurity, System Design and Implementation, Network Security, Machine Learning Software, Machine Learning Methods, Performance Testing, Machine Learning Algorithms, Machine Learning, Artificial Intelligence, Supervised Learning, Microsoft Windows
Skills you'll gain: ChatGPT, Generative AI, Artificial Intelligence, Data Ethics, OpenAI, Artificial Intelligence and Machine Learning (AI/ML), Deep Learning, Artificial Neural Networks, Application Deployment, IBM Cloud, Governance, Machine Learning, Business Transformation, Ethical Standards And Conduct, Computer Vision, Self Service Technologies, Information Architecture, Business Process Automation, Software Development Tools, Image Analysis
Skills you'll gain: Artificial Intelligence, Generative AI, Data Ethics, OpenAI, Artificial Intelligence and Machine Learning (AI/ML), Deep Learning, Artificial Neural Networks, ChatGPT, Governance, Machine Learning, Business Transformation, Ethical Standards And Conduct, Computer Vision, Emerging Technologies, Natural Language Processing
University of Michigan
Skills you'll gain: Pandas (Python Package), Jupyter, NumPy, Data Manipulation, Data Science, Data Analysis, Statistical Analysis, Pivot Tables And Charts, Data Cleansing, Data Import/Export, Probability & Statistics, Python Programming, Programming Principles
In summary, here are 10 of our most popular threat detection techniques courses
- Data Science: Foundations using R:Â Johns Hopkins University
- GenAI for Cybersecurity Analysts:Â Coursera Instructor Network
- Gen AI in Cybersecurity:Â Edureka
- Sound the Alarm: Detection and Response:Â Google
- Cybersecurity Threat Vectors and Mitigation:Â Microsoft
- AWS: Threat Detection, Logging and Monitoring:Â Whizlabs
- Network Security:Â Cisco Learning and Certifications
- Detecting and Mitigating Cyber Threats and Attacks:Â University of Colorado System
- Advanced Malware and Network Anomaly Detection:Â Johns Hopkins University
- AI Foundations for Everyone:Â IBM