Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat detection techniques"
New York University
Skills you'll gain: Network Security, Firewall, IT Security Architecture, Distributed Denial-Of-Service (DDoS) Attacks, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Cyber Attacks, Network Security, Vulnerability Assessments, Cloud Services, Data Security, Human Factors (Security), Personally Identifiable Information
University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Threat Detection, Data Sharing
- Status: Free
Infosec
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Detection, Threat Modeling, MITRE ATT&CK Framework, Endpoint Detection and Response, Cybersecurity, Malware Protection, Security Information and Event Management (SIEM), Anomaly Detection, Generative AI, Network Analysis
Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Network Architecture, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Intrusion Detection and Prevention, Cyber Threat Intelligence, Computer Networking, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
- Status: [object Object]
Skills you'll gain: Social Media Content, Social Media Management, Social Media Marketing, Social Media, Marketing Analytics, Target Audience, Content Creation, Social Media Strategy, Instagram, Campaign Management, Marketing Effectiveness, Marketing, Performance Analysis, Key Performance Indicators (KPIs), Goal Setting, Advertising, Facebook, Performance Metric, Advertising Campaigns, Presentations
Skills you'll gain: Anomaly Detection, Image Analysis, Computer Vision, Matlab, Deep Learning, Applied Machine Learning, Application Deployment, PyTorch (Machine Learning Library), Artificial Intelligence and Machine Learning (AI/ML), Data Synthesis, Data Manipulation
University of Michigan
Skills you'll gain: Unified Modeling Language, JSON, Object Oriented Programming (OOP), Debugging, Object Oriented Design, Data Processing, Unit Testing, Data Import/Export, Restful API, Python Programming, Image Analysis, Data Manipulation, Jupyter, Data Structures, Software Engineering, Application Programming Interface (API), Computer Programming, File Management, Computer Vision, Functional Design
DeepLearning.AI
Skills you'll gain: Generative AI, Tensorflow, Computer Vision, Image Analysis, Deep Learning, Keras (Neural Network Library), Artificial Neural Networks, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning Methods, Distributed Computing, Unsupervised Learning, Network Model, Scalability, Visualization (Computer Graphics), Network Architecture, Performance Tuning, Machine Learning
- Status: Free
Imperial College London
Skills you'll gain: Creative Thinking, Brainstorming, Ideation, Creativity, Resourcefulness, Curiosity, Problem Solving, Analytical Skills, Collaboration, Analysis
Johns Hopkins University
Skills you'll gain: Artificial Intelligence, Image Analysis, Computer Vision, Radiology, Data Processing, Bayesian Network, Artificial Neural Networks, Applied Machine Learning, Machine Learning Methods, Epidemiology, Deep Learning, Health Care, Medical Science and Research
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
In summary, here are 10 of our most popular threat detection techniques courses
- Real-Time Cyber Threat Detection and Mitigation:Â New York University
- Cyber Threats and Attack Vectors:Â University of Colorado System
- Proactive Computer Security:Â University of Colorado System
- Cyber Threat Hunting:Â Infosec
- Computer Networks and Network Security:Â IBM
- Meta Social Media Marketing:Â Meta
- Advanced Deep Learning Techniques for Computer Vision:Â MathWorks
- Python 3 Programming:Â University of Michigan
- TensorFlow: Advanced Techniques:Â DeepLearning.AI
- Creative Thinking: Techniques and Tools for Success:Â Imperial College London