Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat detection techniques"
Columbia University
Skills you'll gain: Image Analysis, Computer Vision, Computer Graphics, Computational Thinking, Algorithms, Machine Learning Algorithms, Machine Learning
New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Information Systems Security, Network Security, Computer Security, Malware Protection, Data Integrity
Skills you'll gain: Threat Modeling, Security Controls, Vulnerability Management, Cyber Threat Intelligence, Vulnerability Assessments, Cybersecurity, Security Awareness, Threat Detection, Data Security, MITRE ATT&CK Framework, NIST 800-53, Malware Protection, Risk Management Framework, Authorization (Computing), Personally Identifiable Information, Authentications, Encryption
Microsoft
Skills you'll gain: Penetration Testing, Security Testing, System Testing, Vulnerability Management, Cloud Security, Cybersecurity, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Microsoft Azure, Firewall, Virtual Private Networks (VPN)
Skills you'll gain: Data Storytelling, Data Presentation, Data Visualization, Interactive Data Visualization, Big Data, Data Visualization Software, Data Analysis, IBM Cognos Analytics, Statistical Analysis, Data Mining, Dashboard, Apache Hadoop, Data Collection, Tree Maps, Excel Formulas, Apache Hive, Microsoft Excel, Data Quality, Data Cleansing, Data Import/Export
University of Pennsylvania
Skills you'll gain: Return On Investment, Financial Reporting, Finance, Financial Data, Capital Budgeting, Financial Statements, Financial Modeling, Mathematical Modeling, Statistical Modeling, Regression Analysis, Business Modeling, Income Statement, Financial Analysis, Risk Analysis, Cash Flows, Business Mathematics, Financial Planning, Spreadsheet Software, Google Sheets, Excel Formulas
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Management, Security Information and Event Management (SIEM), Data Integrity
University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Encryption, Application Security, Vulnerability Assessments, Data Security, Authentications, Cybersecurity, Security Testing, Vulnerability Management, Personally Identifiable Information, Web Applications, SQL
Skills you'll gain: Network Security, Intrusion Detection and Prevention, Hardening, TCP/IP, Cyber Attacks, Network Architecture, Computer Networking, Cloud Computing, Firewall, Network Infrastructure, Network Protocols, Virtual Private Networks (VPN)
Coursera Project Network
Skills you'll gain: Anomaly Detection, Jupyter, Exploratory Data Analysis, Application Deployment, Unsupervised Learning, Data Visualization, Applied Machine Learning, Machine Learning, Machine Learning Software, Machine Learning Algorithms
Coursera Project Network
Skills you'll gain: Exploratory Data Analysis, Deep Learning, Text Mining, Artificial Neural Networks, Matplotlib, Data Cleansing, Data Import/Export, Pandas (Python Package), Data Analysis, Natural Language Processing, Python Programming, Machine Learning, Automation
- Status: [object Object]
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Cloud Security, Threat Management, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
In summary, here are 10 of our most popular threat detection techniques courses
- Features and Boundaries:Â Columbia University
- Introduction to Cyber Attacks:Â New York University
- Assets, Threats, and Vulnerabilities:Â Google
- Cybersecurity Tools and Technologies:Â Microsoft
- Data Analysis and Visualization Foundations:Â IBM
- Finance & Quantitative Modeling for Analysts:Â University of Pennsylvania
- Incident Response and Digital Forensics:Â IBM
- Identifying Security Vulnerabilities:Â University of California, Davis
- Connect and Protect: Networks and Network Security:Â Google
- Machine Learning - Anomaly Detection via PyCaret:Â Coursera Project Network