Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat detection techniques"
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
- Status: [object Object]
Google
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Security Controls, Vulnerability Management, Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Vulnerability Assessments, Event Monitoring, Network Security, Security Awareness, Threat Detection, Risk Management, Cybersecurity, Hardening, Bash (Scripting Language), Data Ethics, Linux Commands, Debugging
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Network Analysis, Document Management, Technical Documentation, Record Keeping
Skills you'll gain: Artificial Intelligence, Generative AI, Data Ethics, OpenAI, Artificial Intelligence and Machine Learning (AI/ML), Deep Learning, Artificial Neural Networks, ChatGPT, Governance, Machine Learning, Business Transformation, Ethical Standards And Conduct, Computer Vision, Emerging Technologies, Natural Language Processing
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Data Quality, Data Security, Technical Communication, Automation, Requirements Analysis, Machine Learning
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
- Status: Free
Coursera Instructor Network
Skills you'll gain: Generative AI, Regulatory Compliance, Regulatory Requirements, Compliance Management, Governance, Governance Risk Management and Compliance, Risk Management, Financial Regulation, Anomaly Detection, Artificial Intelligence, Threat Detection, Artificial Intelligence and Machine Learning (AI/ML), Predictive Analytics
Cisco Learning and Certifications
Skills you'll gain: Cyber Threat Hunting, Threat Detection, Threat Modeling, Threat Management, Event Monitoring, Vulnerability Management, Security Information and Event Management (SIEM), Cybersecurity, Continuous Monitoring, Incident Response, Security Management, Network Security, Network Monitoring
Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Threat Detection, Cyber Threat Hunting, Intrusion Detection and Prevention, Threat Management, Incident Response, Event Monitoring, Computer Security Incident Management, Network Analysis, Cybersecurity, Anomaly Detection, Network Security, Network Monitoring, Network Protocols, SQL
Skills you'll gain: ChatGPT, Generative AI, Cyber Threat Intelligence, Security Information and Event Management (SIEM), OpenAI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Artificial Intelligence, Natural Language Processing, IBM Cloud, Artificial Intelligence and Machine Learning (AI/ML), Anomaly Detection, Vulnerability Management, Software Development Tools, Augmented and Virtual Reality (AR/VR), Deep Learning, Image Analysis, Technical Communication
- Status: Free
Imperial College London
Skills you'll gain: Creative Thinking, Brainstorming, Ideation, Creativity, Resourcefulness, Curiosity, Problem Solving, Analytical Skills, Collaboration, Analysis
- Status: Free
Deep Teaching Solutions
Skills you'll gain: Learning Strategies, Time Management, Willingness To Learn, Mental Concentration, Creativity, Persistence, Self-Discipline, Stress Management, Self-Awareness, Adaptability
In summary, here are 10 of our most popular threat detection techniques courses
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM
- Google Cybersecurity:Â Google
- Sound the Alarm: Detection and Response:Â Google
- Introduction to Artificial Intelligence (AI):Â IBM
- Introduction to the Threat Intelligence Lifecycle :Â IBM
- Cybersecurity Threat Vectors and Mitigation:Â Microsoft
- GenAI for Fraud Detection and Compliance:Â Coursera Instructor Network
- Threat Investigation:Â Cisco Learning and Certifications
- Threat Analysis:Â Cisco Learning and Certifications
- IBM Generative AI for Cybersecurity Professionals:Â IBM