Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat detection"
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Computer Security, Network Architecture
- Status: Free
University of London
Skills you'll gain: Law, Regulation, and Compliance, Business Ethics, Regulation and Legal Compliance, Social Justice, International Relations, Ethical Standards And Conduct, Political Sciences, Governance
University of Illinois Urbana-Champaign
Skills you'll gain: Data Visualization, Data Visualization Software, Text Mining, Data Presentation, Data Mining, Interactive Data Visualization, Data Storytelling, Dashboard, Visualization (Computer Graphics), Tableau Software, Plot (Graphics), Natural Language Processing, Unsupervised Learning, Unstructured Data, Statistical Analysis, Graphing, Big Data, Anomaly Detection, Analytics, Machine Learning Algorithms
Cisco Learning and Certifications
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Cyber Threat Intelligence, Threat Detection, General Networking, Network Security, Cybersecurity, Cyber Security Policies, Infrastructure Security, Computer Networking, Technical Services, Technical Support and Services
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Application Security, Penetration Testing, Data Security, Vulnerability Assessments, Cybersecurity, Vulnerability Management, Security Testing, Software Design, Authorization (Computing), Verification And Validation, Code Review, Linux, Programming Principles, Debugging
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
Skills you'll gain: Penetration Testing, Network Security, Threat Management, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Vulnerability Scanning, Cybersecurity, Authorization (Computing), Security Awareness, Cyber Threat Intelligence, Malware Protection, Data Security, Cyber Attacks, Threat Detection, Computer Security Awareness Training
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Threat Management, Cybersecurity, Cyber Security Strategy, Application Security, Threat Detection, Security Strategy, Microsoft Azure, Cloud Security, Internet Of Things, Secure Coding, Network Security, Computer Security, Security Controls, Vulnerability Assessments, Identity and Access Management
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Computer Security Incident Management, Cyber Security Policies, Cyber Security Strategy, Cyber Governance, Human Factors (Security), Business Risk Management, Cybersecurity, Threat Management, Security Awareness, Law, Regulation, and Compliance, Information Management, Mobile Security, Business Ethics, Performance Measurement, Network Security
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Cyber Attacks, Network Security, Vulnerability Assessments, Cloud Services, Data Security, Human Factors (Security), Personally Identifiable Information
Coursera Project Network
Skills you'll gain: Anomaly Detection, Jupyter, Exploratory Data Analysis, Application Deployment, Unsupervised Learning, Data Visualization, Applied Machine Learning, Machine Learning, Machine Learning Software, Machine Learning Algorithms
Skills you'll gain: Threat Detection, Threat Management, Cloud Security, Google Cloud Platform, Vulnerability Management, Vulnerability Assessments, Security Information and Event Management (SIEM), Public Cloud
Searches related to threat detection
In summary, here are 10 of our most popular threat detection courses
- Introduction to Cyber Security:Â New York University
- Citizenship and the Rule of Law:Â University of London
- Data Mining:Â University of Illinois Urbana-Champaign
- Threat Response:Â Cisco Learning and Certifications
- Secure Coding Practices:Â University of California, Davis
- Detecting and Mitigating Cyber Threats and Attacks:Â University of Colorado System
- Cybersecurity Attack and Defense Fundamentals:Â EC-Council
- Advanced Cybersecurity Concepts and Capstone Project:Â Microsoft
- Cybersecurity: Developing a Program for Your Business:Â Kennesaw State University
- Cyber Threats and Attack Vectors:Â University of Colorado System