Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat detection"
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Threat Detection, Amazon Web Services, Incident Response, Continuous Monitoring, Cloud Security, Data Security, Identity and Access Management, Amazon Elastic Compute Cloud, Network Security, Cloud Computing
Coursera Project Network
Skills you'll gain: Anomaly Detection, Jupyter, Exploratory Data Analysis, Application Deployment, Unsupervised Learning, Data Visualization, Applied Machine Learning, Machine Learning, Machine Learning Software, Machine Learning Algorithms
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Data Quality, Data Security, Technical Communication, Automation, Requirements Analysis, Machine Learning
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Computer Security Incident Management, Cyber Threat Intelligence, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Continuous Monitoring, System Monitoring, Network Analysis, Virtual Machines, Network Security, Information Systems Security, Network Monitoring, NIST 800-53, Applied Machine Learning, Machine Learning Algorithms
Skills you'll gain: Image Analysis, Computer Vision, Artificial Neural Networks, Python Programming, Deep Learning, Real Time Data, Google Cloud Platform, Applied Machine Learning, Development Environment, Data Collection, Software Installation, System Configuration, Machine Learning
Coursera Project Network
Skills you'll gain: Generative AI, Keras (Neural Network Library), Tensorflow, Deep Learning, Dimensionality Reduction, Exploratory Data Analysis, Applied Machine Learning, Anomaly Detection, Data Processing, Data Visualization, Data Synthesis, Machine Learning
Johns Hopkins University
Skills you'll gain: Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Detection, Computer Security Incident Management, Cybersecurity, Anomaly Detection, Applied Machine Learning, Network Security, Machine Learning Algorithms, Machine Learning, Predictive Modeling, Data Mining, Artificial Neural Networks
New York University
Skills you'll gain: Network Security, Firewall, IT Security Architecture, Distributed Denial-Of-Service (DDoS) Attacks, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
Edureka
Skills you'll gain: Cybersecurity, Secure Coding, Cyber Security Strategy, Threat Detection, Network Security, Application Security, IT Security Architecture, Generative AI, Endpoint Security, Incident Response, Artificial Intelligence, Automation
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
Skills you'll gain: Threat Detection, Threat Management, Cloud Security, Google Cloud Platform, Vulnerability Management, Vulnerability Assessments, Security Information and Event Management (SIEM), Public Cloud
Coursera Project Network
Skills you'll gain: PyTorch (Machine Learning Library), Image Analysis, Deep Learning, Artificial Neural Networks, Machine Learning Methods, Computer Vision
Searches related to threat detection
In summary, here are 10 of our most popular threat detection courses
- AWS: Threat Detection, Logging and Monitoring:Â Whizlabs
- Machine Learning - Anomaly Detection via PyCaret:Â Coursera Project Network
- Introduction to the Threat Intelligence Lifecycle :Â IBM
- Intrusion Detection:Â Johns Hopkins University
- Computer Vision: YOLO Custom Object Detection with Colab GPU:Â Packt
- Data Balancing with Gen AI: Credit Card Fraud Detection:Â Coursera Project Network
- Machine Learning and Emerging Technologies in Cybersecurity:Â Johns Hopkins University
- Real-Time Cyber Threat Detection and Mitigation:Â New York University
- Gen AI in Cybersecurity:Â Edureka
- Detecting and Mitigating Cyber Threats and Attacks:Â University of Colorado System