Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat detection"
Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Computing, Threat Detection, Cybersecurity, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Human Factors (Security), Encryption
- Status: Free Trial
University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Vulnerability Management, Technical Design, Security Engineering, Software Architecture, Secure Coding, Software Design Patterns, Database Management, Software Engineering, Software Visualization, Software Development Life Cycle, Systems Design
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Intelligence, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Cybersecurity, Cyber Security Strategy, Threat Management, Continuous Monitoring, System Monitoring, Network Analysis, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, NIST 800-53, Applied Machine Learning
- Status: Free Trial
University of Washington
Skills you'll gain: Classification And Regression Tree (CART), Applied Machine Learning, Supervised Learning, Predictive Modeling, Text Mining, Machine Learning Algorithms, Data Cleansing, Scalability, Machine Learning, Natural Language Processing, Big Data, Probability & Statistics, Algorithms
Google Cloud
Skills you'll gain: Cyber Operations, Continuous Monitoring, Cybersecurity, Cyber Security Strategy, Threat Management, DevOps, Threat Detection, Cyber Security Assessment, Incident Response, Site Reliability Engineering, Digital Transformation, Agile Methodology, Automation
University of London
Skills you'll gain: Law, Regulation, and Compliance, Court Systems, Business Ethics, Social Justice, Environmental Social And Corporate Governance (ESG), Legal Proceedings, Case Law, International Relations, Legal Research, Political Sciences, Governance
University of London
Skills you'll gain: Key Management, Security Management, Cryptography, Information Systems Security, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, Threat Management, Computer Security, Information Assurance, Data Integrity, Incident Response
- Status: Free Trial
Google
Skills you'll gain: Threat Modeling, Security Controls, Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Vulnerability Management, Cybersecurity, Hardening, Network Security, Stakeholder Communications, Vulnerability Assessments, Relational Databases, Security Information and Event Management (SIEM), TCP/IP, Data Security, Cloud Security, Network Architecture, Security Management, Linux, Debugging
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Endpoint Detection and Response, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Anomaly Detection, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Network Analysis
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Vulnerability Management, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Management, Vulnerability Assessments, Cyber Security Strategy, Network Security, Threat Management, Threat Detection, Security Controls, Cyber Governance, Firewall, Virtual Private Networks (VPN), Intrusion Detection and Prevention, Continuous Improvement Process
- Status: Free Trial
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Penetration Testing, Application Security, Data Security, Security Controls, Vulnerability Assessments, Software Design, C and C++, Vulnerability Management, Authorization (Computing), Java, Linux, Programming Principles, Debugging, Security Engineering
- Status: Free Trial
University of Toronto
Skills you'll gain: Computer Vision, Image Analysis, Deep Learning, Computer Graphics, Artificial Neural Networks, Visualization (Computer Graphics), Artificial Intelligence and Machine Learning (AI/ML), Python Programming, Linear Algebra
Searches related to threat detection
In summary, here are 10 of our most popular threat detection courses
- Systems and Application Security: ISC2
- Secure Software Design: University of Colorado System
- Intrusion Detection: Johns Hopkins University
- Machine Learning: Classification: University of Washington
- Modern Security Operations: Google Cloud
- Citizenship and the Rule of Law: University of London
- Cyber Security Fundamentals: University of London
- Google サイバーセキュリティ: Google
- Introduction to Intrusion Detection Systems (IDS): Johns Hopkins University
- The Foundations of Cybersecurity: Kennesaw State University