Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat detection"
- Status: Free Trial
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Penetration Testing, Application Security, Data Security, Security Controls, Vulnerability Assessments, Software Design, C and C++, Vulnerability Management, Authorization (Computing), Java, Linux, Programming Principles, Debugging, Security Engineering
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Threat Detection, Network Analysis, Cybersecurity, System Design and Implementation, Network Security, Machine Learning Software, Machine Learning Methods, Performance Testing, Machine Learning Algorithms, Machine Learning, Supervised Learning, Microsoft Windows
- Status: Free Trial
Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Cyber Threat Intelligence, Threat Detection, Threat Management, Security Management, Cybersecurity, Continuous Monitoring, Security Information and Event Management (SIEM), Scenario Testing, Technical Communication
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Vulnerability Management, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Management, Vulnerability Assessments, Cyber Security Strategy, Network Security, Threat Management, Threat Detection, Security Controls, Cyber Governance, Firewall, Virtual Private Networks (VPN), Intrusion Detection and Prevention, Continuous Improvement Process
- Status: Free Trial
University of Washington
Skills you'll gain: Classification And Regression Tree (CART), Applied Machine Learning, Supervised Learning, Predictive Modeling, Text Mining, Machine Learning Algorithms, Data Cleansing, Scalability, Machine Learning, Natural Language Processing, Big Data, Probability & Statistics, Algorithms
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Real-Time Operating Systems, Embedded Systems, Reliability, Embedded Software, Performance Tuning, Systems Architecture, Hardware Architecture, Software Architecture, Verification And Validation, Software Design, Debugging, System Design and Implementation, Hardware Design, System Programming, Software Systems, Linux, Operating Systems, OS Process Management, Performance Testing, Software Documentation
Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Computing, Threat Detection, Cybersecurity, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Human Factors (Security), Encryption
- Status: Free Trial
University of Illinois Urbana-Champaign
Skills you'll gain: Data Mining, Big Data, Anomaly Detection, Text Mining, Unstructured Data, Spatial Analysis, Advanced Analytics, Image Analysis, Algorithms, Information Privacy
- Status: Free Trial
University at Buffalo
Skills you'll gain: Anomaly Detection, Process Analysis, Manufacturing Processes, Data Collection, Data Storage, Manufacturing Operations, Data Processing, Systems Engineering, Data Analysis, Data Cleansing, Digital Transformation, Big Data, Computing Platforms, Cloud Computing
- Status: Free Trial
Skills you'll gain: MITRE ATT&CK Framework, Cybersecurity, Cyber Threat Intelligence, Cyber Operations, Network Security, IT Automation, Scripting, Python Programming
- Status: Free Trial
Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Cyber Operations, Scripting, Cybersecurity, Python Programming, Network Analysis, Authentications, Automation
- Status: Free Trial
Google
Skills you'll gain: Vulnerability Management, Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Stakeholder Communications, Vulnerability Assessments, Threat Detection, Hardening, Network Security, Security Controls, Threat Management, Security Information and Event Management (SIEM), TCP/IP, Risk Management Framework, Bash (Scripting Language), Linux, Debugging, Cybersecurity
Searches related to threat detection
In summary, here are 10 of our most popular threat detection courses
- Secure Coding Practices:Â University of California, Davis
- Advanced Malware and Network Anomaly Detection:Â Johns Hopkins University
- Advanced Threat Hunting and Incident Response:Â LearnQuest
- The Foundations of Cybersecurity:Â Kennesaw State University
- Machine Learning: Classification:Â University of Washington
- Real-Time Embedded Systems:Â University of Colorado Boulder
- Systems and Application Security:Â ISC2
- Pattern Discovery in Data Mining:Â University of Illinois Urbana-Champaign
- Advanced Manufacturing Process Analysis:Â University at Buffalo
- Introduction to Python for Cybersecurity :Â Infosec