Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat detection"
Vanderbilt University
Skills you'll gain: Criminal Investigation and Forensics, Public Safety and National Security, Social Justice, Court Systems, Legal Proceedings, Political Sciences, Case Law, Social Sciences, Policy Analysis, Disabilities, Mental Health Diseases and Disorders, Law, Regulation, and Compliance, Cultural Diversity, Ethical Standards And Conduct
University of Maryland, College Park
Skills you'll gain: Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Application Specific Integrated Circuits, Cryptography, Encryption, Emerging Technologies, Authentications, System Design and Implementation, Computational Logic
- Status: Free Trial
Skills you'll gain: Intrusion Detection and Prevention, Continuous Monitoring, Threat Management, Firewall, Incident Response, Network Security, Threat Detection, Network Monitoring, Information Systems Security, Infrastructure Security, Cyber Security Strategy, Real Time Data
Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Computing, Threat Detection, Cybersecurity, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Human Factors (Security), Encryption
- Status: Free Trial
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Penetration Testing, Application Security, Data Security, Security Controls, Vulnerability Assessments, Software Design, C and C++, Vulnerability Management, Authorization (Computing), Java, Linux, Programming Principles, Debugging, Security Engineering
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Vulnerability Management, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Management, Vulnerability Assessments, Cyber Security Strategy, Network Security, Threat Management, Threat Detection, Security Controls, Cyber Governance, Firewall, Virtual Private Networks (VPN), Intrusion Detection and Prevention, Continuous Improvement Process
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Threat Detection, Network Analysis, Cybersecurity, System Design and Implementation, Network Security, Machine Learning Software, Machine Learning Methods, Performance Testing, Machine Learning Algorithms, Machine Learning, Supervised Learning, Microsoft Windows
- Status: Free Trial
Google
Skills you'll gain: Vulnerability Management, Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Stakeholder Communications, Vulnerability Assessments, Threat Detection, Cyber Attacks, Hardening, Network Security, Security Controls, Threat Management, Security Information and Event Management (SIEM), TCP/IP, Bash (Scripting Language), Linux, Debugging, Cybersecurity
- Status: Free Trial
University of Minnesota
Skills you'll gain: Software Design Patterns, Software Design, Engineering Software, Software Quality Assurance, Software Engineering, Program Development, Application Security, Object Oriented Design, Software Architecture, Software Quality (SQA/SQC), Development Testing, Threat Modeling, Maintainability, Development Environment, Code Review, Application Deployment, Test Tools, Continuous Deployment, Quality Assurance, Continuous Delivery
- Status: Free Trial
Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Cyber Threat Intelligence, Threat Detection, Threat Management, Security Management, Cybersecurity, Continuous Monitoring, Security Information and Event Management (SIEM), Scenario Testing, Technical Communication
- Status: Free Trial
University of Illinois Urbana-Champaign
Skills you'll gain: Data Mining, Big Data, Anomaly Detection, Text Mining, Unstructured Data, Spatial Analysis, Advanced Analytics, Image Analysis, Algorithms, Information Privacy
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Real-Time Operating Systems, Embedded Systems, Reliability, Embedded Software, Performance Tuning, Hardware Architecture, Software Design, Debugging, Software Architecture, Verification And Validation, Hardware Design, System Design and Implementation, Code Review, System Programming, Software Systems, Linux, Systems Architecture, Real Time Data, Operating Systems, OS Process Management
Searches related to threat detection
In summary, here are 10 of our most popular threat detection courses
- Hot Topics in Criminal Justice:Â Vanderbilt University
- Hardware Security:Â University of Maryland, College Park
- Next-Generation Firewalls and Intrusion Prevention:Â LearnQuest
- Systems and Application Security:Â ISC2
- Secure Coding Practices:Â University of California, Davis
- The Foundations of Cybersecurity:Â Kennesaw State University
- Advanced Malware and Network Anomaly Detection:Â Johns Hopkins University
- Cybersécurité Google: Google
- Engineering Practices for Building Quality Software:Â University of Minnesota
- Advanced Threat Hunting and Incident Response:Â LearnQuest