Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat detection"
Skills you'll gain: Anomaly Detection, Image Analysis, Computer Vision, Google Cloud Platform, Predictive Modeling, Artificial Intelligence, Product Development
Google Cloud
Skills you'll gain: Vulnerability Scanning, Google App Engine, Vulnerability Assessments, Application Security, Cloud Security, Google Cloud Platform
- Status: Free Trial
Skills you'll gain: Generative AI, Microsoft Copilot, OpenAI, Data Ethics, Prompt Engineering, Large Language Modeling, Artificial Intelligence and Machine Learning (AI/ML), Data Security, Data Synthesis, Information Privacy, Anomaly Detection, Data Analysis
- Status: Free Trial
Arizona State University
Skills you'll gain: Cyber Attacks, Data Security, Safety and Security, Cybersecurity, Computer Security Awareness Training, Information Systems Security, Security Strategy, Security Controls, Threat Modeling, Disaster Recovery, Data Loss Prevention, Incident Response, Vulnerability Assessments, Patch Management
- Status: NewStatus: Free Trial
Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Penetration Testing, Threat Management, Threat Detection, Cyber Security Assessment, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Data Ethics, Vulnerability Assessments, Security Strategy, Network Security, Network Analysis
- Status: Free Trial
Università di Napoli Federico II
Skills you'll gain: Unsupervised Learning, Supervised Learning, Object Oriented Programming (OOP), PyTorch (Machine Learning Library), R Programming, NumPy, Image Analysis, Pandas (Python Package), Matplotlib, Artificial Neural Networks, Python Programming, Deep Learning, Computer Programming, Scripting Languages, Computer Vision, Keras (Neural Network Library), Scripting, Machine Learning, Exploratory Data Analysis, Programming Principles
University of Maryland, College Park
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Cyber Governance, Cyber Risk, Cyber Security Assessment, Security Strategy, Cyber Security Policies, Security Management, Security Awareness, Threat Modeling, Information Privacy, Infrastructure Security, Risk Management, Vulnerability Assessments
- Status: Free Trial
Skills you'll gain: Time Series Analysis and Forecasting, SAS (Software), Forecasting, Feature Engineering, Statistical Analysis, Data Analysis, Statistical Methods, Advanced Analytics, Regression Analysis, Data Transformation, Predictive Modeling, Applied Machine Learning, Anomaly Detection, Statistical Modeling, Unsupervised Learning, Bayesian Statistics, Automation, Data Processing, Data Manipulation, Dimensionality Reduction
- Status: Free Trial
Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Encryption, Cybersecurity, Infrastructure Security, Computer Security, Threat Modeling, Network Security, Public Key Infrastructure, Authentications, Data Integrity
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Risk Management, Risk Management Framework, Threat Management, Operational Risk, Enterprise Risk Management (ERM), Business Risk Management, Cyber Risk, Risk Mitigation, Risk Analysis, Governance Risk Management and Compliance, Vulnerability Assessments, Continuous Improvement Process
- Status: NewStatus: Free Trial
Skills you'll gain: Network Security, Intrusion Detection and Prevention, Command-Line Interface, Cybersecurity, Information Systems Security, Local Area Networks, Firewall, Windows PowerShell, Hardening, Threat Detection, Linux, Penetration Testing, Network Architecture, Wireless Networks, Vulnerability Assessments, System Configuration, IT Automation, Encryption, Network Analysis, Public Key Infrastructure
- Status: Free Trial
Skills you'll gain: Splunk, Data Modeling, Role-Based Access Control (RBAC), System Monitoring, Incident Response, User Accounts, Security Information and Event Management (SIEM), Machine Learning, Systems Administration, Performance Tuning, Data Visualization, Threat Detection, Anomaly Detection, Correlation Analysis, Data Analysis, Authentications, Data Collection, Configuration Management
Searches related to threat detection
In summary, here are 10 of our most popular threat detection courses
- Create a Component Anomaly Detection Model using Visual Inspection AI: Google Cloud
- Cloud Security Scanner: Qwik Start: Google Cloud
- Generative AI for Data Science with Copilot: Microsoft
- Digital Safety and Security: Arizona State University
- Introduction to Ethical Hacking and Recon Techniques: Packt
- Data Science con Python e R: Università di Napoli Federico II
- A Strategic Approach to Cybersecurity: University of Maryland, College Park
- Analyzing Time Series and Sequential Data: SAS
- Security Architecture and Engineering: Packt
- A General Approach to Risk Management: Kennesaw State University