Filter by
The language used throughout the course, in both instruction and assessments.
Results for "threat detection"
DeepLearning.AI
Skills you'll gain: Image Analysis, Tensorflow, Computer Vision, JSON, Applied Machine Learning, Javascript, Artificial Neural Networks, Deep Learning, Data Processing, Real Time Data, Web Applications, Machine Learning
University of Colorado Boulder
Skills you'll gain: Embedded Systems, Reliability, Performance Tuning, Embedded Software, Hardware Architecture, System Software, Software Architecture, Verification And Validation, Software Design, Debugging, System Design and Implementation, Linux, System Programming, Performance Testing, Linux Administration, Real Time Data, Microarchitecture, Safety Assurance, Software Systems, Systems Architecture
Google Cloud
Skills you'll gain: Single Sign-On (SSO), User Accounts, Google Workspace, Lightweight Directory Access Protocols, Application Security, Security Management, Authentications, Multi-Factor Authentication, Identity and Access Management, Application Programming Interface (API), Cloud-Based Integration, Threat Detection
Cisco Learning and Certifications
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Workflow Management, Stakeholder Engagement, Cyber Operations, Cybersecurity, Stakeholder Management, Security Information and Event Management (SIEM), Incident Response, Security Management, Computer Security Incident Management, Cyber Attacks, Stakeholder Communications, Incident Management, Event Monitoring, Security Controls, Data Security, Customer Relationship Building, Network Security, Team Oriented
Google
Skills you'll gain: Threat Modeling, Security Controls, Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Vulnerability Management, Cybersecurity, Hardening, Network Security, Stakeholder Communications, Vulnerability Assessments, Relational Databases, Security Information and Event Management (SIEM), TCP/IP, Data Security, Cloud Security, Network Architecture, Linux, Debugging, Cyber Risk
Infosec
Skills you'll gain: Cyber Threat Hunting, Threat Detection, Cyber Security Strategy, System Monitoring, Cybersecurity, Cyber Operations, Continuous Monitoring, Network Security, Incident Response, Network Monitoring, Anomaly Detection, Scripting
EC-Council
Skills you'll gain: Malware Protection, Cybersecurity, Data Security, Cyber Attacks, Threat Detection, Computer Security Awareness Training, Network Security, Cyber Threat Intelligence, Data Integrity, Incident Response, Network Analysis, Microsoft Windows, Mac OS, Linux Commands, Linux, Operating Systems, Web Applications, File Systems, Web Servers
Imperial College London
Skills you'll gain: Preventative Care, Infectious Diseases, Infection Control, Health Assessment, Clinical Laboratory Science, Medical Science and Research
- Status: Free
EIT Digital
Skills you'll gain: Embedded Systems, Threat Modeling, Systems Architecture, System Software, Debugging, Computer Architecture, Hardware Architecture, System Programming, Internet Of Things, Application Security, General Networking, Wireless Networks, Operating Systems, Performance Tuning, System Configuration, Real Time Data
- Status: Free
The University of Hong Kong
Skills you'll gain: Infectious Diseases, Epidemiology, Biostatistics, Mitigation, Emergency Response, Public Safety and National Security, Health Care, Medical Science and Research, Research, Preventative Care, Health Systems, Risk Management, Risk Analysis, Media and Communications, Community Outreach, Investigation, Big Data, Cultural Sensitivity
Kennesaw State University
Skills you'll gain: Network Security, Security Management, Firewall, Cyber Attacks, Network Monitoring, Cybersecurity, Cyber Security Assessment, Network Protocols, Computer Networking, Virtual Private Networks (VPN), Wireless Networks, Vulnerability Assessments, Cloud Security, Continuous Monitoring, TCP/IP, Intrusion Detection and Prevention, Threat Detection, Mobile Security, Cryptography, Encryption
- Status: Free
University of Geneva
Skills you'll gain: Scientific Methods, Experimentation, Research, Quantitative Research, Physics, Mathematical Modeling, Simulation and Simulation Software
Searches related to threat detection
In summary, here are 10 of our most popular threat detection courses
- Browser-based Models with TensorFlow.js: DeepLearning.AI
- Real-Time Embedded Systems: University of Colorado Boulder
- Google Workspace Security: Google Cloud
- Security Operations Center (SOC): Cisco Learning and Certifications
- Google サイバーセキュリティ: Google
- Python for Active Defense: Infosec
- Digital Forensics Essentials (DFE): EC-Council
- Immunology: Innate Immune System: Imperial College London
- Architecting Smart IoT Devices: EIT Digital
- Epidemics: The University of Hong Kong