Filter by
The language used throughout the course, in both instruction and assessments.
Results for "threat detection"
Skills you'll gain: Application Deployment, Image Analysis, Google Cloud Platform, Computer Vision, Anomaly Detection, Applied Machine Learning, MLOps (Machine Learning Operations), Predictive Analytics
Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, OSI Models, Network Security, Firewall, Threat Detection, Network Administration, Network Protocols, Cyber Attacks, General Networking, Security Management, TCP/IP, Virtual Local Area Network (VLAN), Software-Defined Networking
Board Infinity
Skills you'll gain: Vulnerability Assessments, Network Monitoring, Penetration Testing, Virtual Private Networks (VPN), Cyber Security Assessment, Linux Commands, Cybersecurity, Linux, Network Security, Intrusion Detection and Prevention, Software Installation, Network Analysis
Skills you'll gain: Continuous Monitoring, Business Continuity, ISO/IEC 27001, Security Management, Security Controls, Threat Management, Information Systems Security, Risk Management, Risk Analysis, Business Risk Management, Cyber Risk, Cyber Governance, Threat Modeling, Governance Risk Management and Compliance, Cyber Security Strategy, NIST 800-53, Cybersecurity, Compliance Management, Cyber Security Policies, Regulatory Requirements
Skills you'll gain: Image Analysis, Matlab, Computer Vision, Spatial Analysis, 3D Modeling, Visualization (Computer Graphics)
- Status: Free
Coursera Instructor Network
Skills you'll gain: Personally Identifiable Information, Governance Risk Management and Compliance, Information Privacy, Data Governance, Data Security, Cybersecurity, Data Management, Cyber Attacks, Data Loss Prevention, Data Ethics, Cyber Governance, Cyber Risk, Encryption
Akamai Technologies, Inc.
Skills you'll gain: Routing Protocols, OSI Models, TCP/IP, General Networking, Network Protocols, Network Troubleshooting, Computer Networking, Networking Hardware, Network Security, Network Infrastructure, Network Model, Virtual Private Networks (VPN), Wireless Networks, Network Routers, Dynamic Host Configuration Protocol (DHCP), Intrusion Detection and Prevention, Network Analysis, Security Controls
Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Cybersecurity, Threat Modeling, Malware Protection, Penetration Testing, Threat Detection, Cyber Attacks, Network Security, Intrusion Detection and Prevention, Information Systems Security, Security Awareness, Lightweight Directory Access Protocols, Network Protocols
Microsoft
Skills you'll gain: Penetration Testing, Security Testing, System Testing, Vulnerability Management, Cloud Security, Cybersecurity, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Microsoft Azure, Firewall, Virtual Private Networks (VPN)
University of Colorado Boulder
Skills you'll gain: Crisis Management, Systems Thinking, Leadership, Strategic Communication, Threat Management, Change Management, Threat Detection, Organizational Leadership, Infrastructure Security, Business Continuity, Disaster Recovery, Organizational Change, Engineering Management, Emergency Response, Contingency Planning, Business Ethics, Communication, Risk Analysis, Complex Problem Solving, Decision Making
Skills you'll gain: Anomaly Detection, Google Cloud Platform, Application Deployment, Image Analysis, Cloud Computing, Applied Machine Learning, Computer Vision
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Disaster Recovery, Business Continuity, Application Security, IT Security Architecture, Infrastructure Security, Cryptography, Regulation and Legal Compliance, Bash (Scripting Language), Encryption, Authorization (Computing), Risk Management, Virtualization
Searches related to threat detection
In summary, here are 10 of our most popular threat detection courses
- Deploy and Test a Visual Inspection AI Component Anomaly Detection Solution:Â Google Cloud
- Network and Communications Security:Â ISC2
- Kali Linux:Â Board Infinity
- Security and Risk Management:Â Packt
- Image Segmentation, Filtering, and Region Analysis:Â MathWorks
- Introduction to Data Protection and Privacy:Â Coursera Instructor Network
- Networking Fundamentals:Â Akamai Technologies, Inc.
- System Hacking, Malware Threats, and Network Attacks:Â Packt
- Cybersecurity Tools and Technologies:Â Microsoft
- Resilience Engineering and Leadership in Crisis:Â University of Colorado Boulder