Filter by
The language used throughout the course, in both instruction and assessments.
Results for "threat detection"
University of Michigan
Skills you'll gain: Data Quality, Data Cleansing, Data Collection, Data Validation, Data Analysis, Exploratory Data Analysis, Data Processing, Threat Detection, Data Access, Sampling (Statistics)
Skills you'll gain: Incident Response, Disaster Recovery, Computer Security Incident Management, Business Continuity, Cybersecurity, Cyber Security Policies, Investigation, Event Monitoring, Threat Detection, Contingency Planning, Communication Planning
University of Michigan
Skills you'll gain: Data Quality, Quantitative Research, Data Validation, Data Collection, Data Cleansing, Quality Assurance, Data Processing, Data Strategy, Data Integrity, Survey Creation, Data Analysis, Exploratory Data Analysis, Data Access, Statistical Analysis, Sampling (Statistics), Threat Detection
Google Cloud
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Data Security, Cloud Computing, Cybersecurity, Infrastructure Security, Authentications, Authorization (Computing), Cloud Services, Network Security, Data Storage, Threat Detection, Identity and Access Management, Encryption
Columbia University
Skills you'll gain: Computer Vision, Image Analysis, Dimensionality Reduction, Artificial Neural Networks, Unsupervised Learning, Deep Learning, Graph Theory, Machine Learning Algorithms, Machine Learning, Feature Engineering
Skills you'll gain: Anomaly Detection, Google Cloud Platform, Application Deployment, Image Analysis, Cloud Computing, Applied Machine Learning, Computer Vision
- Status: Free
Coursera Instructor Network
Skills you'll gain: Personally Identifiable Information, Governance Risk Management and Compliance, Information Privacy, Data Governance, Data Security, Cybersecurity, Data Management, Cyber Attacks, Data Loss Prevention, Data Ethics, Cyber Governance, Cyber Risk, Encryption
Google Cloud
Skills you'll gain: Cloud Security, Risk Management Framework, Data Security, DevSecOps, Personally Identifiable Information, Security Management, ISO/IEC 27001, Cloud Computing, Information Privacy, Infrastructure as Code (IaC), Cyber Security Policies, Security Controls, Security Strategy, Identity and Access Management, Threat Detection
Infosec
Skills you'll gain: Authentications, Application Security, Secure Coding, Serverless Computing, Cryptography, Risk Management Framework, Threat Modeling, Cloud Security, Infrastructure Security, Package and Software Management, Node.JS, Web Applications, Javascript, Vulnerability Management, Cloud Services, Cloud Platforms, Web Development, Identity and Access Management, Dependency Analysis, Vulnerability Assessments
Universidad de los Andes
Skills you'll gain: IT Security Architecture, Computer Security Incident Management, Network Security, Incident Response, Information Systems Security, Cybersecurity, Cloud Security, Cyber Attacks, Intrusion Detection and Prevention, Computer Networking, Data Security, Security Controls
Illinois Tech
Skills you'll gain: Linux, Cloud-Native Computing, Network Security, Cloud Computing, Amazon Web Services, Infrastructure as Code (IaC), Cloud Computing Architecture, Network Troubleshooting, Cloud Platforms, Cloud Storage, System Monitoring, Linux Administration, Linux Commands, Linux Servers, Software-Defined Networking, Cloud Infrastructure, Network Monitoring, Threat Modeling, TCP/IP, Command-Line Interface
Johns Hopkins University
Skills you'll gain: Artificial Neural Networks, Applied Machine Learning, Deep Learning, Natural Language Processing, Artificial Intelligence and Machine Learning (AI/ML), Linear Algebra, Mathematical Software, Numerical Analysis, Machine Learning, Data Processing, Data Structures, Performance Tuning, Data Transformation, Algorithms
Searches related to threat detection
In summary, here are 10 of our most popular threat detection courses
- The Total Data Quality Framework:Â University of Michigan
- Incident Response and Recovery:Â ISC2
- Total Data Quality:Â University of Michigan
- Trust and Security with Google Cloud:Â Google Cloud
- Visual Perception:Â Columbia University
- Deploy and Test a Visual Inspection AI Cosmetic Anomaly Detection Solution:Â Google Cloud
- Introduction to Data Protection and Privacy:Â Coursera Instructor Network
- Strategies for Cloud Security Risk Management:Â Google Cloud
- JavaScript Security:Â Infosec
- Seguridad en la red:Â Universidad de los Andes