Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat detection"
- Status: AI skills
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Cloud Security, Threat Management, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
- Status: New AI skills
Google
Skills you'll gain: Network Security, Incident Response, Computer Security Incident Management, Hardening, Stakeholder Communications, Intrusion Detection and Prevention, Security Management, Threat Management, Cybersecurity, Network Protocols, Cloud Security, Network Architecture, Event Monitoring, Cyber Risk, TCP/IP, Operating Systems, File Systems, Security Controls, Debugging, Python Programming
New York University
Skills you'll gain: Network Security, Firewall, Distributed Denial-Of-Service (DDoS) Attacks, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Cyber Attacks, Security Controls, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Threat Detection, Amazon Web Services, Incident Response, Continuous Monitoring, Cloud Security, Data Security, Identity and Access Management, Amazon Elastic Compute Cloud, Network Security, Cloud Computing
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
Skills you'll gain:
Skills you'll gain: ChatGPT, Generative AI, Cyber Threat Intelligence, Security Information and Event Management (SIEM), OpenAI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Artificial Intelligence, Natural Language Processing, IBM Cloud, Artificial Intelligence and Machine Learning (AI/ML), Anomaly Detection, Vulnerability Management, Software Development Tools, Augmented and Virtual Reality (AR/VR), Deep Learning, Image Analysis, Technical Communication
MathWorks
Skills you'll gain: Computer Vision, Image Analysis, Deep Learning, Matlab, Data Visualization, Applied Machine Learning, Data Cleansing, Data Analysis, Machine Learning, Performance Tuning
Skills you'll gain: Cloud Development, Image Analysis, Anomaly Detection, Microsoft Azure, Cloud Storage, Data Storage, Cloud Applications, Computer Vision, Text Mining, Microsoft Development Tools, Data Storage Technologies, Natural Language Processing, Data Ethics, Continuous Deployment, Application Deployment, Virtual Machines, ASP.NET, Platform As A Service (PaaS), GitHub, Generative AI
Skills you'll gain: Anomaly Detection, Image Analysis, Text Mining, Computer Vision, Artificial Intelligence, Natural Language Processing, Microsoft Azure, Data Ethics, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning, Predictive Modeling, Unstructured Data, Applied Machine Learning, Predictive Analytics, Analytics, Supervised Learning, Unsupervised Learning, Data Processing, Deep Learning, Data Science
DeepLearning.AI
Skills you'll gain: Extract, Transform, Load, Data Pipelines, Image Analysis, Data Import/Export, Tensorflow, iOS Development, Application Deployment, Android Development, Data Processing, Computer Vision, MLOps (Machine Learning Operations), Swift Programming, Mobile Development, Data Transformation, JSON, Applied Machine Learning, Data Sharing, Javascript, Deep Learning, Artificial Neural Networks
Searches related to threat detection
In summary, here are 10 of our most popular threat detection courses
- Microsoft Cybersecurity Analyst:Â Microsoft
- Introduction to Cybersecurity Tools & Cyberattacks:Â IBM
- Google Cybersecurity:Â Google
- Real-Time Cyber Threat Detection and Mitigation:Â New York University
- AWS: Threat Detection, Logging and Monitoring:Â Whizlabs
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM
- Introduction to the Threat Intelligence Lifecycle :Â IBM
- IBM Generative AI for Cybersecurity Professionals:Â IBM
- Deep Learning for Object Detection:Â MathWorks
- Building AI Cloud Apps with Microsoft Azure:Â Microsoft