Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat detection techniques"
- Status: Free
West Virginia University
Skills you'll gain: Internal Controls, Financial Controls, Threat Detection, Anomaly Detection, Financial Auditing, Cybersecurity, Financial Data, Investigation, Analytics, Specialized Accounting, Advanced Analytics, Security Awareness, Big Data, Business Ethics, Analysis, Compliance Reporting, Data Analysis Software, Ethical Standards And Conduct
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Record Keeping, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
Skills you'll gain: Computer Networking, Network Troubleshooting, TCP/IP, Network Architecture, Routing Protocols, Network Protocols, OSI Models, Network Infrastructure, Dynamic Host Configuration Protocol (DHCP), Virtual Private Networks (VPN), Network Security, Wireless Networks
University of California, Davis
Skills you'll gain: Search Engine Optimization, Persona Development, Web Analytics and SEO, Content Creation, Social Media Strategy, Competitive Analysis, Target Audience, Content Marketing, Peer Review, Social Media, Content Strategy, Google Analytics, Presentations, Forecasting, Digital Marketing, Expectation Management, Campaign Management, User Research, Relationship Management, Marketing Strategy and Techniques
Skills you'll gain: ChatGPT, Generative AI, Artificial Intelligence, OpenAI, Workflow Management, Deep Learning, Business Workflow Analysis, Artificial Neural Networks, Governance, Machine Learning, Application Deployment, Business Transformation, IBM Cloud, Business Technologies, Artificial Intelligence and Machine Learning (AI/ML), Ethical Standards And Conduct, Computer Vision, Business Logic, Software Development Tools, Image Analysis
Skills you'll gain: MySQL, Database Design, Version Control, Database Management Systems, MySQL Workbench, Extract, Transform, Load, Stored Procedure, Data Modeling, Data Structures, SQL, Database Theory, Unix Commands, Relational Databases, Databases, Git (Version Control System), Object Oriented Programming (OOP), Database Management, Unit Testing, Algorithms, Django (Web Framework)
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Network Architecture, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Intrusion Detection and Prevention, Cyber Threat Intelligence, Computer Networking, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
Michigan State University
Skills you'll gain: Peer Review, Content Creation, Aesthetics, Electronic Media, Storytelling, Creativity, Liberal Arts, Web Design and Development
Skills you'll gain: Data Storytelling, Performance Measurement, Data-Driven Decision-Making, E-Commerce, Performance Metric, Marketing Effectiveness, Digital Marketing, Branding, Marketing Channel, Marketing Strategy and Techniques, Customer Analysis, Advertising, Marketing Analytics, Search Engine Marketing, Customer Engagement, Content Marketing, Brand Awareness, Search Engine Optimization, Social Media Marketing, Target Audience
Skills you'll gain: Supervised Learning, Feature Engineering, Jupyter, Unsupervised Learning, Scikit Learn (Machine Learning Library), Machine Learning Algorithms, Python Programming, Applied Machine Learning, Statistical Machine Learning, Predictive Modeling, Machine Learning, Dimensionality Reduction, Classification And Regression Tree (CART), Matplotlib, Regression Analysis, Random Forest Algorithm, Statistical Modeling, Data Manipulation
Vanderbilt University
Skills you'll gain: Data Visualization, Image Analysis, Data Visualization Software, Matlab, Machine Learning Methods, Algorithms, User Interface (UI), Applied Machine Learning, Object Oriented Programming (OOP), Statistical Methods, Data Analysis, Computer Programming, Programming Principles, Data Processing, Application Development, Engineering Analysis, Data Structures, Debugging, Mathematical Software, Data Manipulation
In summary, here are 10 of our most popular threat detection techniques courses
- Forensic Accounting and Fraud Examination: West Virginia University
- Sound the Alarm: Detection and Response: Google
- The Bits and Bytes of Computer Networking: Google
- Search Engine Optimization (SEO): University of California, Davis
- AI Foundations for Everyone: IBM
- Meta Database Engineer: Meta
- Cybersecurity Threat Vectors and Mitigation: Microsoft
- Computer Networks and Network Security: IBM
- Photography Techniques: Light, Content, and Sharing: Michigan State University
- Foundations of Digital Marketing and E-commerce: Google