Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "malware detection techniques"
Coursera Project Network
Skills you'll gain: Generative AI, Keras (Neural Network Library), Tensorflow, Deep Learning, Dimensionality Reduction, Exploratory Data Analysis, Applied Machine Learning, Anomaly Detection, Data Processing, Data Visualization, Data Synthesis, Machine Learning
- Status: Free
West Virginia University
Skills you'll gain: Internal Controls, Financial Controls, Threat Detection, Anomaly Detection, Financial Auditing, Cybersecurity, Financial Data, Investigation, Analytics, Specialized Accounting, Advanced Analytics, Security Awareness, Big Data, Business Ethics, Analysis, Compliance Reporting, Data Analysis Software, Ethical Standards And Conduct
Multiple educators
Skills you'll gain: Unsupervised Learning, Supervised Learning, Classification And Regression Tree (CART), Artificial Intelligence and Machine Learning (AI/ML), Machine Learning Algorithms, Applied Machine Learning, Machine Learning, Jupyter, Data Ethics, Decision Tree Learning, Tensorflow, Scikit Learn (Machine Learning Library), NumPy, Predictive Modeling, Deep Learning, Artificial Intelligence, Reinforcement Learning, Random Forest Algorithm, Feature Engineering, Artificial Neural Networks
University of Pennsylvania
Skills you'll gain: Risk Modeling, Financial Statements, Probability Distribution, Mathematical Modeling, Statistical Modeling, Portfolio Management, Regression Analysis, Business Modeling, Financial Modeling, Risk Management, Quantitative Research, Presentations, Decision Making, Data Visualization, Microsoft PowerPoint, Predictive Modeling, Investment Management, Spreadsheet Software, Google Sheets, Excel Formulas
Skills you'll gain: ChatGPT, Generative AI, Artificial Intelligence, Data Ethics, OpenAI, Artificial Intelligence and Machine Learning (AI/ML), Deep Learning, Artificial Neural Networks, Application Deployment, IBM Cloud, Governance, Machine Learning, Business Transformation, Ethical Standards And Conduct, Computer Vision, Self Service Technologies, Information Architecture, Business Process Automation, Software Development Tools, Image Analysis
Skills you'll gain: Anomaly Detection, Image Analysis, Computer Vision, Matlab, Deep Learning, Applied Machine Learning, Application Deployment, PyTorch (Machine Learning Library), Artificial Intelligence and Machine Learning (AI/ML), Data Synthesis, Data Manipulation
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Malware Protection, Network Security, Threat Detection, Firewall, Code Review, Routing Protocols, Proxy Servers, Linux, Internet Of Things, Servers
- Status: [object Object]
Skills you'll gain: Istio, Node.JS, Software Development Life Cycle, Unit Testing, Cloud Computing Architecture, Server Side, Application Deployment, Kubernetes, React Redux, Cloud Services, Django (Web Framework), Object-Relational Mapping, OpenShift, Git (Version Control System), Full-Stack Web Development, HTML and CSS, Cloud Computing, Jupyter, Generative AI, Interviewing Skills
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Computer Security Incident Management, Cyber Threat Intelligence, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Continuous Monitoring, System Monitoring, Network Analysis, Virtual Machines, Network Security, Information Systems Security, Network Monitoring, NIST 800-53, Applied Machine Learning, Machine Learning Algorithms
Rutgers the State University of New Jersey
Skills you'll gain: Strategic Sourcing, Lean Six Sigma, Lean Manufacturing, Demand Planning, Procurement, Supplier Relationship Management, Manufacturing Operations, Forecasting, Process Improvement, Supplier Management, Operations Management, Purchasing, Supply Management, Operational Efficiency, Warehouse Management, Supply Chain Planning, Sales Management, Inventory and Warehousing, Inventory Management System, Transportation, Supply Chain, and Logistics
- Status: [object Object]
Skills you'll gain: Social Media Content, Social Media Management, Social Media Marketing, Social Media, Marketing Analytics, Target Audience, Content Creation, Social Media Strategy, Instagram, Campaign Management, Marketing Effectiveness, Marketing, Performance Analysis, Key Performance Indicators (KPIs), Goal Setting, Advertising, Facebook, Performance Metric, Advertising Campaigns, Presentations
Skills you'll gain: Network Security, Intrusion Detection and Prevention, Hardening, TCP/IP, Cyber Attacks, Network Architecture, Computer Networking, Cloud Computing, Firewall, Network Infrastructure, Network Protocols, Virtual Private Networks (VPN)
In summary, here are 10 of our most popular malware detection techniques courses
- Data Balancing with Gen AI: Credit Card Fraud Detection:Â Coursera Project Network
- Forensic Accounting and Fraud Examination:Â West Virginia University
- Machine Learning:Â DeepLearning.AI
- Business and Financial Modeling:Â University of Pennsylvania
- AI Foundations for Everyone:Â IBM
- Advanced Deep Learning Techniques for Computer Vision:Â MathWorks
- DDoS Attacks and Defenses:Â University of Colorado System
- IBM Full Stack Software Developer:Â IBM
- Intrusion Detection:Â Johns Hopkins University
- Supply Chain Management:Â Rutgers the State University of New Jersey