Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "malware detection techniques"
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Computer Security Incident Management, Cyber Threat Intelligence, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Continuous Monitoring, System Monitoring, Network Analysis, Virtual Machines, Network Security, Information Systems Security, Network Monitoring, NIST 800-53, Applied Machine Learning, Machine Learning Algorithms
DeepLearning.AI
Skills you'll gain: Supervised Learning, Applied Machine Learning, Jupyter, Scikit Learn (Machine Learning Library), Machine Learning, NumPy, Predictive Modeling, Feature Engineering, Artificial Intelligence, Classification And Regression Tree (CART), Python Programming, Regression Analysis, Unsupervised Learning, Statistical Modeling, Data-Driven Decision-Making, Algorithms
DeepLearning.AI
Skills you'll gain: Unsupervised Learning, Artificial Intelligence and Machine Learning (AI/ML), Data Ethics, Machine Learning, Machine Learning Algorithms, Supervised Learning, Artificial Intelligence, Reinforcement Learning, Artificial Neural Networks, Deep Learning, Anomaly Detection, Dimensionality Reduction, Algorithms, Regression Analysis
University of Colorado System
Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Cybersecurity, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, Data Validation
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Cybersecurity, Cyber Operations, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Security Information and Event Management (SIEM), Threat Detection, Cloud Security, Threat Management, System Monitoring, Automation
Coursera Project Network
Skills you'll gain: Generative AI, Keras (Neural Network Library), Tensorflow, Deep Learning, Dimensionality Reduction, Exploratory Data Analysis, Applied Machine Learning, Anomaly Detection, Data Processing, Data Visualization, Data Synthesis, Machine Learning
University of Michigan
Skills you'll gain: Pandas (Python Package), Jupyter, NumPy, Data Manipulation, Data Science, Data Analysis, Statistical Analysis, Pivot Tables And Charts, Data Cleansing, Data Import/Export, Probability & Statistics, Python Programming, Programming Principles
Johns Hopkins University
Skills you'll gain: Artificial Intelligence, Image Analysis, Computer Vision, Radiology, Data Processing, Bayesian Network, Artificial Neural Networks, Applied Machine Learning, Machine Learning Methods, Epidemiology, Deep Learning, Health Care, Medical Science and Research
Skills you'll gain: Feature Engineering, Big Data, Anomaly Detection, Google Cloud Platform, Unsupervised Learning, Applied Machine Learning, Decision Tree Learning, Supervised Learning, Predictive Modeling, Predictive Analytics
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Cybersecurity, Information Systems Security, Network Monitoring, Network Analysis
Johns Hopkins University
Skills you'll gain: Computer Vision, Machine Learning Algorithms, Image Analysis, Supervised Learning, Applied Machine Learning, Feature Engineering, Data Cleansing, Scikit Learn (Machine Learning Library), Data Transformation, Predictive Modeling, Machine Learning, Data Analysis, Regression Analysis
University of California San Diego
Skills you'll gain: Algorithms, Debugging, Development Testing, Software Testing, Computational Thinking, Computer Programming, Data Structures, Theoretical Computer Science
In summary, here are 10 of our most popular malware detection techniques courses
- Intrusion Detection:Â Johns Hopkins University
- Supervised Machine Learning: Regression and Classification :Â DeepLearning.AI
- Unsupervised Learning, Recommenders, Reinforcement Learning:Â DeepLearning.AI
- Hacking and Patching:Â University of Colorado System
- Detect, Respond, and Recover from Cloud Cybersecurity Attacks:Â Google Cloud
- Data Balancing with Gen AI: Credit Card Fraud Detection:Â Coursera Project Network
- Introduction to Data Science in Python:Â University of Michigan
- Artificial Intelligence for Breast Cancer Detection:Â Johns Hopkins University
- Fraud Detection on Financial Transactions with Machine Learning on Google Cloud:Â Google Cloud
- Introduction to Intrusion Detection Systems (IDS):Â Johns Hopkins University