Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat detection techniques"
University of Colorado Boulder
Skills you'll gain: Unsupervised Learning, Anomaly Detection, Machine Learning Methods, Data Mining, Applied Machine Learning, Feature Engineering, Exploratory Data Analysis, Data Analysis, Machine Learning Algorithms, Algorithms
Coursera Project Network
Skills you'll gain: Anomaly Detection, Jupyter, Exploratory Data Analysis, Application Deployment, Unsupervised Learning, Data Visualization, Applied Machine Learning, Machine Learning, Machine Learning Software, Machine Learning Algorithms
DeepLearning.AI
Skills you'll gain: Tensorflow, Deep Learning, Artificial Intelligence and Machine Learning (AI/ML), Performance Tuning, Machine Learning Methods, Artificial Neural Networks, Applied Machine Learning, Machine Learning, Supervised Learning, Machine Learning Algorithms, Network Architecture, Algorithms, Analysis, Debugging
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Data Quality, Data Security, Technical Communication, Automation, Requirements Analysis, Machine Learning
Cisco Learning and Certifications
Skills you'll gain: Cyber Threat Hunting, Threat Detection, Threat Modeling, Threat Management, Event Monitoring, Vulnerability Management, Security Information and Event Management (SIEM), Cybersecurity, Continuous Monitoring, Incident Response, Security Management, Network Security, Network Monitoring
DeepLearning.AI
Skills you'll gain: Computer Vision, Image Analysis, Deep Learning, Artificial Neural Networks, Applied Machine Learning, Artificial Intelligence, Network Architecture, Machine Learning, Data Processing, Algorithms
Cisco Learning and Certifications
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Cyber Threat Intelligence, Threat Detection, General Networking, Network Security, Cybersecurity, Cyber Security Policies, Infrastructure Security, Computer Networking, Technical Services, Technical Support and Services
Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Threat Detection, Cyber Threat Hunting, Intrusion Detection and Prevention, Threat Management, Incident Response, Event Monitoring, Computer Security Incident Management, Network Analysis, Cybersecurity, Anomaly Detection, Network Security, Network Monitoring, Network Protocols, SQL
Skills you'll gain: ChatGPT, Generative AI, Artificial Intelligence, Data Ethics, OpenAI, Artificial Intelligence and Machine Learning (AI/ML), Deep Learning, Artificial Neural Networks, Application Deployment, IBM Cloud, Governance, Machine Learning, Business Transformation, Ethical Standards And Conduct, Computer Vision, Self Service Technologies, Information Architecture, Business Process Automation, Software Development Tools, Image Analysis
Cisco Learning and Certifications
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Malware Protection, Network Monitoring, Network Administration, TCP/IP, Network Infrastructure, Infrastructure Security, Intrusion Detection and Prevention, Network Protocols, Load Balancing, Firewall, Cybersecurity, General Networking, Authorization (Computing), Web Applications, Security Controls, Web Servers, Authentications
Duke University
Skills you'll gain: Presentations, Data Storytelling, Data Presentation, Database Design, MySQL, Relational Databases, SQL, Data Visualization, Business Analytics, Business Metrics, Data Visualization Software, Business Process Improvement, Business Intelligence, Tableau Software, Financial Modeling, Microsoft Excel, Excel Formulas, Business Process, Probability Distribution, Business Risk Management
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Computer Security Incident Management, Cyber Threat Intelligence, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Continuous Monitoring, System Monitoring, Network Analysis, Virtual Machines, Network Security, Information Systems Security, Network Monitoring, NIST 800-53, Applied Machine Learning, Machine Learning Algorithms
In summary, here are 10 of our most popular threat detection techniques courses
- Association Rules Analysis:Â University of Colorado Boulder
- Machine Learning - Anomaly Detection via PyCaret:Â Coursera Project Network
- Improving Deep Neural Networks: Hyperparameter Tuning, Regularization and Optimization:Â DeepLearning.AI
- Introduction to the Threat Intelligence Lifecycle :Â IBM
- Threat Investigation:Â Cisco Learning and Certifications
- Convolutional Neural Networks:Â DeepLearning.AI
- Threat Response:Â Cisco Learning and Certifications
- Threat Analysis:Â Cisco Learning and Certifications
- AI Foundations for Everyone:Â IBM
- Network Security:Â Cisco Learning and Certifications