Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat detection"
Google Cloud
Skills you'll gain: Single Sign-On (SSO), Lightweight Directory Access Protocols, Security Assertion Markup Language (SAML), Authentications, Google Workspace, Application Security, OAuth, Cloud Security, Security Management, User Accounts, Identity and Access Management, Threat Detection, Multi-Factor Authentication, Application Programming Interface (API)
- Status: New
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Network Security, Threat Detection, Proxy Servers, Network Monitoring, Intrusion Detection and Prevention, Network Troubleshooting, Firewall, Google Cloud Platform, Identity and Access Management
Google Cloud
Skills you'll gain: Single Sign-On (SSO), Lightweight Directory Access Protocols, Google Workspace, Application Security, Cloud Security, Security Management, Application Programming Interface (API), Authentications, Threat Detection, Identity and Access Management, Multi-Factor Authentication, User Accounts
Skills you'll gain: Information Privacy, Google Cloud Platform, Data Security, Secure Coding, Personally Identifiable Information, Generative AI, Cloud Security, Artificial Intelligence, Threat Modeling, Data Loss Prevention, Safety and Security, Data Governance, Security Controls, Encryption, Key Management, Identity and Access Management
Skills you'll gain: Email Security, Data Loss Prevention, Google Workspace, Security Management, Threat Management, Malware Protection, Network Routing, Threat Detection
- Status: New
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Continuous Monitoring, Network Security, Network Monitoring, Proxy Servers, Intrusion Detection and Prevention, Threat Detection, Firewall, Google Cloud Platform, Infrastructure Security, Network Troubleshooting, Identity and Access Management
- Status: Free Trial
Microsoft
Skills you'll gain: Data Manipulation, Data Cleansing, Data Wrangling, Data Quality, Tidyverse (R Package), Data Transformation, R Programming, Text Mining, Data Validation, Generative AI, Data Analysis, Data Integrity, Anomaly Detection, Microsoft Copilot
University of London
Skills you'll gain: Key Management, Security Management, Human Factors (Security), Infrastructure Security, Information Privacy, Cyber Governance, Application Security, Network Security, Threat Modeling, Cryptography, OSI Models, Security Testing, Computer Security Incident Management, Cyber Security Policies, Intrusion Detection and Prevention, ISO/IEC 27001, Penetration Testing, Malware Protection, Data Collection, Data Analysis
BITS Pilani
Skills you'll gain: Relational Databases, User Research, Probability & Statistics, Data Storytelling, Bash (Scripting Language), Graph Theory, Object Oriented Design, Android Development, Operating Systems, Database Design, Bioinformatics, Feature Engineering, Threat Modeling, Algorithms, Version Control, Java Programming, Data Structures, Model View Controller, User Interface (UI) Design, Computational Logic
Imperial College London
Skills you'll gain: Data Ethics, Supervised Learning, Exploratory Data Analysis, Unsupervised Learning, Student Support and Services, PySpark, Data Pipelines, Linear Algebra, Ggplot2, Dimensionality Reduction, Student Services, Data Processing, Big Data, Agentic systems, Graphing, A/B Testing, Unstructured Data, Deep Learning, Bayesian Statistics, Applied Machine Learning
Universidad de los Andes
Skills you'll gain: Supervised Learning, Unsupervised Learning, Anomaly Detection, Dimensionality Reduction, Artificial Intelligence, Machine Learning, Regression Analysis, Probability & Statistics, Data Ethics, Image Analysis, Natural Language Processing, Computer Vision, Embedded Systems, Applied Machine Learning, Linear Algebra, Machine Learning Algorithms, Statistical Methods, Predictive Modeling, Bayesian Statistics, Ethical Standards And Conduct
West Virginia University
Skills you'll gain: Unified Modeling Language, Verification And Validation, Threat Modeling, Enterprise Architecture, Security Management, Secure Coding, Scope Management, Application Security, Financial Statements, Proposal Development, Cash Flows, Object Oriented Design, Requirements Analysis, Software Design, Security Requirements Analysis, Database Design, Software Visualization, Object Oriented Programming (OOP), Business Process Management, Mobile Development
Searches related to threat detection
In summary, here are 10 of our most popular threat detection courses
- Google Workspace Security - Português Brasileiro: Google Cloud
- Networking in Google Cloud: Network Security - Français: Google Cloud
- Google Workspace Security - Français: Google Cloud
- Responsible AI for Developers: Privacy & Safety - 日本語版: Google Cloud
- Google Workspace Mail Management - Português Brasileiro: Google Cloud
- Networking in Google Cloud: Network Security - 日本語版: Google Cloud
- Data Manipulation and Cleaning in R: Microsoft
- Master of Science in Cyber Security: University of London
- Bachelor of Science in Computer Science: BITS Pilani
- Master of Science in Machine Learning and Data Science: Imperial College London