Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "support vector machine (svm) cybersecurity"
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Intelligence, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Cybersecurity, Cyber Security Strategy, Threat Management, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Applied Machine Learning, Network Analysis, Data Analysis
- Status: New
Skills you'll gain: Cyber Threat Hunting, Threat Detection, Incident Response, Cloud Security, Microsoft Azure, Security Information and Event Management (SIEM), Malware Protection, Endpoint Security, Multi-Cloud, Anomaly Detection, Email Security, Identity and Access Management, Automation
- Status: Free Trial
Skills you'll gain: Debugging, Python Programming, Cybersecurity, Cyber Security Assessment, Scripting, Programming Principles, Algorithms, Automation, Computer Programming, Integrated Development Environments, File Management, Data Structures
- Status: Free Trial
Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Cryptography
- Status: Preview
Microsoft
Skills you'll gain: Prompt Engineering, Microsoft Copilot, Cyber Threat Intelligence, Endpoint Detection and Response, Security Information and Event Management (SIEM), Cyber Threat Hunting, Security Software, Microsoft Azure, Security Controls, Cyber Security Assessment, Incident Response, Generative AI, Artificial Intelligence, Query Languages, Automation
- Status: Free Trial
Skills you'll gain: Cyber Threat Intelligence, Security Information and Event Management (SIEM), Threat Modeling, Generative AI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Prompt Engineering, Natural Language Processing, Anomaly Detection, Vulnerability Management, Artificial Intelligence
- Status: Free Trial
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Cybersecurity, Cyber Threat Hunting, Continuous Monitoring, Network Security, Network Monitoring, Document Management, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Computer Security Incident Management, Cybersecurity, Applied Machine Learning, Network Security, Machine Learning Algorithms, Machine Learning, Machine Learning Software, Unsupervised Learning, Supervised Learning, Artificial Neural Networks
- Status: Free Trial
Skills you'll gain: Encryption, Cybersecurity, Cyber Attacks, Threat Management, Security Strategy, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Risk Management Framework, Continuous Monitoring, Cyber Security Assessment, Security Controls, Information Privacy
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), TCP/IP, Intrusion Detection and Prevention, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Network Monitoring, Network Routing, Infrastructure Security, Application Security, Information Systems Security, Threat Modeling
- Status: Preview
Coursera Instructor Network
Skills you'll gain: Cybersecurity, Threat Management, Security Controls, Cyber Security Strategy, Threat Detection, Cyber Security Policies, Security Awareness, Computer Security Awareness Training, Cyber Risk, Data Security, Network Security, Security Management, Enterprise Security, Information Assurance, Incident Response, Data Integrity, Disaster Recovery
In summary, here are 10 of our most popular support vector machine (svm) cybersecurity courses
- Intrusion Detection:Â Johns Hopkins University
- SC-200 Microsoft Security Operations Analyst:Â Packt
- Automate Cybersecurity Tasks with Python:Â Google
- Assets, Threats, and Vulnerabilities:Â Google
- Microsoft Copilot for Security:Â Microsoft
- Generative AI: Boost Your Cybersecurity Career :Â IBM
- Sound the Alarm: Detection and Response:Â Google
- Machine Learning and Emerging Technologies in Cybersecurity:Â Johns Hopkins University
- Cybersecurity Threat Vectors and Mitigation:Â Microsoft
- The GRC Approach to Managing Cybersecurity:Â Kennesaw State University