Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat (computer)"
- Status: Free Trial
Imperial College London
Skills you'll gain: Mathematical Modeling, Epidemiology, Infectious Diseases, Statistical Modeling, R Programming, Differential Equations, Statistical Methods, Public Health
Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, Application Security, Software Development Life Cycle, DevSecOps, Security Testing, Secure Coding, Security Engineering, Cloud Security, Encryption, Vulnerability Scanning, Software Development, Threat Detection, Cryptography, Software Testing, CI/CD, Cloud Platforms, Vulnerability Assessments, Security Controls, Configuration Management
- Status: Preview
University of Illinois Urbana-Champaign
Skills you'll gain: Automation, Artificial Intelligence, Cloud Infrastructure, Analytics, Logistics
- Status: Free Trial
Skills you'll gain: Incident Response, Computer Security Incident Management, Open Web Application Security Project (OWASP), Cyber Threat Intelligence, Application Security, Secure Coding, Cloud Security, Cybersecurity, Vulnerability Assessments, Cyber Attacks, Information Systems Security, Security Engineering, Security Strategy, Intrusion Detection and Prevention, Infrastructure Security, Security Testing, Hardening, Penetration Testing, Mobile Security, Vulnerability Management
- Status: Free Trial
Coursera Instructor Network
Skills you'll gain: Data Warehousing, Extract, Transform, Load, Snowflake Schema, Star Schema, Business Intelligence, Data Modeling, Database Design, Data Management, Data Integration, Performance Tuning, Databases, Data Transformation, Scalability
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Threat Management, Threat Detection, Cyber Security Policies, Intrusion Detection and Prevention, Network Troubleshooting, Firewall, Security Management, Infrastructure Security, Network Administration, System Configuration, Software Installation, System Implementation
- Status: Free Trial
Illinois Tech
Skills you'll gain: Regression Analysis, R Programming, Statistical Inference, Data Analysis, Statistical Analysis, Predictive Modeling, Probability & Statistics, Linear Algebra
Coursera Project Network
Skills you'll gain: Command-Line Interface, Linux Commands, Linux, Unix Commands, File Management, Linux Administration, File Systems
- Status: Preview
Skills you'll gain: MLOps (Machine Learning Operations), Generative AI, Continuous Monitoring, Google Cloud Platform, Predictive Modeling, Verification And Validation, System Monitoring, Machine Learning, Data Validation, A/B Testing, Data Quality
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Environmental Policy, Energy and Utilities, Environment, International Relations, Environmental Regulations, Policy Analysis, Policy Development, Governance, Environmental Science, Forecasting, Mitigation, Emerging Technologies, Innovation
- Status: Preview
Starweaver
Skills you'll gain: Threat Modeling, Vulnerability Management, Cybersecurity, Cyber Security Strategy, Threat Detection, Intrusion Detection and Prevention, Network Security, Hardening, Patch Management, Continuous Monitoring
- Status: Free Trial
Skills you'll gain: Feature Engineering, Data Ethics, Unsupervised Learning, Dimensionality Reduction, Text Mining, Applied Machine Learning, Data Transformation, Anomaly Detection, Exploratory Data Analysis, Unstructured Data, Data Cleansing, Data Modeling, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning, Scikit Learn (Machine Learning Library), Natural Language Processing, Data Science, Quality Assurance, Data Validation, Python Programming
In summary, here are 10 of our most popular threat (computer) courses
- Interventions and Calibration: Imperial College London
- Fundamentals of Secure Software: Packt
- Advanced Topics in Artificial Intelligence: University of Illinois Urbana-Champaign
- Advanced Security Strategies and Incident Response: Packt
- Data Warehousing: Schema, ETL, Optimal Performance: Coursera Instructor Network
- Check Point Jump Start: Quantum Management: Check Point Software Technologies Ltd.
- Linear Regression: Illinois Tech
- Linux: File Management for Devops: Coursera Project Network
- Machine Learning Operations (MLOps) with Vertex AI: Model Evaluation - Français: Google Cloud
- Global Climate Change Policies and Analysis : University of Colorado Boulder