• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Threat Detection Techniques

Results for "threat detection techniques"


  • Status: New
    New
    G

    Google Cloud

    Security Command Center: Identify and Prioritize Risks

    Skills you'll gain: Vulnerability Assessments, Threat Modeling, Threat Management, Risk Management Framework, Vulnerability Management, Cyber Risk, Security Management, Cyber Security Assessment, Simulations, Configuration Management, Cloud Security

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    G

    Google

    Sound the Alarm: Detection and Response

    Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Threat Detection, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Splunk, Network Analysis, Network Protocols, Technical Documentation, Query Languages

    4.8
    Rating, 4.8 out of 5 stars
    ·
    3.3K reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    IBM

    Penetration Testing, Threat Hunting, and Cryptography

    Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Open Web Application Security Project (OWASP), Vulnerability Assessments, Exploitation techniques, Test Planning

    4.6
    Rating, 4.6 out of 5 stars
    ·
    2.5K reviews

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    W

    Whizlabs

    Microsoft Security Solutions Capabilities

    Skills you'll gain: Security Controls, Continuous Monitoring, Authorization (Computing), Anomaly Detection

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Essentials for Forensics

    Skills you'll gain: Mobile Security, Anomaly Detection, Criminal Investigation and Forensics, Cyber Security Strategy, Cyber Threat Intelligence, Threat Detection, Investigation, Cyber Attacks, File Systems, Intrusion Detection and Prevention, Fraud detection, Mobile Development, Cybersecurity, Applied Machine Learning, Malware Protection, Cyber Security Policies, Apple iOS, Threat Modeling, Artificial Intelligence and Machine Learning (AI/ML), Data Security

    4.5
    Rating, 4.5 out of 5 stars
    ·
    24 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: New
    New
    P

    Packt

    AI & Cybersecurity Threats, Global Actors, and Trends

    Skills you'll gain: DevSecOps, Cyber Operations, Threat Modeling, AWS Identity and Access Management (IAM), Zero Trust Network Access, Encryption

    Intermediate · Course · 3 - 6 Months

  • Status: New
    New
    P

    Packt

    Incident Response for Windows

    Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Threat Modeling, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Microsoft Windows, Exploitation techniques, Data Loss Prevention, Cyber Security Strategy, Event Monitoring, Cyber Attacks, Cybersecurity, Cyber Security Policies, Network Security, Anomaly Detection, Cyber Risk, Information Technology

    Beginner · Course · 3 - 6 Months

  • I

    Infosec

    Cyber Threat Hunting

    Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Detection, Threat Management, Threat Modeling, MITRE ATT&CK Framework, Endpoint Detection and Response, Intrusion Detection and Prevention, Security Information and Event Management (SIEM), Anomaly Detection, Generative AI, Endpoint Security, Event Monitoring, System Monitoring, Network Analysis, Linux

    4.5
    Rating, 4.5 out of 5 stars
    ·
    131 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    N

    New York University

    Real-Time Cyber Threat Detection and Mitigation

    Skills you'll gain: Network Security, Firewall, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers

    4.7
    Rating, 4.7 out of 5 stars
    ·
    657 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    G

    Google

    Assets, Threats, and Vulnerabilities

    Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Cryptography

    4.8
    Rating, 4.8 out of 5 stars
    ·
    4K reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    G

    Google

    Introduction to Detection and Incident Response

    Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Threat Detection, Event Monitoring, Threat Management, Security Information and Event Management (SIEM), Security Management, Continuous Monitoring, Document Management, NIST 800-53

    Beginner · Course · 1 - 4 Weeks

  • Status: New
    New
    P

    Pearson

    Detection and Response with XDR

    Skills you'll gain: Endpoint Detection and Response, Threat Management, Cyber Operations, Security Management, Threat Detection, Information Technology Operations, Security Information and Event Management (SIEM), Cyber Threat Hunting, Incident Response, Automation, Data Integration

    Intermediate · Course · 1 - 4 Weeks

1234…376

In summary, here are 10 of our most popular threat detection techniques courses

  • Security Command Center: Identify and Prioritize Risks: Google Cloud
  • Sound the Alarm: Detection and Response: Google
  • Penetration Testing, Threat Hunting, and Cryptography: IBM
  • Microsoft Security Solutions Capabilities: Whizlabs
  • Cyber Security: Essentials for Forensics: Macquarie University
  • AI & Cybersecurity Threats, Global Actors, and Trends: Packt
  • Incident Response for Windows: Packt
  • Cyber Threat Hunting: Infosec
  • Real-Time Cyber Threat Detection and Mitigation: New York University
  • Assets, Threats, and Vulnerabilities: Google

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok