Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat detection techniques"
National Taiwan University
Skills you'll gain: Operations Research, Network Model, Statistical Machine Learning, Applied Mathematics, Mathematical Modeling, Machine Learning, Transportation Operations, Business Analytics, Process Optimization, Advanced Mathematics, Linear Algebra, Algorithms
- Status: Preview
Skills you'll gain: Threat Modeling, Cyber Governance, Cybersecurity, Cyber Security Policies, Cryptography, Network Security, Cyber Risk, Cyber Attacks, Cyber Security Strategy, Threat Detection, Vulnerability Assessments, Incident Response
- Status: Free Trial
University of Michigan
Skills you'll gain: Writing and Editing, Editing, Writing, Organizational Skills, Productivity, Time Management, Content Creation, Lifelong Learning, Professional Development, Critical Thinking, Creativity
- Status: Free Trial
University of Michigan
Skills you'll gain: Qualitative Research, User Research, Usability Testing, User Centered Design, Research Methodologies, Needs Assessment, Interviewing Skills, Research, Human Computer Interaction, Data Collection
- Status: Free Trial
University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authentications, Key Management, Data Security, Cloud Applications, Cloud Services, Application Security, Authorization (Computing), Cyber Risk, Secure Coding, Cloud Storage, Personally Identifiable Information, DevSecOps, General Data Protection Regulation (GDPR), Network Security, Cloud Computing, Cybersecurity, Threat Management, Cryptography
- Status: NewStatus: Free Trial
Skills you'll gain: User Story, Requirements Elicitation, Requirements Management, Business Requirements, User Requirements Documents, Requirements Analysis, Verification And Validation, SAP Applications, Functional Specification, User Acceptance Testing (UAT), Stakeholder Engagement, Process Mapping
- Status: Free Trial
Skills you'll gain: Data Wrangling, Exploratory Data Analysis, Data Analysis, Data Transformation, R Programming, Data Manipulation, Data Visualization, Box Plots, Predictive Analytics, Statistical Analysis, Data Science, Regression Analysis, Statistical Modeling, Correlation Analysis, Data Cleansing, Tidyverse (R Package), Supervised Learning
- Status: Free Trial
Skills you'll gain: Identity and Access Management, Business Continuity, Network Security, Cryptography, AWS Identity and Access Management (IAM), Encryption, User Provisioning, Security Management, Penetration Testing, Vulnerability Scanning, ISO/IEC 27001, Threat Management, Network Performance Management, Information Systems Security, Network Architecture, DevSecOps, Cyber Operations, Data Management, Software Development Methodologies, Cybersecurity
- Status: Preview
Skills you'll gain: Requirements Management, Robotic Process Automation, Requirements Elicitation, Business Process Automation, Requirements Analysis, Business Requirements, Stakeholder Engagement, Business Analysis, Automation, Business Process, Process Analysis, Stakeholder Communications, Project Scoping, Process Mapping
- Status: Free Trial
Icahn School of Medicine at Mount Sinai
Skills you'll gain: Quantitative Research, Bioinformatics, Molecular Biology, Analytical Skills, Biochemistry, Laboratory Experience, Molecular, Cellular, and Microbiology, Systems Engineering, Life Sciences, Mathematical Modeling, Biology, Image Analysis, Laboratory Equipment
- Status: Free Trial
Michigan State University
Skills you'll gain: Photography, Peer Review, Photo Editing, Creativity, Content Creation, Storytelling, Writing
- Status: Free Trial
Northwestern University
Skills you'll gain: Mathematical Modeling, Machine Controls, Automation Engineering, Engineering Calculations, Applied Mathematics, Engineering Analysis, Mechanics, Computational Logic, Simulation and Simulation Software, Virtual Environment, Torque (Physics), Numerical Analysis, Trigonometry, Control Systems
In summary, here are 10 of our most popular threat detection techniques courses
- Operations Research (3): Theory:Â National Taiwan University
- Introduction to Automotive Cybersecurity & Vehicle Networks:Â Starweaver
- Writing and Editing: Structure and Organization:Â University of Michigan
- Understanding User Needs:Â University of Michigan
- Cybersecurity in the Cloud:Â University of Minnesota
- Requirements Gathering and Documentation:Â SAP
- Data Analysis with R:Â IBM
- CISSP Certified Information Systems Security Professional:Â Packt
- Automation Business Analysis - Concepts and Principles:Â UiPath
- Experimental Methods in Systems Biology:Â Icahn School of Medicine at Mount Sinai