• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Log In
Join for Free
  • Browse
  • Threat Detection

Results for "threat detection"


  • Status: Preview
    Preview
    S

    Stanford University

    Social and Economic Networks: Models and Analysis

    Skills you'll gain: Social Network Analysis, Network Analysis, Sociology, Socioeconomics, Economics, Policy, and Social Studies, Game Theory, Mathematical Modeling, Statistical Modeling, Markov Model, Bayesian Statistics, Probability

    4.8
    Rating, 4.8 out of 5 stars
    ·
    758 reviews

    Advanced · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    M

    Microsoft

    Introduction to Generative AI for Data Analysis

    Skills you'll gain: Prompt Engineering, Generative AI, Data Ethics, Data Cleansing, AI Product Strategy, Data Analysis, Responsible AI, Data Processing, Power BI, Exploratory Data Analysis, Anomaly Detection

    4.3
    Rating, 4.3 out of 5 stars
    ·
    80 reviews

    Intermediate · Course · 1 - 3 Months

  • I

    ISC2

    Systems and Application Security

    Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Encryption

    4.8
    Rating, 4.8 out of 5 stars
    ·
    29 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado Boulder

    Active Optical Devices

    Skills you'll gain: Display Devices, Semiconductors, Computer Displays, Systems Design, Electrical Engineering, Technical Design, Electronics Engineering, Electronic Systems, Electronics, Electronic Components, Equipment Design, Image Quality, Materials science, Technology Solutions, Engineering Calculations, Physics, Emerging Technologies, Engineering Analysis, Mathematical Modeling

    Build toward a degree

    3.9
    Rating, 3.9 out of 5 stars
    ·
    108 reviews

    Advanced · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Design and Analyze Secure Networked Systems

    Skills you'll gain: Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Security Controls, Key Management, Threat Modeling, Authorization (Computing), Encryption, Data Integrity, Authentications, Vulnerability Assessments

    3.9
    Rating, 3.9 out of 5 stars
    ·
    233 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    Imperial College London

    Immunology: Innate Immune System

    Skills you'll gain: Immunology, Infectious Diseases, Physiology, Microbiology, Molecular, Cellular, and Microbiology, Public Health and Disease Prevention, Environment, Biology, Research

    4.8
    Rating, 4.8 out of 5 stars
    ·
    148 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Cybersecurity and the X-Factor

    Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Human Factors (Security), Security Awareness, Cybersecurity, Computer Security Awareness Training, Cyber Risk, Cyber Attacks, Security Strategy, Employee Training, Insurance

    4.7
    Rating, 4.7 out of 5 stars
    ·
    260 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Preview
    Preview
    E

    Eindhoven University of Technology

    Process Mining: Data science in Action

    Skills you'll gain: Business Process, Process Analysis, Process Improvement, Business Process Management, Data Mining, Business Process Modeling, Process Optimization, Data Processing, Real Time Data, Data Science, Verification And Validation, Data Validation

    4.7
    Rating, 4.7 out of 5 stars
    ·
    1.3K reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University at Buffalo

    Cyber Security in Manufacturing

    Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Incident Response, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Cyber Security Assessment, Threat Detection, Information Assurance, Network Security, Risk Management Framework, Cloud Security, Authentications

    4.7
    Rating, 4.7 out of 5 stars
    ·
    658 reviews

    Beginner · Course · 1 - 4 Weeks

  • C

    Coursera

    Build Image Quality Inspection using AWS Lookout for Vision

    Skills you'll gain: Image Analysis, Amazon Web Services, Image Quality, Computer Vision, Anomaly Detection, Software Quality Assurance, Data Science, Machine Learning, Cloud Computing

    4.8
    Rating, 4.8 out of 5 stars
    ·
    20 reviews

    Beginner · Guided Project · Less Than 2 Hours

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Cybersecurity and Mobility

    Skills you'll gain: Cyber Security Strategy, Cybersecurity, Mobile Security, Cyber Threat Intelligence, Network Security, Internet Of Things, Cyber Governance, Data Security, Wireless Networks, Emerging Technologies, Business Technologies, Enterprise Application Management

    4.5
    Rating, 4.5 out of 5 stars
    ·
    638 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    K

    Kennesaw State University

    Cybersecurity Risk Management Frameworks

    Skills you'll gain: Risk Management, Cyber Governance, Cost Benefit Analysis, Security Management, Risk Management Framework, Vulnerability Management, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Operational Risk, Risk Analysis, Enterprise Risk Management (ERM), Business Risk Management, Risk Mitigation, Cyber Threat Intelligence, Vulnerability Assessments, ISO/IEC 27001, Threat Detection, Threat Modeling

    4.7
    Rating, 4.7 out of 5 stars
    ·
    198 reviews

    Beginner · Specialization · 3 - 6 Months

Searches related to threat detection

aws: threat detection, logging and monitoring
real-time cyber threat detection and mitigation
1…262728…82

In summary, here are 10 of our most popular threat detection courses

  • Social and Economic Networks: Models and Analysis: Stanford University
  • Introduction to Generative AI for Data Analysis: Microsoft
  • Systems and Application Security: ISC2
  • Active Optical Devices: University of Colorado Boulder
  • Design and Analyze Secure Networked Systems: University of Colorado System
  • Immunology: Innate Immune System: Imperial College London
  • Cybersecurity and the X-Factor: Kennesaw State University
  • Process Mining: Data science in Action: Eindhoven University of Technology
  • Cyber Security in Manufacturing : University at Buffalo
  • Build Image Quality Inspection using AWS Lookout for Vision: Coursera

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok