Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "support vector machine (svm) cybersecurity"
- Status: Preview
Skills you'll gain: Cybersecurity, Business Continuity, Threat Detection, Endpoint Security, Cyber Security Policies, Incident Response, Cyber Governance, Vulnerability Assessments, Network Security, Application Security, Cloud Security, Risk Management, Encryption, Authentications
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Intelligence, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Cybersecurity, Cyber Security Strategy, Threat Management, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Applied Machine Learning, Network Analysis, Data Analysis
- Status: Free Trial
Skills you'll gain: Debugging, Python Programming, Cybersecurity, Cyber Security Assessment, Scripting, Programming Principles, Algorithms, Automation, Computer Programming, Integrated Development Environments, File Management, Data Structures
- Status: New
Skills you'll gain: Cyber Threat Hunting, Threat Detection, Incident Response, Cloud Security, Microsoft Azure, Security Information and Event Management (SIEM), Malware Protection, Endpoint Security, Multi-Cloud, Anomaly Detection, Email Security, Identity and Access Management, Automation
- Status: Free Trial
Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Cryptography
- Status: Preview
Microsoft
Skills you'll gain: Prompt Engineering, Microsoft Copilot, Cyber Threat Intelligence, Endpoint Detection and Response, Security Information and Event Management (SIEM), Cyber Threat Hunting, Security Software, Microsoft Azure, Security Controls, Cyber Security Assessment, Incident Response, Generative AI, Artificial Intelligence, Query Languages, Automation
- Status: Free Trial
Skills you'll gain: Cyber Threat Intelligence, Security Information and Event Management (SIEM), Threat Modeling, Generative AI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Prompt Engineering, Natural Language Processing, Anomaly Detection, Vulnerability Management, Artificial Intelligence
- Status: Free Trial
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Cybersecurity, Cyber Threat Hunting, Continuous Monitoring, Network Security, Network Monitoring, Document Management, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Computer Security Incident Management, Cybersecurity, Applied Machine Learning, Network Security, Machine Learning Algorithms, Machine Learning, Machine Learning Software, Unsupervised Learning, Supervised Learning, Artificial Neural Networks
- Status: Free Trial
Skills you'll gain: Encryption, Cybersecurity, Cyber Attacks, Threat Management, Security Strategy, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Applied Machine Learning, Malware Protection, Cyber Threat Intelligence, Cyber Security Strategy, Threat Modeling, Artificial Intelligence and Machine Learning (AI/ML), Cybersecurity, Threat Detection, MLOps (Machine Learning Operations), Machine Learning, Network Security, Machine Learning Algorithms, Network Analysis, Artificial Intelligence, Data-Driven Decision-Making, Artificial Neural Networks
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Risk Management Framework, Continuous Monitoring, Cyber Security Assessment, Security Controls, Information Privacy
In summary, here are 10 of our most popular support vector machine (svm) cybersecurity courses
- Office of the CISO Institute: Cybersecurity Essentials: Google
- Intrusion Detection: Johns Hopkins University
- Automate Cybersecurity Tasks with Python: Google
- SC-200 Microsoft Security Operations Analyst: Packt
- Assets, Threats, and Vulnerabilities: Google
- Microsoft Copilot for Security: Microsoft
- Generative AI: Boost Your Cybersecurity Career : IBM
- Sound the Alarm: Detection and Response: Google
- Machine Learning and Emerging Technologies in Cybersecurity: Johns Hopkins University
- Cybersecurity Threat Vectors and Mitigation: Microsoft