Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat mitigation techniques"
Skills you'll gain: Computer Networking, Network Troubleshooting, TCP/IP, General Networking, Routing Protocols, Network Protocols, Network Routing, Network Infrastructure, Dynamic Host Configuration Protocol (DHCP), Virtual Private Networks (VPN), Network Security, Wireless Networks, Data Integrity
Skills you'll gain: Supervised Learning, Feature Engineering, Jupyter, Unsupervised Learning, Scikit Learn (Machine Learning Library), Machine Learning Algorithms, Python Programming, Applied Machine Learning, Statistical Machine Learning, Predictive Modeling, Machine Learning, Dimensionality Reduction, Classification And Regression Tree (CART), Matplotlib, Regression Analysis, Random Forest Algorithm, Statistical Modeling, Data Manipulation
Duke University
Skills you'll gain: Data Storytelling, Database Design, Dashboard, MySQL, Relational Databases, SQL, Tableau Software, Business Analytics, Business Metrics, Data Visualization Software, Data Visualization, Business Process Improvement, Business Intelligence, Financial Modeling, Interactive Data Visualization, Microsoft Excel, Excel Formulas, Business Process, Probability Distribution, Business Risk Management
- Status: AI skills
Skills you'll gain: NoSQL, Data Warehousing, SQL, Apache Hadoop, Extract, Transform, Load, Apache Airflow, Web Scraping, Linux Commands, Database Design, IBM Cognos Analytics, MySQL, Apache Spark, Data Pipelines, Apache Kafka, Database Management, Bash (Scripting Language), Shell Script, Jupyter, Generative AI, Professional Networking
Skills you'll gain: MySQL, Database Design, Version Control, Database Management Systems, MySQL Workbench, Extract, Transform, Load, Stored Procedure, Data Modeling, Data Structures, SQL, Database Theory, Unix Commands, Relational Databases, Databases, Git (Version Control System), Object Oriented Programming (OOP), Database Management, Unit Testing, Algorithms, Django (Web Framework)
DeepLearning.AI
Skills you'll gain: Tensorflow, Deep Learning, Artificial Intelligence and Machine Learning (AI/ML), Performance Tuning, Machine Learning Methods, Artificial Neural Networks, Applied Machine Learning, Machine Learning, Supervised Learning, Machine Learning Algorithms, Network Architecture, Algorithms, Analysis, Debugging
Skills you'll gain: Site Reliability Engineering, Cloud Infrastructure, Kubernetes, Application Performance Management, Google Cloud Platform, System Monitoring, Infrastructure As A Service (IaaS), Application Deployment, Identity and Access Management, Cloud Applications, CI/CD, Containerization, Cloud Computing, Cloud Security, Cloud Management, Service Level Agreement, Continuous Delivery, Safety Culture, Network Monitoring, Continuous Integration
Skills you'll gain: ChatGPT, Generative AI, Cyber Threat Intelligence, Security Information and Event Management (SIEM), OpenAI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Artificial Intelligence, Natural Language Processing, IBM Cloud, Artificial Intelligence and Machine Learning (AI/ML), Anomaly Detection, Vulnerability Management, Software Development Tools, Augmented and Virtual Reality (AR/VR), Deep Learning, Image Analysis, Technical Communication
- Status: New
Skills you'll gain: Generative AI, Data Wrangling, Unit Testing, Supervised Learning, Feature Engineering, Keras (Neural Network Library), Deep Learning, ChatGPT, Natural Language Processing, Data Cleansing, Jupyter, Data Analysis, Unsupervised Learning, Data Manipulation, PyTorch (Machine Learning Library), Artificial Intelligence, Data Import/Export, Data Ethics, Exploratory Data Analysis, Scikit Learn (Machine Learning Library)
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Threat Management, Disaster Recovery, Endpoint Detection and Response, Cyber Threat Hunting, Cyber Operations, Cybersecurity, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Event Monitoring, Network Security, Network Monitoring, Data Security, Business Continuity, Network Analysis, Malware Protection
Skills you'll gain: Network Security, Information Systems Security, Cybersecurity, Encryption, Security Awareness, Data Security, Security Management, Information Assurance, Wireless Networks, Hardening, Firewall, Malware Protection, Authentications, Authorization (Computing), Technical Support, Multi-Factor Authentication, Generative AI
Skills you'll gain: Threat Modeling, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Personally Identifiable Information, Encryption
In summary, here are 10 of our most popular cyber threat mitigation techniques courses
- The Bits and Bytes of Computer Networking:Â Google
- Machine Learning with Python:Â IBM
- Excel to MySQL: Analytic Techniques for Business:Â Duke University
- IBM Data Engineering:Â IBM
- Meta Database Engineer:Â Meta
- Improving Deep Neural Networks: Hyperparameter Tuning, Regularization and Optimization:Â DeepLearning.AI
- Preparing for Google Cloud Certification: Cloud DevOps Engineer:Â Google Cloud
- IBM Generative AI for Cybersecurity Professionals:Â IBM
- IBM Generative AI Engineering:Â IBM
- Cyber Incident Response:Â Infosec