Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat (computer)"
Skills you'll gain: Networking Hardware, General Networking, Wireless Networks, Network Architecture, Computer Networking, Network Protocols, Local Area Networks, TCP/IP, Network Security, Network Routers, Network Switches, Wide Area Networks, System Configuration, Servers
Skills you'll gain: Cloud Computing, Linux, Linux Servers, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Security Controls, Virtual Machines, Firewall, Virtualization, User Accounts
Skills you'll gain: Cyber Threat Hunting, Incident Response, Identity and Access Management, Cloud Computing, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Intrusion Detection and Prevention, Network Protocols, Threat Detection, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Skills you'll gain: ChatGPT, Generative AI, Cyber Threat Intelligence, Security Information and Event Management (SIEM), OpenAI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Artificial Intelligence, Natural Language Processing, IBM Cloud, Artificial Intelligence and Machine Learning (AI/ML), Anomaly Detection, Vulnerability Management, Software Development Tools, Augmented and Virtual Reality (AR/VR), Deep Learning, Image Analysis, Technical Communication
Skills you'll gain: ChatGPT, Generative AI, Artificial Intelligence, Data Ethics, Artificial Intelligence and Machine Learning (AI/ML), OpenAI, IBM Cloud, Private Cloud, Data Loss Prevention, Deep Learning, WordPress, Artificial Neural Networks, Cloud Services, Application Deployment, Governance, Machine Learning, Business Transformation, Ethical Standards And Conduct, Software Development Tools, Image Analysis
Duke University
Skills you'll gain: Programming Principles, Algorithms, Pseudocode, Computational Thinking, Computer Programming, Data Structures, Development Testing, Debugging
Skills you'll gain: Computer Hardware, Hardware Architecture, Data Storage Technologies, System Configuration, Computer Architecture, Operating Systems, Peripheral Devices
University of Michigan
Skills you'll gain: Programming Principles, Computer Programming, Python Programming, Computational Thinking, Software Installation, Development Environment
Multiple educators
Skills you'll gain: Network Security, Incident Response, Cloud Computing Architecture, Penetration Testing, Computer Security Incident Management, Cloud Services, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Cybersecurity, Configuration Management, Computing Platforms, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Security Awareness, Cloud Platforms, Encryption
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Record Keeping, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
Vanderbilt University
Skills you'll gain: ChatGPT, Ideation, Verification And Validation, Succession Planning, Business Writing, Generative AI, Leadership, Meeting Facilitation, Organizational Leadership, Creative Thinking, Creativity, Strategic Leadership, Artificial Intelligence, Business Leadership, Proposal Writing, Thought Leadership, Communication, Risk Management Framework, OpenAI, Natural Language Processing
- Status: Free
The University of Edinburgh
Skills you'll gain: Software Engineering, Program Development, Software Development, Programming Principles, Event-Driven Programming, Computer Programming, Debugging, Computational Thinking, Storyboarding, Algorithms, User Interface (UI) Design
In summary, here are 10 of our most popular threat (computer) courses
- Introduction to Contemporary Operating Systems and Hardware 1b: Illinois Tech
- Operating Systems: Overview, Administration, and Security: IBM
- IBM Cybersecurity Analyst: IBM
- IBM Generative AI for Cybersecurity Professionals: IBM
- AI Foundations for Everyone: IBM
- Programming Fundamentals: Duke University
- Introduction to Contemporary Operating Systems and Hardware 1a: Illinois Tech
- Programming for Everybody (Getting Started with Python): University of Michigan
- IBM and ISC2 Cybersecurity Specialist: IBM
- Sound the Alarm: Detection and Response: Google