Filter by
The language used throughout the course, in both instruction and assessments.
Results for "fraud+detection+techniques"
Skills you'll gain: Incident Response, Business Continuity Planning, Continuous Monitoring, Disaster Recovery, Threat Management, Risk Analysis, Risk Mitigation, Vulnerability Scanning, Security Information and Event Management (SIEM), Vulnerability Assessments, Investigation, Penetration Testing
University of Washington
Skills you'll gain: Classification And Regression Tree (CART), Applied Machine Learning, Supervised Learning, Predictive Modeling, Text Mining, Machine Learning Algorithms, Feature Engineering, Data Cleansing, Scalability, Machine Learning, Natural Language Processing, Real Time Data, Probability & Statistics, Algorithms
- Status: Free
Skills you'll gain: Web Scraping, Robotic Process Automation, Email Security, Automation, Business Process Automation, IT Automation, Data Import/Export, Unstructured Data, Spreadsheet Software
Infosec
Skills you'll gain: File Systems, Criminal Investigation and Forensics, Microsoft Windows, Cybersecurity, TCP/IP, Network Protocols, Information Systems Security, File Management, Operating Systems, Data Structures, Data Ethics, General Networking, Data Validation, Record Keeping, Data Storage Technologies, Data Integrity, Data Analysis Software, User Accounts, USB, Systems Analysis
Skills you'll gain: Feature Engineering, Big Data, Anomaly Detection, Google Cloud Platform, Unsupervised Learning, Applied Machine Learning, Decision Tree Learning, Supervised Learning, Predictive Modeling, Predictive Analytics
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
Queen Mary University of London
Skills you'll gain: Qualitative Research, Research Methodologies, Data Collection, Focus Group, Business Research, Market Research, Research Design, Sample Size Determination, Survey Creation, Interviewing Skills, Market Analysis, Consumer Behaviour
EC-Council
Skills you'll gain: Malware Protection, Cybersecurity, Data Security, Cyber Attacks, Threat Detection, Computer Security Awareness Training, Network Security, Cyber Threat Intelligence, Data Integrity, Incident Response, Network Analysis, Microsoft Windows, Mac OS, Linux Commands, Linux, Operating Systems, Web Applications, File Systems, Web Servers
University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Threat Detection, Data Sharing
Google Cloud
Skills you'll gain: Cyber Operations, Security Management, Continuous Monitoring, Cybersecurity, Cyber Security Strategy, Threat Management, DevOps, Threat Detection, Cyber Security Assessment, Incident Response, Site Reliability Engineering, Digital Transformation, Agile Methodology, Automation
Coursera Project Network
Skills you'll gain: Generative AI, Keras (Neural Network Library), Tensorflow, Deep Learning, Dimensionality Reduction, Exploratory Data Analysis, Applied Machine Learning, Anomaly Detection, Data Processing, Data Visualization, Data Synthesis, Machine Learning
In summary, here are 10 of our most popular fraud+detection+techniques courses
- Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery : ISC2
- Machine Learning: Classification: University of Washington
- Automation Techniques in RPA: UiPath
- Computer Forensics: Infosec
- Fraud Detection on Financial Transactions with Machine Learning on Google Cloud: Google Cloud
- Introduction to Applied Cryptography: University of Colorado System
- Detecting and Mitigating Cyber Threats and Attacks: University of Colorado System
- Research Methodologies: Queen Mary University of London
- Digital Forensics Essentials (DFE): EC-Council
- Proactive Computer Security: University of Colorado System