Filter by
The language used throughout the course, in both instruction and assessments.
Results for "threat+(computer)"
Skills you'll gain: Network Security, Intrusion Detection and Prevention, Hardening, TCP/IP, Cyber Attacks, Network Architecture, Computer Networking, Cloud Computing, Firewall, Network Infrastructure, Network Protocols, Virtual Private Networks (VPN)
Microsoft
Skills you'll gain: Penetration Testing, Security Testing, System Testing, Vulnerability Management, Cloud Security, Cybersecurity, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Microsoft Azure, Firewall, Virtual Private Networks (VPN)
- Status: Free
Princeton University
Skills you'll gain: Programming Principles, Computer Programming, Object Oriented Programming (OOP), Performance Tuning, Data Structures, Java, Program Development, Computational Thinking, Computer Science, Algorithms, Debugging
Skills you'll gain: Cloud Computing Architecture, Cloud Services, Cloud Security, Cloud Infrastructure, Data Mining, Cloud Platforms, Cloud Computing, Artificial Intelligence, Generative AI, Data Ethics, OpenAI, Cloud Storage, Artificial Intelligence and Machine Learning (AI/ML), Infrastructure As A Service (IaaS), Big Data, Emerging Technologies, Data Analysis, Data Science, Deep Learning, Digital Transformation
Skills you'll gain: ChatGPT, Generative AI, Artificial Intelligence, Data Ethics, OpenAI, Artificial Intelligence and Machine Learning (AI/ML), Deep Learning, Artificial Neural Networks, Application Deployment, IBM Cloud, Governance, Machine Learning, Business Transformation, Ethical Standards And Conduct, Computer Vision, Self Service Technologies, Information Architecture, Business Process Automation, Software Development Tools, Image Analysis
- Status: Free
Stanford University
Skills you'll gain: Cryptography, Data Encryption Standard, Encryption, Key Management, Advanced Encryption Standard (AES), Public Key Cryptography Standards (PKCS), Cybersecurity, Authentications, Data Integrity, Mathematical Software, Algorithms
Skills you'll gain: Incident Response, Cyber Threat Hunting, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Computer Security Incident Management, Endpoint Security, Malware Protection, Linux, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Intrusion Detection and Prevention, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
University of Michigan
Skills you'll gain: Unified Modeling Language, JSON, Object Oriented Programming (OOP), Software Design, Debugging, Object Oriented Design, Data Processing, Unit Testing, Data Import/Export, Restful API, Python Programming, Image Analysis, Data Manipulation, Jupyter, Data Structures, Software Engineering, Application Programming Interface (API), Computer Programming, File Management, Functional Design
DeepLearning.AI
Skills you'll gain: Computer Vision, Image Analysis, Deep Learning, Artificial Neural Networks, Applied Machine Learning, Artificial Intelligence, Network Architecture, Machine Learning, Data Processing, Algorithms
- Status: Free
The University of Tokyo
Skills you'll gain: Visualization (Computer Graphics), Interactive Design, Computer Graphics, Graphical Tools, Computer Graphic Techniques, Graphics Software, Virtual Reality, Human Computer Interaction, User Interface (UI), Design, Technical Design, Algorithms, Simulations
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
University of Colorado System
Skills you'll gain: TCP/IP, Local Area Networks, Routing Protocols, Network Routing, Digital Communications, OSI Models, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Network Security, Network Planning And Design, Network Architecture, Network Performance Management, Computer Networking, Wireless Networks, Software-Defined Networking, Algorithms, System Programming, Application Programming Interface (API), Data Integrity, Virtualization
In summary, here are 10 of our most popular threat+(computer) courses
- Connect and Protect: Networks and Network Security: Google
- Cybersecurity Tools and Technologies: Microsoft
- Computer Science: Programming with a Purpose: Princeton University
- Key Technologies for Business: IBM
- AI Foundations for Everyone: IBM
- Cryptography I: Stanford University
- IBM Cybersecurity Analyst: IBM
- Python 3 Programming: University of Michigan
- Convolutional Neural Networks: DeepLearning.AI
- Interactive Computer Graphics: The University of Tokyo