Filter by
The language used throughout the course, in both instruction and assessments.
Results for "fraud+detection+techniques"
Skills you'll gain: Incident Response, Email Security, Computer Security Incident Management, Threat Detection, Security Information and Event Management (SIEM), IT Automation, Google Cloud Platform
Northeastern University
Skills you'll gain: Data Mining, Exploratory Data Analysis, Dimensionality Reduction, Data Cleansing, Data Transformation, Text Mining, Data-Driven Decision-Making, Predictive Analytics, Forecasting, Big Data, Data Analysis, Classification And Regression Tree (CART), Supervised Learning, Statistical Analysis, Performance Testing, Data Visualization Software, Unsupervised Learning, Machine Learning, Regression Analysis
Skills you'll gain: Personally Identifiable Information, Information Technology Architecture, General Data Protection Regulation (GDPR), Information Privacy, Information Technology, Security Controls, Computer Security Awareness Training, Data Security, Emerging Technologies, Systems Development Life Cycle, Risk Management Framework, Enterprise Security, Disaster Recovery, Cloud Computing, Encryption, Authorization (Computing), Authentications, Artificial Intelligence
Skills you'll gain: Threat Detection, Threat Management, Cloud Security, Google Cloud Platform, Vulnerability Management, Vulnerability Assessments, Security Information and Event Management (SIEM), Public Cloud
Johns Hopkins University
Skills you'll gain: Deep Learning, Artificial Neural Networks, Reinforcement Learning, Generative AI, Unsupervised Learning, Data Ethics, Artificial Intelligence, Machine Learning, Markov Model, Natural Language Processing, Time Series Analysis and Forecasting
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Attacks, Security Management, Cybersecurity, Risk Management, Cyber Security Assessment, Incident Management, Risk Analysis, Cyber Governance, Threat Management, Secure Coding, Malware Protection, Cyber Risk, Governance, Security Strategy, Enterprise Risk Management (ERM), Intrusion Detection and Prevention, Cyber Threat Intelligence, Governance Risk Management and Compliance
Skills you'll gain: Remote Access Systems, Security Management, Computer Security Incident Management, Data Security, Cybersecurity, Security Controls, Security Strategy, Incident Response, Continuous Monitoring, End User Training and Support, Human Factors (Security), Security Awareness, General Data Protection Regulation (GDPR), System Implementation
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Vulnerability Assessments, Infrastructure Security, Distributed Denial-Of-Service (DDoS) Attacks, Application Security, Cloud Security, Network Security, Internet Of Things, Wireless Networks, Application Programming Interface (API), Business Logic
Skills you'll gain: Anomaly Detection, Image Analysis, Google Cloud Platform, Computer Vision, Data Import/Export, Applied Machine Learning, Quality Assurance, Predictive Modeling
Skills you'll gain: Hardware Troubleshooting, Information Systems Security, Malware Protection, Firewall, Security Controls, Data Security, Computer Security Awareness Training, Network Security, Cybersecurity, Technical Support, Encryption, Problem Management, Authorization (Computing), Data Integrity, Authentications
Kennesaw State University
Skills you'll gain: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Personally Identifiable Information, Threat Detection, Information Privacy, Safety and Security, Multi-Factor Authentication
Skills you'll gain: Cloud Security, Incident Response, Computer Security Incident Management, Threat Management, Threat Detection, Intrusion Detection and Prevention, Security Information and Event Management (SIEM), Application Security, Web Applications, Malware Protection, Network Monitoring
In summary, here are 10 of our most popular fraud+detection+techniques courses
- Automating Response to Phishing with Cortex XSOAR: Google Cloud
- Practical Engineering Data Mining: Techniques and Uses: Northeastern University
- Information Technology and Security Principles: Packt
- Detect and Investigate Threats with Security Command Center: Google Cloud
- Advanced Neural Network Techniques: Johns Hopkins University
- Incident Response, Risk Management, and Compliance: Packt
- Advanced Techniques for Implementing Security Services: LearnQuest
- Advanced Penetration Techniques: Packt
- Create a Cosmetic Anomaly Detection Model using Visual Inspection AI: Google Cloud
- Security and Troubleshooting Essentials: Packt