Threat Detection

Threat Detection is the process of identifying and mitigating potential threats in digital environments to protect an organization's information and systems. Coursera's threat detection catalogue educates you about the techniques and tools used to detect and analyze threats, giving you the necessary knowledge to assess and manage risks. You'll learn how to identify suspicious activities, understand the nature and behavior of various threats, and develop effective strategies for threat response and recovery. This crucial skill set will enable you to fortify network security, respond to cyber incidents and breaches, while also understanding the regulatory and ethical implications of threat detection.
58credentials
271courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Build job-relevant skills in under 2 hours with hands-on tutorials.
Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "threat detection"

  • Status: New
    Status: Preview

    Skills you'll gain: Network Security, Network Planning And Design, VPN Clients, Virtual Private Networks (VPN), Cyber Security Strategy, Network Architecture, Firewall, Security Controls, Network Monitoring, Intrusion Detection and Prevention, Virtual Local Area Network (VLAN), Threat Management, Threat Detection, Continuous Monitoring, Authentications, Wireless Networks, Authorization (Computing), Identity and Access Management, Encryption, Incident Response

  • Status: New
    Status: Free Trial

    Skills you'll gain: MITRE ATT&CK Framework, Kubernetes, Incident Response, Threat Detection, Intrusion Detection and Prevention, DevSecOps, Continuous Monitoring, Security Engineering, Security Controls, Infrastructure Security, Event Monitoring, System Monitoring, Containerization, Anomaly Detection, Docker (Software)

  • Status: Free Trial

    Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, Patch Management, Amazon CloudWatch, Infrastructure Security, Threat Detection, Amazon S3, Vulnerability Scanning, Data Security, Cloud Security, Network Security, Threat Management, Incident Response, Data Governance, Authorization (Computing), Continuous Monitoring, Cyber Governance, Firewall, Vulnerability Assessments

  • Status: New
    Status: Preview

    Skills you'll gain: Responsible AI, LLM Application, Threat Detection, Endpoint Detection and Response, Threat Modeling, Cyber Threat Intelligence, Cyber Threat Hunting, Generative AI Agents, Threat Management, Incident Response, Cyber Governance, Cyber Security Strategy, Data Ethics, Cyber Operations, Risking, Cybersecurity, Large Language Modeling, Cyber Security Assessment, Risk Mitigation, Technology Strategies

  • Status: Free Trial

    Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Cryptography

  • Status: New
    Status: Preview

    Coursera Instructor Network

    Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), DevSecOps, Secure Coding, Application Security, Threat Detection, Security Testing, Security Engineering, Continuous Delivery, Continuous Integration, Vulnerability Assessments, CI/CD, DevOps, Vulnerability Scanning

  • Status: New
    Status: Free Trial

    Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, Kubernetes, Threat Management, Cloud-Native Computing, Public Key Infrastructure, Infrastructure Security, Threat Detection, Application Security, Cloud Security, Vulnerability Assessments, Cloud Applications

  • Status: New
    Status: Free Trial

    Skills you'll gain: Anomaly Detection, Cyber Security Strategy, Cyber Threat Intelligence, Threat Detection, Intrusion Detection and Prevention, Fraud detection, Cybersecurity, Applied Machine Learning, Malware Protection, Threat Modeling, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, Machine Learning Methods, Network Analysis, Machine Learning, Machine Learning Algorithms, Artificial Neural Networks, MLOps (Machine Learning Operations), Data-Driven Decision-Making

  • Status: Free Trial

    Skills you'll gain: Splunk, Security Information and Event Management (SIEM), Data Modeling, Role-Based Access Control (RBAC), System Monitoring, Dashboard, Incident Response, Threat Detection, User Accounts, Data Transformation, Cybersecurity, Machine Learning, Systems Administration, Performance Tuning, Data Visualization, Event Monitoring, Continuous Monitoring, Data Manipulation, Data Analysis, Statistical Analysis

  • Status: Free Trial

    Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Management, Security Information and Event Management (SIEM), Data Integrity, Technical Communication

  • Status: New
    Status: Free Trial

    Skills you'll gain: Threat Modeling, Security Testing, Security Engineering, Cybersecurity, Data Security, Blockchain, Threat Detection, Cryptography, Network Security, Security Strategy, Exploit development, Vulnerability Assessments, Transaction Processing, Regulation and Legal Compliance

  • Status: Free Trial

    Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Cybersecurity, Cyber Threat Hunting, Continuous Monitoring, Network Security, Network Monitoring, Document Management, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols

Most popular

Trending now

New releases

What brings you to Coursera today?

Leading partners

  • Google Cloud
  • Packt
  • Pearson
  • LearnQuest
  • Infosec
  • IBM
  • Macquarie University
  • Microsoft