• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Threat Detection
    Skip to search results

    Filter by

    Subject
    Required
     *

    Language
    Required
     *

    The language used throughout the course, in both instruction and assessments.

    Learning Product
    Required
     *

    Build job-relevant skills in under 2 hours with hands-on tutorials.
    Learn from top instructors with graded assignments, videos, and discussion forums.
    Learn a new tool or skill in an interactive, hands-on environment.
    Get in-depth knowledge of a subject by completing a series of courses and projects.
    Earn career credentials from industry leaders that demonstrate your expertise.
    Earn career credentials while taking courses that count towards your Master’s degree.
    Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.
    Earn a university-issued career credential in a flexible, interactive format.

    Level
    Required
     *

    Duration
    Required
     *

    Skills
    Required
     *

    Subtitles
    Required
     *

    Educator
    Required
     *

    Results for "threat detection"

    • Status: New
      New
      Status: Free Trial
      Free Trial
      P

      Pearson

      (SSCP) Systems Security Certified Practitioner: Unit 4

      Skills you'll gain: Vulnerability Management, Continuous Monitoring, System Monitoring, Vulnerability Scanning, Vulnerability Assessments, Event Monitoring, Threat Management, Security Information and Event Management (SIEM), Security Management, Threat Detection, Risk Management Framework, Incident Response, Cyber Risk, Anomaly Detection

      Beginner · Course · 1 - 4 Weeks

    • Status: New
      New
      Status: Free Trial
      Free Trial
      P

      Pearson

      Certified Kubernetes Security Specialist (CKS): Unit 7

      Skills you'll gain: MITRE ATT&CK Framework, Kubernetes, Incident Response, Threat Detection, Intrusion Detection and Prevention, DevSecOps, Continuous Monitoring, Security Engineering, Security Controls, Infrastructure Security, Event Monitoring, System Monitoring, Containerization, Anomaly Detection, Docker (Software)

      Intermediate · Course · 1 - 4 Weeks

    • Status: New
      New
      Status: Preview
      Preview
      S

      Starweaver

      Offensive Cyber Operations

      Skills you'll gain: MITRE ATT&CK Framework, Cyber Operations, Threat Modeling, Cyber Security Strategy, Cyber Threat Intelligence, Penetration Testing, Cybersecurity, Exploitation techniques, Threat Detection, Vulnerability Assessments, Human Factors (Security), Security Awareness, Security Testing, Network Security, Generative AI

      Intermediate · Course · 1 - 3 Months

    • Status: New
      New
      Status: Free Trial
      Free Trial
      L

      LearnKartS

      Information Security Foundations

      Skills you'll gain: Security Controls, Threat Management, Cybersecurity, Cyber Attacks, Public Key Infrastructure, Encryption, Threat Detection, Cryptography, Data Security, Continuous Monitoring, Security Management, Compliance Management, Zero Trust Network Access, Information Assurance, Vulnerability Management, Governance Risk Management and Compliance, Data Encryption Standard, Blockchain, Data Integrity

      Beginner · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      M

      Microsoft

      Advanced Cybersecurity Concepts and Capstone Project

      Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Threat Management, Cybersecurity, Cyber Security Strategy, Application Security, Threat Detection, Security Strategy, Microsoft Azure, Cloud Security, Internet Of Things, Secure Coding, Network Security, Security Controls, Vulnerability Assessments, Identity and Access Management, Asset Management

      4.7
      Rating, 4.7 out of 5 stars
      ·
      85 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: New
      New
      Status: Free Trial
      Free Trial
      P

      Pearson

      Certified Ethical Hacker (CEH): Unit 4

      Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Strategy, Threat Detection, Vulnerability Assessments, Firewall, Exploitation techniques, Human Factors (Security), Network Analysis

      Intermediate · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      N

      New York University

      Introduction to Cyber Attacks

      Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Threat Detection, Information Systems Security, Network Security, Computer Security, Exploitation techniques, Encryption

      4.7
      Rating, 4.7 out of 5 stars
      ·
      2.9K reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      I

      IBM

      Computer Networks and Network Security

      Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Information Systems Security, Intrusion Detection and Prevention, Endpoint Security, Network Infrastructure, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention

      4.7
      Rating, 4.7 out of 5 stars
      ·
      3.4K reviews

      Intermediate · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      U

      University at Buffalo

      Digital Manufacturing & Design Technology

      Skills you'll gain: Model Based Systems Engineering, Peer Review, Systems Engineering, Product Lifecycle Management, Intrusion Detection and Prevention, Security Controls, Performance Measurement, Control Systems, Anomaly Detection, Machine Controls, Incident Response, Digital Transformation, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Supply Chain Management, Manufacturing Processes, Data Sharing, Product Design, Manufacturing Operations

      4.6
      Rating, 4.6 out of 5 stars
      ·
      7K reviews

      Beginner · Specialization · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      I

      IBM

      Cybersecurity Fundamentals

      Skills you'll gain: Encryption, Identity and Access Management, Public Key Infrastructure, Endpoint Security, Cryptography, Network Security, Cybersecurity, Threat Detection, Endpoint Detection and Response, Data Security, Cryptographic Protocols, Cyber Attacks, Advanced Encryption Standard (AES), Secure Coding, Firewall, Information Technology, Computer Security Awareness Training, Cyber Security Strategy, Cyber Security Policies, Computer Security Incident Management

      4.8
      Rating, 4.8 out of 5 stars
      ·
      1.9K reviews

      Beginner · Specialization · 3 - 6 Months

    • Status: New
      New
      P

      Pearson

      CCNP and CCIE Security Core SCOR 350-701(Exam Blueprint 1.1)

      Skills you'll gain: Network Security, Endpoint Security, Cloud Security, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Identity and Access Management, Application Security, Information Systems Security, Infrastructure Security, Security Controls, Data Security, Malware Protection

      Intermediate · Course · 1 - 4 Weeks

    • Status: New
      New
      Status: Free Trial
      Free Trial
      P

      Pearson

      Certified Kubernetes Security Specialist (CKS): Unit 1

      Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, Kubernetes, Threat Management, Cloud-Native Computing, Public Key Infrastructure, Infrastructure Security, Threat Detection, Application Security, Cloud Security, Vulnerability Assessments, Cloud Applications

      Intermediate · Course · 1 - 4 Weeks

    Searches related to threat detection

    real-time cyber threat detection and mitigation
    aws: threat detection, logging and monitoring
    1…121314…74

    In summary, here are 10 of our most popular threat detection courses

    • (SSCP) Systems Security Certified Practitioner: Unit 4: Pearson
    • Certified Kubernetes Security Specialist (CKS): Unit 7: Pearson
    • Offensive Cyber Operations: Starweaver
    • Information Security Foundations: LearnKartS
    • Advanced Cybersecurity Concepts and Capstone Project: Microsoft
    • Certified Ethical Hacker (CEH): Unit 4: Pearson
    • Introduction to Cyber Attacks: New York University
    • Computer Networks and Network Security: IBM
    • Digital Manufacturing & Design Technology: University at Buffalo
    • Cybersecurity Fundamentals: IBM

    Other topics to explore

    Arts and Humanities
    338 courses
    Business
    1095 courses
    Computer Science
    668 courses
    Data Science
    425 courses
    Information Technology
    145 courses
    Health
    471 courses
    Math and Logic
    70 courses
    Personal Development
    137 courses
    Physical Science and Engineering
    413 courses
    Social Sciences
    401 courses
    Language Learning
    150 courses

    Coursera Footer

    Skills

    • Artificial Intelligence (AI)
    • Cybersecurity
    • Data Analytics
    • Digital Marketing
    • English Speaking
    • Generative AI (GenAI)
    • Microsoft Excel
    • Microsoft Power BI
    • Project Management
    • Python

    Certificates & Programs

    • Google Cybersecurity Certificate
    • Google Data Analytics Certificate
    • Google IT Support Certificate
    • Google Project Management Certificate
    • Google UX Design Certificate
    • IBM Data Analyst Certificate
    • IBM Data Science Certificate
    • Machine Learning Certificate
    • Microsoft Power BI Data Analyst Certificate
    • UI / UX Design Certificate

    Industries & Careers

    • Business
    • Computer Science
    • Data Science
    • Education & Teaching
    • Engineering
    • Finance
    • Healthcare
    • Human Resources (HR)
    • Information Technology (IT)
    • Marketing

    Career Resources

    • Career Aptitude Test
    • Examples of Strengths and Weaknesses for Job Interviews
    • High-Income Skills to Learn
    • How Does Cryptocurrency Work?
    • How to Highlight Duplicates in Google Sheets
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Preparing for the PMP Certification
    • Signs You Will Get the Job After an Interview
    • What Is Artificial Intelligence?

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • Share your Coursera learning story

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Manage Cookie Preferences
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok