Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "intrusion detection systems (ids)"
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Cybersecurity, Information Systems Security, Network Monitoring, Network Analysis
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Network Analysis, Document Management, Technical Documentation, Record Keeping
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
Vanderbilt University
Skills you'll gain: ChatGPT, Generative AI, Artificial Intelligence and Machine Learning (AI/ML), OpenAI, Artificial Intelligence, Business Process Automation, Automation, Strategic Thinking, Python Programming, Creative Thinking, Creativity, Business Intelligence, Value Propositions, Workflow Management, Software Design, Emerging Technologies, Innovation, Business Strategy, Natural Language Processing, Action Oriented
EDUCBA
Skills you'll gain: C (Programming Language), Embedded Systems, Embedded Software, Debugging, Systems Architecture, Microarchitecture, Computer Architecture, Data Structures, Computer Hardware, Peripheral Devices
Skills you'll gain: PyTorch (Machine Learning Library), Supervised Learning, Feature Engineering, Generative AI, Keras (Neural Network Library), Jupyter, Unsupervised Learning, Natural Language Processing, Reinforcement Learning, Deep Learning, Scikit Learn (Machine Learning Library), Machine Learning Algorithms, Data Manipulation, Tensorflow, Python Programming, Verification And Validation, Applied Machine Learning, ChatGPT, Artificial Neural Networks, Statistical Machine Learning
Skills you'll gain: Embedded Software, C (Programming Language), Embedded Systems, Debugging, Peripheral Devices, Integrated Development Environments, Computer Programming Tools, Development Environment, System Programming, Program Development, Hardware Architecture, Systems Architecture, Data Structures, Microarchitecture, Performance Tuning, Computer Architecture, C++ (Programming Language), Data Storage, Computational Logic, Computer Programming
- Status: [object Object]
Google
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Security Controls, Vulnerability Management, Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Vulnerability Assessments, Event Monitoring, Network Security, Security Awareness, Threat Detection, Risk Management, Cybersecurity, Hardening, Bash (Scripting Language), Data Ethics, Linux Commands, Debugging
Skills you'll gain: Unified Modeling Language, Systems Engineering, Software Systems, Systems Architecture, Systems Analysis, System Design and Implementation, Systems Integration, Interoperability, Solution Architecture, Requirements Analysis, Verification And Validation, Hardware Architecture
University of Colorado Boulder
Skills you'll gain: Software Configuration Management, Embedded Software, Embedded Systems, Git (Version Control System), Version Control, System Programming, Build Tools, Software Development Tools, C (Programming Language), Development Environment, Code Review, Computer Architecture, Debugging, Command-Line Interface
Skills you'll gain: Open Web Application Security Project (OWASP), Security Controls, Risk Management, Cybersecurity, Security Information and Event Management (SIEM), Incident Response, NIST 800-53, Cyber Security Policies, Cyber Risk, Safety Audits, Threat Detection, Compliance Auditing
Searches related to intrusion detection systems (ids)
In summary, here are 10 of our most popular intrusion detection systems (ids) courses
- Introduction to Intrusion Detection Systems (IDS): Johns Hopkins University
- IBM Cybersecurity Analyst: IBM
- Sound the Alarm: Detection and Response: Google
- IT Fundamentals for Cybersecurity: IBM
- AI Agents and Agentic AI in Python: Powered by Generative AI: Vanderbilt University
- Embedded Systems using C: EDUCBA
- IBM AI Engineering: IBM
- Embedded Software Development with C: EDUCBA
- Google Cybersecurity: Google
- Introduction to Model-Based Systems Engineering: Siemens