Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "intrusion detection systems (ids)"
University of Colorado System
Skills you'll gain: Firewall, Network Security, Intrusion Detection and Prevention, Information Systems Security, Security Controls, Threat Detection, Linux Administration, Linux
Skills you'll gain: Dashboard, Data Storytelling, Data Warehousing, SQL, Data Presentation, Data Governance, Data Security, Data Migration, Database Design, Data Visualization, Interactive Data Visualization, Descriptive Statistics, Data Mining, Cloud Storage, Data Visualization Software, Extract, Transform, Load, IBM DB2, Data Management, MySQL, Excel Formulas
University of California, Irvine
Skills you'll gain: Systems Development Life Cycle, Agile Methodology, Productivity Software, Network Security, Computer Hardware, Hardware Architecture, Computer Systems, Data Security, Systems Design, Systems Development, Risk Management, System Design and Implementation, TCP/IP, Information Technology, Software Development Methodologies, Networking Hardware, Data Ethics, Cybersecurity, General Networking, Safety and Security
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Cryptography, Security Engineering, Threat Modeling, Authorization (Computing), Encryption, Email Security, Data Integrity, Authentications, Verification And Validation
Edureka
Skills you'll gain: Incident Management, Cybersecurity, Intrusion Detection and Prevention, Infrastructure Security, Cyber Attacks, Threat Modeling, Incident Response, Security Controls, Threat Detection, Network Security, Network Architecture, Network Protocols
Skills you'll gain: Cloud Computing, Linux, Linux Servers, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Security Controls, Virtual Machines, Firewall, Virtualization, User Accounts
- Status: Free
UNSW Sydney (The University of New South Wales)
Skills you'll gain: Systems Engineering, Engineering Management, Conceptual Design, Systems Design, Requirements Analysis, Systems Development Life Cycle, Requirements Elicitation, Systems Architecture, Systems Integration, System Design and Implementation, Technical Design, Configuration Management, Prototyping, Verification And Validation
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
Johns Hopkins University
Skills you'll gain: Rmarkdown, Exploratory Data Analysis, Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Data Visualization, Statistical Programming, Ggplot2, Dimensionality Reduction, Data Visualization Software, Data Integration, Knitr, Data Analysis, Data Import/Export, General Science and Research, Data Sharing, Statistical Reporting
- Status: Free
Coursera Instructor Network
Skills you'll gain: Generative AI, Regulatory Compliance, Regulatory Requirements, Compliance Management, Governance, Governance Risk Management and Compliance, Risk Management, Financial Regulation, Anomaly Detection, Artificial Intelligence, Threat Detection, Artificial Intelligence and Machine Learning (AI/ML), Predictive Analytics
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
University of Minnesota
Skills you'll gain: Enterprise Resource Planning, Business Systems Analysis, Systems Analysis, Requirements Analysis, Cybersecurity, Business Requirements, Business Systems, Cyber Threat Intelligence, Cloud Computing, Cloud Services, IT Management, Change Management, Business Technologies, Organizational Change, Technology Strategies, System Implementation, User Requirements Documents, Information Technology, Portfolio Management, Governance
Searches related to intrusion detection systems (ids)
In summary, here are 10 of our most popular intrusion detection systems (ids) courses
- Secure Networked System with Firewall and IDS: University of Colorado System
- IBM Data Management: IBM
- Introduction to Computer Information Systems: University of California, Irvine
- Design and Analyze Secure Networked Systems: University of Colorado System
- Industrial Cybersecurity: Edureka
- Operating Systems: Overview, Administration, and Security: IBM
- Introduction to Systems Engineering: UNSW Sydney (The University of New South Wales)
- Introduction to Cybersecurity Tools & Cyberattacks: IBM
- Data Science: Foundations using R: Johns Hopkins University
- GenAI for Fraud Detection and Compliance: Coursera Instructor Network