Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "intrusion detection systems (ids)"
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Data Quality, Data Security, Technical Communication, Automation, Requirements Analysis, Machine Learning
Johns Hopkins University
Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Email Security, Threat Detection, Jupyter, Authentications, Machine Learning Algorithms, Artificial Intelligence, Multi-Factor Authentication, Threat Management, Artificial Intelligence and Machine Learning (AI/ML), Machine Learning
Meta
Skills you'll gain: Version Control, Unix Commands, Git (Version Control System), GitHub, Linux Commands, Command-Line Interface, Software Versioning, File Management, Software Development Tools, Software Development, Software Configuration Management
- Status: Free
American Museum of Natural History
Skills you'll gain: Environment, Systems Thinking, Natural Resource Management, Environmental Issue, Environment and Resource Management, Life Sciences, Social Studies, Mathematical Modeling, Scientific Methods
- Status: Free
MathWorks
Skills you'll gain: Systems Engineering, Systems Architecture, Systems Design, Functional Design, Software Architecture, Solution Architecture, Requirements Analysis, Technical Communication
Skills you'll gain: Encryption, Identity and Access Management, Public Key Infrastructure, Endpoint Security, Cryptography, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Cryptographic Protocols, Data Security, Email Security, Computer Security Awareness Training, Advanced Encryption Standard (AES), Security Awareness, Key Management, Secure Coding, Technical Support and Services, Information Technology, Cyber Security Strategy
University of California, Irvine
Skills you'll gain: Embedded Software, Embedded Systems, Debugging, C (Programming Language), Integrated Development Environments, Program Development, Development Environment, Computer Hardware, Computer Programming, Digital Communications, Open Source Technology
Duke University
Skills you'll gain: Debugging, Maintainability, Programming Principles, Algorithms, Software Testing, Program Development, C (Programming Language), Pseudocode, Computational Thinking, Software Engineering, Simulations, System Programming, Data Structures, Software Development, Computer Programming, Command-Line Interface, Development Environment, Development Testing, User Interface (UI), Interactive Design
- Status: Free
Skills you'll gain: Incident Response, Intrusion Detection and Prevention, Computer Security Incident Management, Incident Management, Threat Detection, Endpoint Detection and Response, Security Information and Event Management (SIEM), IT Automation, Automation, Event Monitoring, Cyber Threat Hunting, Cyber Threat Intelligence, Continuous Monitoring, System Monitoring, Security Management, Anomaly Detection, Cybersecurity, Security Controls, Interactive Data Visualization, Artificial Intelligence and Machine Learning (AI/ML)
University of Colorado System
Skills you'll gain: Risk Management Framework, Infrastructure Security, Cyber Security Policies, Continuous Monitoring, Security Management, Cyber Governance, Cybersecurity, Cyber Security Strategy, Security Strategy, Cyber Risk
University of Colorado Boulder
Skills you'll gain: Process Control, Embedded Systems, Electronic Hardware, Embedded Software, Machine Controls, Hardware Design, Manufacturing Processes, Basic Electrical Systems, PIC Microcontrollers, Electrical Engineering, Electronic Components, Power Electronics, Three-Phase, Electronic Systems, Torque (Physics), Thermal Management, Mechanical Engineering, Semiconductors, Electrical Wiring, Research Methodologies
Stanford University
Skills you'll gain: Pharmaceuticals, Health Systems, Healthcare Industry Knowledge, Health Care, Health Care Administration, Health Care Procedure and Regulation, Medicare, Quality Improvement, Quality Assessment, Performance Measurement, Regulatory Affairs, Payment Systems, Financial Systems, Insurance, Billing Systems, Business Ethics, Ethical Standards And Conduct
Searches related to intrusion detection systems (ids)
In summary, here are 10 of our most popular intrusion detection systems (ids) courses
- Introduction to the Threat Intelligence Lifecycle : IBM
- Introduction to AI for Cybersecurity: Johns Hopkins University
- Version Control: Meta
- Ecology: Ecosystem Dynamics and Conservation: American Museum of Natural History
- Systems Engineering: MathWorks
- Cybersecurity Fundamentals: IBM
- The Arduino Platform and C Programming: University of California, Irvine
- Introductory C Programming: Duke University
- Automated Cyber Security Incident Response: EDUCBA
- Cybersecurity Policy for Water and Electricity Infrastructures: University of Colorado System