Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "intrusion detection systems (ids)"
- Status: Free
The University of Edinburgh
Skills you'll gain: Life Sciences, Environment, Research, Physical Science, General Science and Research, Science and Research, Scientific Methods, Experimentation
Skills you'll gain: Image Analysis, Matlab, Computer Vision, Automation, Anomaly Detection, Spatial Data Analysis, Engineering Calculations, Spatial Analysis, 3D Modeling, Quantitative Research, Visualization (Computer Graphics), Data Analysis Software, Data Import/Export, Algorithms, Data Structures, Data Store
Kennesaw State University
Skills you'll gain: Quality Improvement, Lean Six Sigma, Lean Methodologies, Six Sigma Methodology, Process Improvement, Operational Excellence, Quality Management, Lean Manufacturing, Process Analysis, Business Process, Eight Disciplines Problem Solving (8D), Project Design, Root Cause Analysis, Customer Analysis
Microsoft
Skills you'll gain: Role-Based Access Control (RBAC), Azure Active Directory, Microsoft Azure, System Monitoring, Identity and Access Management, Cloud Security, Enterprise Security, Data Governance, Authorization (Computing), User Provisioning, Multi-Factor Authentication, Authentications
University of Colorado System
Skills you'll gain: TCP/IP, Local Area Networks, Routing Protocols, Network Routing, Digital Communications, OSI Models, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Network Security, Network Planning And Design, Network Architecture, General Networking, Network Performance Management, Computer Networking, Wireless Networks, Software-Defined Networking, Algorithms, System Programming, Data Integrity, Virtualization
Akamai Technologies, Inc.
Skills you'll gain: Linux, Linux Administration, File Systems, Linux Commands, Operating Systems, User Accounts, OS Process Management, File Management, Unix Shell, Bash (Scripting Language), Unix Commands, System Configuration, Authorization (Computing), Command-Line Interface, Open Source Technology, Systems Administration, Virtualization, Virtual Machines
Google Cloud
Skills you'll gain: Google Docs, Gmail, Google Sheets, Google Workspace, Presentations, Calendar Management, Spreadsheet Software, File Management, Excel Formulas, Productivity Software, Email Security, Document Management, Data Visualization, Excel Macros, Data Validation, Setting Appointments, Version Control, Meeting Facilitation, Sales Presentations, Collaboration
Microsoft
Skills you'll gain: Business Software, Computer Hardware, Hardware Architecture, Generative AI, Operating Systems, Data Storage Technologies, Computer Systems, Data Maintenance, Enterprise Security, System Software, Information Technology, OS Process Management, Data Storage, System Configuration, Microsoft Windows, Technical Support, Servers, Cybersecurity
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Computer Security, Network Architecture
Hebrew University of Jerusalem
Skills you'll gain: Computer Science, Computer Systems, Computer Programming, Programming Principles, System Programming, Virtual Machines, Operating Systems, Software Architecture, Algorithms, Computer Hardware, Object Oriented Programming (OOP), Computer Graphics
- Status: Free
Instituto Tecnológico de Aeronáutica
Skills you'll gain: Process Control, Systems Engineering, Systems Analysis, Engineering Analysis, Mathematical Modeling, Applied Mathematics, Automation, Differential Equations
University of Colorado Boulder
Skills you'll gain: Data Security, Cybersecurity, Cyber Attacks, Data Ethics, Authentications, Data Encryption Standard, Cryptography, Cyber Security Policies, Authorization (Computing), Security Controls, Data Integrity, Information Privacy, Security Awareness
Searches related to intrusion detection systems (ids)
In summary, here are 10 of our most popular intrusion detection systems (ids) courses
- Astrobiology and the Search for Extraterrestrial Life: The University of Edinburgh
- Image Processing for Engineering and Science: MathWorks
- Six Sigma and the Organization (Advanced): Kennesaw State University
- Identity Protection and Governance : Microsoft
- Computer Communications: University of Colorado System
- Operating Systems Fundamentals: Akamai Technologies, Inc.
- Getting started with Google Workspace: Google Cloud
- Introduction to Computers: Microsoft
- Introduction to Cyber Security: New York University
- Build a Modern Computer from First Principles: Nand to Tetris Part II (project-centered course): Hebrew University of Jerusalem