Filter by
The language used throughout the course, in both instruction and assessments.
Results for "intrusion prevention systems"
Skills you'll gain: Intrusion Detection and Prevention, Continuous Monitoring, Threat Management, Firewall, Incident Response, Network Security, Threat Detection, Network Monitoring, Infrastructure Security, Real Time Data
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Network Analysis, Document Management, Technical Documentation, Record Keeping
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Cybersecurity, Cyber Operations, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Security Information and Event Management (SIEM), Threat Detection, Cloud Security, Threat Management, System Monitoring, Automation
Skills you'll gain: Network Security, Intrusion Detection and Prevention, Hardening, TCP/IP, Cyber Attacks, Network Architecture, Computer Networking, Cloud Computing, Firewall, Network Infrastructure, Network Protocols, Virtual Private Networks (VPN)
Skills you'll gain: Cloud Computing, Linux, Linux Servers, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Security Controls, Virtual Machines, Firewall, Virtualization, User Accounts
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, DevOps, Data Security, Software Development Life Cycle, Encryption
- Status: [object Object]
Google
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Security Controls, Vulnerability Management, Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Vulnerability Assessments, Event Monitoring, Network Security, Security Awareness, Threat Detection, Risk Management, Cybersecurity, Hardening, Bash (Scripting Language), Data Ethics, Linux Commands, Debugging
University of Colorado Boulder
Skills you'll gain: Kinesiology, Physical Therapy, Behavioral Health, Health Assessment, Preventative Care, Blood Pressure, Respiration, Anatomy, Life Sciences, Stress Management, Vital Signs, Injury Prevention, Pharmaceuticals, Risk Analysis
Skills you'll gain: Computer Systems, Business Software, Operating Systems, Generative AI, Business Systems, Cybersecurity, Enterprise Security, Servers, Computer Hardware, Information Systems Security, Data Storage, Patch Management, Artificial Intelligence
Skills you'll gain: PyTorch (Machine Learning Library), Statistical Methods, Generative AI, Keras (Neural Network Library), Unsupervised Learning, Natural Language Processing, Jupyter, Reinforcement Learning, Deep Learning, Regression Analysis, Data Manipulation, Statistical Analysis, Tensorflow, Verification And Validation, Scikit Learn (Machine Learning Library), Python Programming, ChatGPT, Artificial Neural Networks, Data Processing, Machine Learning Algorithms
Multiple educators
Skills you'll gain: Unsupervised Learning, Supervised Learning, Artificial Intelligence and Machine Learning (AI/ML), Classification And Regression Tree (CART), Machine Learning Algorithms, Machine Learning, Jupyter, Applied Machine Learning, Data Ethics, Decision Tree Learning, Tensorflow, Scikit Learn (Machine Learning Library), NumPy, Predictive Modeling, Deep Learning, Artificial Intelligence, Reinforcement Learning, Random Forest Algorithm, Feature Engineering, Python Programming
Skills you'll gain: Git (Version Control System), GitHub, Version Control, Puppet (Configuration Management Tool), CI/CD, Containerization, Debugging, Bash (Scripting Language), Infrastructure as Code (IaC), Docker (Software), Continuous Deployment, Continuous Integration, Technical Communication, Network Troubleshooting, Linux Commands, Linux, Scripting, Automation, Python Programming, Computer Programming
In summary, here are 10 of our most popular intrusion prevention systems courses
- Next-Generation Firewalls and Intrusion Prevention: LearnQuest
- Sound the Alarm: Detection and Response: Google
- Detect, Respond, and Recover from Cloud Cybersecurity Attacks: Google Cloud
- Connect and Protect: Networks and Network Security: Google
- Operating Systems: Overview, Administration, and Security: IBM
- Application Security for Developers and DevOps Professionals: IBM
- Google Cybersecurity: Google
- Science of Exercise: University of Colorado Boulder
- Introduction to Computers and Operating Systems and Security: Microsoft
- IBM AI Engineering: IBM