Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "intrusion detection and prevention"
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
Skills you'll gain: Spreadsheet Software, Stakeholder Communications, Dashboard, Stakeholder Management, Data-Driven Decision-Making, Data Analysis, Analytical Skills, Data Presentation, Business Analysis, Quantitative Research, Systems Thinking
Stanford University
Skills you'll gain: Data Structures, Graph Theory, Algorithms, Bioinformatics, Theoretical Computer Science, Computational Thinking, Network Analysis, Network Routing, Analysis, Probability, Design Strategies, Computer Science
- Status: AI skills
Skills you'll gain: Data Storytelling, Dashboard, Data Visualization Software, Plotly, Data Presentation, Data Wrangling, Data Visualization, SQL, Generative AI, Interactive Data Visualization, Exploratory Data Analysis, Data Cleansing, Big Data, Jupyter, Matplotlib, Data Analysis, Statistical Analysis, Pandas (Python Package), Excel Formulas, Professional Networking
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Management, Security Information and Event Management (SIEM), Data Integrity
Google Cloud
Skills you'll gain: Cloud Infrastructure, Google Cloud Platform, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Infrastructure As A Service (IaaS), Cloud Applications, Cloud Security, Kubernetes, Cloud Computing, OAuth, Security Controls, Cloud Storage, Network Infrastructure, Containerization, Threat Management, Application Security, Virtual Private Networks (VPN), Data Security, Authorization (Computing)
- Status: Free
Università Bocconi
Skills you'll gain: Private Equity, Business Valuation, Investments, Financial Management, Corporate Finance, Tax Laws, Entrepreneurship, Due Diligence, Tax, Negotiation, Law, Regulation, and Compliance
University of Pennsylvania
Skills you'll gain: Operations Management, Return On Investment, Operational Efficiency, Financial Statements, Financial Statement Analysis, Finance, Human Capital, Go To Market Strategy, Process Analysis, Branding, People Management, Financial Reporting, Capital Budgeting, Financial Accounting, Financial Modeling, Consumer Behaviour, Process Improvement, Strategic Marketing, Human Resource Strategy, Decision Making
Skills you'll gain: Software Development Life Cycle, Linux Commands, Unit Testing, Bash (Scripting Language), Shell Script, Git (Version Control System), GitHub, Development Environment, Version Control, File Management, Jupyter, Software Engineering, Software Architecture, Application Deployment, Automation, Flask (Web Framework), Web Scraping, Python Programming, Open Source Technology, Application Development
Skills you'll gain: Design Thinking, User Research, User Experience Design, User Centered Design, Web Content Accessibility Guidelines, Usability Testing, Prototyping, Wireframing, Sprint Planning
Skills you'll gain: Threat Modeling, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Personally Identifiable Information, Encryption
Skills you'll gain: Istio, Open Web Application Security Project (OWASP), Software Development Life Cycle, Linux Commands, Unit Testing, Object-Relational Mapping, Application Deployment, NoSQL, Kubernetes, Bash (Scripting Language), MongoDB, Shell Script, OpenShift, Git (Version Control System), Cloud Applications, Containerization, GitHub, Serverless Computing, Jupyter, Grafana
In summary, here are 10 of our most popular intrusion detection and prevention courses
- Introduction to Cybersecurity Tools & Cyberattacks: IBM
- Ask Questions to Make Data-Driven Decisions: Google
- Algorithms: Stanford University
- IBM Data Analyst: IBM
- Incident Response and Digital Forensics: IBM
- Security in Google Cloud: Google Cloud
- Private Equity and Venture Capital: Università Bocconi
- Business Foundations: University of Pennsylvania
- Applied Software Engineering Fundamentals: IBM
- Foundations of User Experience (UX) Design: Google