Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "intrusion detection system"
Skills you'll gain: Network Security, Intrusion Detection and Prevention, Hardening, TCP/IP, Cyber Attacks, Network Architecture, Computer Networking, Cloud Computing, Firewall, Network Infrastructure, Network Protocols, Virtual Private Networks (VPN)
Skills you'll gain: SQL, Jupyter, Data Mining, Peer Review, Data Modeling, Databases, Stored Procedure, Relational Databases, Database Design, Query Languages, Data Science, Database Management, Big Data, Data Cleansing, Data Visualization Software, GitHub, Business Analysis, Cloud Computing, Data Analysis, Data Processing
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
University of Colorado System
Skills you'll gain: Debugging, Object Oriented Programming (OOP), C# (Programming Language), Software Design Patterns, Computer Programming, Data Management, Event-Driven Programming, Program Development, Data Structures, Microsoft Visual Studio, Integrated Development Environments, Computer Programming Tools, Computer Graphics, Data Storage, Application Development, Software Design, Virtual Environment, Development Environment, Application Frameworks, UI Components
Skills you'll gain: Data Ethics, Data Analysis, Data Security, Google Sheets, Databases, Data Storage, Data Quality, Data Integrity, Data Management, Data Collection, Data Manipulation, Relational Databases, SQL, Metadata Management, Unstructured Data
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Malware Protection, Network Security, Threat Detection, Firewall, Code Review, Routing Protocols, Proxy Servers, Linux, Internet Of Things, Servers
Johns Hopkins University
Skills you'll gain: Rmarkdown, Exploratory Data Analysis, Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Data Visualization, Statistical Programming, Ggplot2, Dimensionality Reduction, Data Visualization Software, Data Integration, Knitr, Data Analysis, Data Import/Export, General Science and Research, Data Sharing, Statistical Reporting
Skills you'll gain: CI/CD, Open Web Application Security Project (OWASP), Istio, Continuous Integration, Software Development Life Cycle, Linux Commands, Agile Software Development, Unit Testing, Cloud Computing Architecture, Application Deployment, Test Driven Development (TDD), Gherkin (Scripting Language), Kubernetes, Jenkins, Bash (Scripting Language), Cloud Services, Git (Version Control System), DevOps, Jupyter, Grafana
Skills you'll gain: SQL, Web Scraping, Database Design, MySQL, Data Transformation, Extract, Transform, Load, IBM DB2, Relational Databases, Data Architecture, Jupyter, Data Pipelines, Big Data, Database Management, Data Warehousing, Data Governance, Databases, Stored Procedure, Data Manipulation, Automation, Python Programming
University at Buffalo
Skills you'll gain: HVAC, Basic Electrical Systems, Engineering Calculations, Architectural Design, Electrical Engineering, System Requirements, Design Specifications, Structural Analysis, Cost Estimation, Capacity Management
University of Alberta
Skills you'll gain: Model View Controller, Software Design Patterns, Software Design, Unified Modeling Language, Object Oriented Design, Code Review, Software Architecture, Programming Principles, Maintainability, Java, Android Development, Software Development
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Cybersecurity, Cyber Operations, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Security Information and Event Management (SIEM), Threat Detection, Cloud Security, Threat Management, System Monitoring, Automation
Searches related to intrusion detection system
In summary, here are 10 of our most popular intrusion detection system courses
- Connect and Protect: Networks and Network Security: Google
- Introduction to Data Science: IBM
- IT Fundamentals for Cybersecurity: IBM
- C# Programming for Unity Game Development: University of Colorado System
- Prepare Data for Exploration: Google
- DDoS Attacks and Defenses: University of Colorado System
- Data Science: Foundations using R: Johns Hopkins University
- IBM DevOps and Software Engineering: IBM
- Data Engineering Foundations: IBM
- Solar Energy and Electrical System Design: University at Buffalo