Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "intrusion detection and prevention"
Skills you'll gain: Incident Response, Disaster Recovery, Computer Security Incident Management, Business Continuity, Security Management, Cybersecurity, Investigation, Continuous Monitoring, Threat Detection, Risk Management
- Status: Free Trial
CertNexus
Skills you'll gain: Data Ethics, Responsible AI, Accountability, Risk Management, Risk Analysis, Information Privacy, Risk Mitigation, Safety and Security, Business Ethics, Artificial Intelligence, Machine Learning
- Status: Free
Coursera Project Network
Skills you'll gain: Threat Detection, Anomaly Detection, Network Security, General Networking, Network Monitoring, Network Troubleshooting, Real Time Data, Security Strategy, Network Analysis, Network Protocols, Data Capture
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Intrusion Detection and Prevention, Anomaly Detection, Cyber Security Strategy, Threat Detection, Network Analysis, Network Security, Network Monitoring, NIST 800-53, Cloud Security
- Status: NewStatus: Preview
Coursera Instructor Network
Skills you'll gain: Threat Modeling, Responsible AI, Cyber Security Strategy, Cyber Security Assessment, Data Ethics, Cybersecurity, Threat Detection, Cyber Risk, Cyber Attacks, Vulnerability Assessments, Artificial Intelligence, Data Security, Incident Response, Risk Modeling, Tensorflow, Data Integrity
- Status: Free Trial
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Intrusion Detection and Prevention, Security Management, Disaster Recovery
Skills you'll gain: Threat Detection, Threat Management, Cloud Security, Google Cloud Platform, Vulnerability Management, Vulnerability Assessments, Security Information and Event Management (SIEM), Public Cloud
- Status: New
Skills you'll gain: Cyber Operations, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Cyber Attacks, Threat Modeling, Incident Response, Information Systems Security, Risk Management Framework, Network Security, Security Information and Event Management (SIEM), Event Monitoring, Network Analysis, Firewall, Data Integrity
- Status: Free Trial
Skills you'll gain: Intrusion Detection and Prevention, Computer Security Incident Management, Cyber Threat Hunting, Cyber Attacks, Cybersecurity, Cyber Operations, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Security Information and Event Management (SIEM), Threat Detection, Cloud Security, Security Controls, Threat Management, System Monitoring, IT Automation, Record Keeping, Problem Management
- Status: Free Trial
University of Colorado System
Skills you'll gain: Risk Management Framework, Infrastructure Security, Cyber Security Policies, Security Management, NIST 800-53, Cybersecurity, Cyber Security Strategy, Security Strategy, Cyber Risk, System Monitoring
- Status: Free Trial
University of Colorado System
Skills you'll gain: Infrastructure Security, Cyber Risk, Cyber Security Policies, Cyber Security Assessment, Cybersecurity, Cyber Security Strategy, Risk Management Framework, Technology Roadmaps, Network Infrastructure, Transportation Operations, Infrastructure Architecture, Mobile Security
- Status: Free Trial
Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Exploitation techniques, Threat Detection, Network Security, Information Systems Security, Security Awareness, Human Factors (Security), Lightweight Directory Access Protocols, Network Protocols
In summary, here are 10 of our most popular intrusion detection and prevention courses
- Incident Response and Recovery: ISC2
- Detect and Mitigate Ethical Risks: CertNexus
- Wireshark for Security: Detect Network Anomalies: Coursera Project Network
- Advanced Network Analysis and Incident Response: Johns Hopkins University
- Cybersecurity Strategies for AI-Driven Organizations: Coursera Instructor Network
- Cyber Incident Response: Infosec
- Detect and Investigate Threats with Security Command Center: Google Cloud
- Cisco CyberOps Associate (200-201): Packt
- Detect, Respond, and Recover from Cloud Cybersecurity Attacks: Google Cloud
- Cybersecurity Policy for Water and Electricity Infrastructures: University of Colorado System