Search result for Intrusion detection Online Courses & Certifications
Get Course Alerts by Email
Detecting and Mitigating Cyber Threats and Attacks
by Greg Williams- 4.7
Approx. 12 hours to complete
This course looks at detection and mitigation of threats and attack vectors and discusses how to use tools and principles to protect information. Intrusion Detection and Prevention Detection Methods Intrusion Detection Systems Intrusion Prevention Systems Intrusion Detection Readings Week 2 - Intrusion Detection and Prevention Detection and Prevention tools Week 3 - Detection and Prevention Tools Understanding detection and mitigation...
Cyber Forensics Level 3
by Tanmay S Dikshit- 0.0
1 hour on-demand video
In this course you will learn the basic concepts of Access Control & Intrusion Detection, Securities for VPN & Next Generation Technologies, Server Management And Firewalls....
$12.99
Computer Networks Security from Scratch to Advanced
by Mohammad Adly- 3.9
8 hours on-demand video
Section Seven: Intrusion Detection and Prevention systems (IDS/IPS) Lecture 1: What is Intrusion Detection Systems (IDS)? Lecture 2: Network IDS (NIDS)Lecture 3: NIDS ChallengesLecture 4: Snort as NIDSLecture 5: Intrusion Prevention Systems (IPS)...
$17.99
Snort Intrusion Detection, Rule Writing, and PCAP Analysis
by Jesse Kurrus, M.S., OSCP, CEH, Security+, Linux+, Network+, CISSP- 4.5
2.5 hours on-demand video
My name is Jesse Kurrus, and I’ll be your professor for the duration of the Snort Intrusion Detection, Rule Writing, and PCAP Analysis course....
$15.99
CCNP,CCIE Security SCOR (350-701) Training Part-1/2
by Ahmad Ali- 4.5
34 hours on-demand video
Network security solutions that provide intrusion prevention and firewall Endpoint Protection and Detection Compare network security solutions that provide intrusion prevention...
$12.99
Network Security
by Jonathan S. Weissman- 0.0
8 Weeks
Learn the process of network security, including intrusion detection, evidence collection, network auditing, and contingency planning against attacks. In this course, you will examine the various areas of network security including intrusion detection, evidence collection and defense against cyber attacks....
$249
DDoS Attacks and Defenses
by Edward Chow- 4.5
Approx. 15 hours to complete
A2D2 uses Linux Firewall Rate limiting and Class Based Queueing, and subnet flood detection to handle various DDoS traffic types. You learn the new Intrusion tolerance paradigm with proxy-based multipath routing for DDoS defense. Intrusion Response and Intrusion Tolerance Intrusion Tolerance Literature Unsupervised Anomaly-based Malware Detection Techniques 3 Intrusion Tolerance Autonomic Response Systems...
Related searches
Outlier Detection Algorithms in Data Mining and Data Science
by KDD Expert- 3.6
2.5 hours on-demand video
Outlier Detection in Data Mining, Data Science, Machine Learning, Data Analysis and Statistics using PYTHON,R and SAS Welcome to the course " Outlier Detection Techniques ". Are you Data Scientist or Analyst or maybe you are interested in fraud detection for credit cards, insurance or health care, intrusion detection for cyber-security, or military surveillance for enemy activities?...
$12.99
The Complete Nmap Ethical Hacking Course : Network Security
by Nathan House- 4.5
4.5 hours on-demand video
Learn Firewall and Intrusion detection evasion, Nmap output (convert, merge and compare) results, Zenmap (Nmap GUI) and how criminal black hat hackers use Nmap. Scan to determine firewall rules while avoiding intrusion detection systems (IDS)....
$21.99
Network Security & Database Vulnerabilities
by IBM Security Learning Services- 4.6
Approx. 14 hours to complete
Intrusion Detection and Intrusion Prevention Systems Firewalls, Intrusion Detection and Intrusion Prevention Systems...