Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "evading ids"
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Cyber Operations, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Network Security, Threat Management
Google Cloud
Skills you'll gain: Google App Engine, Authentications, Application Deployment, Identity and Access Management, Google Cloud Platform, Cloud Applications, Authorization (Computing), User Accounts, Cryptography
Cisco Learning and Certifications
Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Threat Management, Event Monitoring, Intrusion Detection and Prevention, Security Information and Event Management (SIEM), Cybersecurity, Continuous Monitoring, Incident Response, Security Awareness, Security Management, Network Monitoring
Coursera Project Network
Skills you'll gain: Generative AI, Keras (Neural Network Library), Tensorflow, Deep Learning, Dimensionality Reduction, Exploratory Data Analysis, Applied Machine Learning, Anomaly Detection, Data Processing, Data Visualization, Data Synthesis, Machine Learning
- Status: NewStatus: Free
Coursera Instructor Network
Skills you'll gain: Anomaly Detection, Data Visualization, Generative AI, Risk Management, Data-Driven Decision-Making, ChatGPT, Compliance Management, Regulatory Compliance, Unsupervised Learning, Test Data, Threat Detection, Data Pipelines, Automation, Predictive Analytics, Artificial Intelligence
Skills you'll gain: Authentications, Authorization (Computing), Identity and Access Management, User Accounts, Role-Based Access Control (RBAC), Multi-Factor Authentication, Group Policy
Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Active Directory, Windows PowerShell, Wireless Networks, Microsoft Windows, Linux Commands, Virtual Environment
- Status: New
Johns Hopkins University
Skills you'll gain: Database Management, Database Architecture and Administration, Apache Hadoop, Query Languages, Big Data, Databases, SQL, Data Access, Distributed Computing, Performance Tuning, Data Processing, Data Integrity, Authorization (Computing), Data Storage Technologies
- Status: Free
DeepLearning.AI
Skills you'll gain: Penetration Testing, Vulnerability Assessments, Security Testing, Vulnerability Management, Threat Modeling, Cyber Security Assessment, Application Security
- Status: New
Johns Hopkins University
Skills you'll gain: Network Security, Cybersecurity, Infrastructure Security, Information Systems Security, Threat Modeling, Cyber Risk, Governance, Security Engineering, Network Protocols, Artificial Intelligence and Machine Learning (AI/ML), Internet Of Things, Artificial Intelligence, Natural Language Processing
Icahn School of Medicine at Mount Sinai
Skills you'll gain: Bioinformatics, Interactive Data Visualization, Supervised Learning, Machine Learning, Big Data, Data Science, Data Transformation, Data Integration, Network Analysis, Life Sciences, Exploratory Data Analysis, Unsupervised Learning, Data Processing, Data Analysis, Metadata Management, Semantic Web, Statistical Methods, Application Programming Interface (API), Restful API
Skills you'll gain: Penetration Testing, Network Protocols, Network Security, Network Analysis, Malware Protection, Cyber Security Assessment, Cyber Threat Intelligence, Security Testing, Vulnerability Assessments, System Configuration, Image Analysis, Open Source Technology, Virtualization, Virtual Machines, Linux, Microsoft Windows
In summary, here are 10 of our most popular evading ids courses
- In the Trenches: Security Operations Center :Â EC-Council
- User Authentication: Identity-Aware Proxy:Â Google Cloud
- Threat Investigation:Â Cisco Learning and Certifications
- Data Balancing with Gen AI: Credit Card Fraud Detection:Â Coursera Project Network
- GenAI for Fraud Analysts: Improving Detection Efficiency:Â Coursera Instructor Network
- Authentication, Authorization, and Identity with Vault:Â Google Cloud
- Intermediate Ethical Hacking Hands-on Training:Â Packt
- Distributed Query Optimization and Security:Â Johns Hopkins University
- Red Teaming LLM Applications:Â DeepLearning.AI
- Artificial Intelligence Industrial Control Systems Security:Â Johns Hopkins University