Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "evading ids"
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Verification And Validation, Code Review, Linux, Vulnerability Assessments, Security Engineering, C++ (Programming Language), User Accounts, Data Validation, Debugging, Cryptography, File Systems, Authorization (Computing), C (Programming Language), Encryption, OS Process Management
University of California San Diego
Skills you'll gain: Bioinformatics, Infectious Diseases, Life Sciences, Computational Thinking, Medical Science and Research
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Malware Protection, Network Security, Threat Detection, Firewall, Code Review, Routing Protocols, Proxy Servers, Linux, Internet Of Things, Servers
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
Cisco Learning and Certifications
Skills you'll gain: Key Management, Data Security, Cryptography, Encryption, Information Systems Security, Cybersecurity, Network Security, Security Information and Event Management (SIEM), Network Monitoring, Information Assurance, Network Analysis, Intrusion Detection and Prevention, Event Monitoring, Data Capture, Data Integrity, Network Troubleshooting, Incident Response
Infosec
Skills you'll gain: Network Analysis, Network Security, Intrusion Detection and Prevention, Cybersecurity, Threat Detection, Network Monitoring, Cyber Threat Hunting, Anomaly Detection
- Status: NewStatus: Free
Coursera Instructor Network
Skills you'll gain: Generative AI, Regulatory Compliance, Regulatory Requirements, Compliance Management, Governance Risk Management and Compliance, Risk Management, Data Ethics, Financial Regulation, Anomaly Detection, Data Governance, Artificial Intelligence, Threat Detection, Artificial Intelligence and Machine Learning (AI/ML), Forecasting, Advanced Analytics, Predictive Analytics
University of Colorado System
Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Cybersecurity, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, Data Validation
- Status: New
Microsoft
Skills you'll gain: Role-Based Access Control (RBAC), Authentications, Secure Coding, ASP.NET, Data Security, Back-End Web Development, Authorization (Computing), Application Security, JSON, Identity and Access Management, Data Storage, Application Programming Interface (API), Encryption
- Status: New
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Intelligence, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Continuous Monitoring, System Monitoring, Network Analysis, Virtual Machines, Network Security, Vulnerability Assessments, Information Systems Security, Event Monitoring, Network Monitoring
- Status: New
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Endpoint Detection and Response, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Vulnerability Assessments, Cybersecurity, Information Systems Security, Event Monitoring, Network Monitoring
Infosec
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Secure Coding, Application Security, Encryption, Security Controls, Data Security, Web Servers, Web Applications, Database Management, Cryptography, Authentications, SQL, Data Validation
In summary, here are 10 of our most popular evading ids courses
- Identifying Security Vulnerabilities in C/C++Programming: University of California, Davis
- Hacking COVID-19 — Course 1: Identifying a Deadly Pathogen: University of California San Diego
- DDoS Attacks and Defenses: University of Colorado System
- Detecting and Mitigating Cyber Threats and Attacks: University of Colorado System
- Data Security: Cisco Learning and Certifications
- Defensive Python: Infosec
- GenAI for Fraud Detection and Compliance: Coursera Instructor Network
- Hacking and Patching: University of Colorado System
- Security and Authentication: Microsoft
- Intrusion Detection: Johns Hopkins University