Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "rootkit detection and defense"
Skills you'll gain: Dashboard, Data Visualization Software, Plotly, Data Wrangling, Data Visualization, Exploratory Data Analysis, Data Cleansing, Jupyter, Matplotlib, Data Analysis, Pandas (Python Package), Data Manipulation, Seaborn, Data Transformation, Data Import/Export, Predictive Modeling, Web Scraping, Interactive Data Visualization, Automation, Python Programming
- Status: Free
University of Alberta
Skills you'll gain: Social Studies, Storytelling, Cultural Diversity, Social Justice, Sociology, Political Sciences, Social Sciences, Education and Training, Economics, Advocacy, Land Management, Environment and Resource Management, Governance
Skills you'll gain: Penetration Testing, Network Security, Threat Management, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Vulnerability Scanning, Cybersecurity, Authorization (Computing), Security Awareness, Cyber Threat Intelligence, Malware Protection, Data Security, Cyber Attacks, Threat Detection, Computer Security Awareness Training
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Network Analysis, Document Management, Technical Documentation, Record Keeping
EC-Council
Skills you'll gain: Network Security, Mobile Security, Public Key Infrastructure, Cryptography, Security Controls, Cybersecurity, Authorization (Computing), Authentications, Identity and Access Management, Wireless Networks, Cloud Computing, Cloud Security, Network Monitoring, Data Security, Internet Of Things, Virtualization and Virtual Machines
Johns Hopkins University
Skills you'll gain: Shiny (R Package), Rmarkdown, Exploratory Data Analysis, Regression Analysis, Leaflet (Software), Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Statistical Inference, Predictive Modeling, Statistical Hypothesis Testing, Data Visualization, Plotly, Machine Learning Algorithms, Interactive Data Visualization, Probability & Statistics, Knitr
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Computer Security Incident Management, Cyber Threat Intelligence, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Continuous Monitoring, System Monitoring, Network Analysis, Virtual Machines, Network Security, Information Systems Security, Network Monitoring, NIST 800-53, Applied Machine Learning, Machine Learning Algorithms
Johns Hopkins University
Skills you'll gain: Rmarkdown, Exploratory Data Analysis, Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Data Visualization, Statistical Programming, Ggplot2, Dimensionality Reduction, Data Visualization Software, Data Integration, Knitr, Data Analysis, Data Import/Export, General Science and Research, Data Sharing, Statistical Reporting
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Cybersecurity, Information Systems Security, Network Monitoring, Network Analysis
- Status: Free
Yonsei University
Skills you'll gain: Language Learning, Grammar, Vocabulary, Literacy
Multiple educators
Skills you'll gain: Dashboard, Pseudocode, Jupyter, Algorithms, Data Mining, Pandas (Python Package), Data Visualization Software, Correlation Analysis, Web Scraping, NumPy, R Programming, Probability & Statistics, Predictive Modeling, Big Data, Automation, Computer Programming Tools, GitHub, Data Analysis Software, Machine Learning Algorithms, Unsupervised Learning
In summary, here are 10 of our most popular rootkit detection and defense courses
- Applied Data Science: IBM
- Indigenous Canada: University of Alberta
- Cybersecurity Attack and Defense Fundamentals: EC-Council
- Sound the Alarm: Detection and Response: Google
- Network Defense Essentials (NDE): EC-Council
- Data Science: Johns Hopkins University
- Intrusion Detection: Johns Hopkins University
- Data Science: Foundations using R: Johns Hopkins University
- Detecting and Mitigating Cyber Threats and Attacks: University of Colorado System
- Introduction to Intrusion Detection Systems (IDS): Johns Hopkins University