Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "monitoring/managing intrusion detection systems in a cloud environment"
Skills you'll gain: Digital Transformation, Cloud Computing Architecture, Business Transformation, Cloud Computing, System Design and Implementation, Software Architecture, SAP Applications, Cybersecurity, Cloud Platforms, Software As A Service, Cloud Services, Information Technology Architecture, Solution Architecture, Enterprise Resource Planning, Business Technologies, Customer Insights, Business Process Automation, Advanced Analytics, Application Development
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Computer Security Incident Management, Cyber Threat Intelligence, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Continuous Monitoring, System Monitoring, Network Analysis, Virtual Machines, Network Security, Information Systems Security, Network Monitoring, NIST 800-53, Applied Machine Learning, Machine Learning Algorithms
Google Cloud
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Load Balancing, Network Monitoring, Network Architecture, Network Security, Network Routing, Network Planning And Design, Virtual Private Networks (VPN), Cloud Computing Architecture, Google Cloud Platform, Firewall, Computer Networking, Multi-Cloud, TCP/IP, Hybrid Cloud Computing, Network Troubleshooting, Cloud Security, Intrusion Detection and Prevention, Cloud Computing, Network Performance Management
DeepLearning.AI
Skills you'll gain: Computer Vision, Image Analysis, Deep Learning, Artificial Neural Networks, Applied Machine Learning, Artificial Intelligence, Network Architecture, Machine Learning, Data Processing, Algorithms
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Cybersecurity, Information Systems Security, Network Monitoring, Network Analysis
Multiple educators
Skills you'll gain: Dashboard, Pseudocode, Jupyter, Algorithms, Data Mining, Pandas (Python Package), Data Visualization Software, Correlation Analysis, Web Scraping, NumPy, R Programming, Probability & Statistics, Predictive Modeling, Big Data, Automation, Computer Programming Tools, GitHub, Data Analysis Software, Machine Learning Algorithms, Unsupervised Learning
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Threat Detection, Amazon Web Services, Incident Response, Continuous Monitoring, Cloud Security, Data Security, Identity and Access Management, Amazon Elastic Compute Cloud, Network Security, Cloud Computing
Edureka
Skills you'll gain: AWS Identity and Access Management (IAM), Cloud Security, Threat Detection, Network Security, Incident Response, Identity and Access Management, Computer Security Incident Management, Amazon Web Services, Threat Management, IT Security Architecture, Data Security, Security Strategy, Data Loss Prevention, Application Security, Cloud Standards, Cyber Attacks, Security Controls, Cloud Computing, Intrusion Detection and Prevention, Security Management
University of Colorado System
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Cloud Infrastructure, Cloud Security, Load Balancing, User Accounts, Web Servers, Virtual Machines, Command-Line Interface, MySQL, Linux, Debugging, Network Routing
Skills you'll gain: Cloud Computing Architecture, Peripheral Devices, Technical Support, Cloud Services, Cybersecurity, Computing Platforms, Hardware Troubleshooting, IT Service Management, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Desktop Support, Encryption, Data Storage, Software Development Life Cycle, Professional Networking, Information Technology, Cloud Computing, Interviewing Skills, Computer Hardware
Multiple educators
Skills you'll gain: Unsupervised Learning, Supervised Learning, Classification And Regression Tree (CART), Artificial Intelligence and Machine Learning (AI/ML), Machine Learning Algorithms, Applied Machine Learning, Machine Learning, Jupyter, Data Ethics, Decision Tree Learning, Tensorflow, Scikit Learn (Machine Learning Library), NumPy, Predictive Modeling, Deep Learning, Artificial Intelligence, Reinforcement Learning, Random Forest Algorithm, Feature Engineering, Artificial Neural Networks
Skills you'll gain: Microsoft Azure, Cloud Services, Virtualization, Cloud Computing, Virtual Machines, Cloud Storage, Cloud Infrastructure, Virtual Private Networks (VPN), Public Cloud, Cloud Management, General Networking, Database Management Systems, Scalability
In summary, here are 10 of our most popular monitoring/managing intrusion detection systems in a cloud environment courses
- Understanding the Enterprise Systems Environment: SAP
- Intrusion Detection: Johns Hopkins University
- Networking in Google Cloud: Google Cloud
- Convolutional Neural Networks: DeepLearning.AI
- Introduction to Intrusion Detection Systems (IDS): Johns Hopkins University
- Data Science Foundations: IBM
- AWS: Threat Detection, Logging and Monitoring: Whizlabs
- Cloud Security on AWS: Edureka
- Cloud Computing Security: University of Colorado System
- IBM IT Support: IBM