Intrusion Detection and Prevention

Intrusion Detection and Prevention is the practice of managing security incidents by identifying and preventing malicious network activities. Coursera's Intrusion Detection and Prevention catalogue teaches you about the various principles, techniques and tools used in managing security events. You'll learn about different approaches to intrusion detection, from anomaly-based to signature-based methods, network traffic analysis, incident response strategies, and the design and deployment of intrusion prevention systems. This knowledge will allow you to effectively monitor and protect a network from potential threats, making you an indispensable asset in the world of cybersecurity.
32credentials
1online degree
98courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "intrusion detection and prevention"

  • Status: New
    Status: Free Trial

    Skills you'll gain: Exploit development, Penetration Testing, Malware Protection, Network Monitoring, Object Oriented Programming (OOP), Cyber Security Assessment, Intrusion Detection and Prevention, Network Security, Network Protocols, Network Analysis, Scripting, Remote Access Systems, Python Programming, Command-Line Interface

  • Status: Free Trial

    Skills you'll gain: Email Security, Incident Response, Computer Security Incident Management, Malware Protection, Cybersecurity, Network Security, Intrusion Detection and Prevention, Event Monitoring, Cyber Security Strategy, Threat Detection, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Wireless Networks

  • Status: Free Trial

    Skills you'll gain: Incident Response, Computer Security Incident Management, Open Web Application Security Project (OWASP), Cyber Threat Intelligence, Application Security, Secure Coding, Cloud Security, Cybersecurity, Vulnerability Assessments, Information Systems Security, Metasploit, Security Strategy, Intrusion Detection and Prevention, Infrastructure Security, Vulnerability Scanning, Security Testing, Hardening, Penetration Testing, Mobile Security, Automation

  • Status: Free Trial

    Skills you'll gain: Penetration Testing, Security Testing, System Testing, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Cloud Security, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Exploitation techniques, Microsoft Azure, Firewall, Virtual Private Networks (VPN)

  • Status: Free Trial

    Skills you'll gain: Cloud Security, Intrusion Detection and Prevention, Email Security, Incident Response, Application Security, Cloud Computing, Computer Security Incident Management, Cyber Attacks, Cyber Threat Intelligence, Threat Detection, Web Applications, Malware Protection, Network Security, Threat Management, Security Information and Event Management (SIEM), Network Monitoring, Data Security, Authentications

  • Status: Free Trial

    Skills you'll gain: Cyber Threat Hunting, Incident Response, Computer Security Incident Management, Cybersecurity, Network Security, Cyber Security Policies, Threat Detection, Security Controls, Threat Management, Intrusion Detection and Prevention, Firewall, Security Information and Event Management (SIEM), Continuous Monitoring, Endpoint Security, Network Monitoring, Malware Protection

  • Status: Free Trial

    Skills you'll gain: Vulnerability Management, Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Vulnerability Assessments, Threat Detection, Hardening, Network Security, Threat Management, Security Controls, Stakeholder Communications, Security Information and Event Management (SIEM), TCP/IP, Risk Management Framework, Linux, Debugging, Cybersecurity, SQL

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Firewall, Network Security, Intrusion Detection and Prevention, Information Systems Security, Security Controls, Network Monitoring, Threat Detection, Linux Administration, Linux

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Computer Security Incident Management, Metasploit, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Exploit development, Cloud Security, Security Strategy, Computer Security Awareness Training, Risk Management, Enterprise Security

  • Status: New
    Status: Free Trial

    Skills you'll gain: Linux Administration, Bash (Scripting Language), Network Monitoring, Cyber Security Assessment, Exploit development, Intrusion Detection and Prevention, System Configuration, Virtual Machines

  • Status: New
    Status: Free Trial

    Skills you'll gain: Security Testing, Continuous Monitoring, Cyber Security Assessment, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Vulnerability Scanning, Security Controls, Threat Detection, Threat Modeling, Endpoint Detection and Response

  • Status: New
    Status: Free Trial

    Skills you'll gain: Network Troubleshooting, Distributed Denial-Of-Service (DDoS) Attacks, Network Administration, Hardening, Network Monitoring, Intrusion Detection and Prevention, Cybersecurity, Network Protocols, Firewall, General Networking, Network Performance Management, Authentications, Identity and Access Management, Encryption, Hardware Troubleshooting, Virtual Local Area Network (VLAN), Key Management, Wireless Networks, Data Integrity