Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "correlating+events+and+detecting+anomalies+in+splunk"
Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Cyber Threat Hunting, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Network Security, Network Monitoring, Data Security, Network Analysis, Malware Protection, Vulnerability Assessments, Operating Systems, OS Process Management
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Computer Security Incident Management, Cyber Threat Intelligence, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Continuous Monitoring, System Monitoring, Network Analysis, Virtual Machines, Network Security, Information Systems Security, Network Monitoring, NIST 800-53, Applied Machine Learning, Machine Learning Algorithms
Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Cyber Threat Intelligence, Threat Detection, Security Strategy, Intrusion Detection and Prevention, Threat Management, Cybersecurity, Continuous Monitoring, Security Information and Event Management (SIEM), Technical Communication
- Status: Free
Coursera Project Network
Skills you'll gain: Linux Commands, Linux, TCP/IP, Scripting, Shell Script, Network Monitoring, Network Analysis, Network Security, Network Protocols
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Threat Detection, Network Analysis, Cybersecurity, System Design and Implementation, Network Security, Machine Learning Software, Machine Learning Methods, Performance Testing, Machine Learning Algorithms, Machine Learning, Artificial Intelligence, Supervised Learning, Microsoft Windows
Johns Hopkins University
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Intrusion Detection and Prevention, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Threat Detection, Threat Modeling, Network Analysis, Network Security, Network Monitoring, NIST 800-53, Cloud Security
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Computer Security Incident Management, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Endpoint Security, Network Security, Data Loss Prevention, Firewall, Anomaly Detection, Network Monitoring
Skills you'll gain: Image Analysis, Computer Vision, Artificial Neural Networks, Python Programming, Deep Learning, Real Time Data, Google Cloud Platform, Applied Machine Learning, Development Environment, Data Collection, Software Installation, System Configuration, Machine Learning
Skills you'll gain: Vulnerability Assessments, Risk Management, Continuous Monitoring, Operational Risk, Threat Management, Intrusion Detection and Prevention, Cyber Risk, Vulnerability Management, Security Controls, Enterprise Risk Management (ERM), Risk Mitigation, Risk Analysis, Compliance Management, Security Information and Event Management (SIEM), Technical Communication, Auditing
Skills you'll gain: Incident Response, Disaster Recovery, Computer Security Incident Management, Business Continuity, Cybersecurity, Cyber Security Policies, Investigation, Event Monitoring, Threat Detection, Contingency Planning, Communication Planning
Skills you'll gain: Jenkins, Continuous Integration, System Monitoring, Systems Administration, Continuous Monitoring, Test Automation, CI/CD, Configuration Management, Test Tools, Server Administration, Code Review, Security Management, Authorization (Computing), Disaster Recovery
LearnKartS
Skills you'll gain: Apache Kafka, System Monitoring, Event Monitoring, Data Pipelines, Performance Tuning, Real Time Data, Software Architecture, Restful API, Data Integration, Distributed Computing, Scalability
In summary, here are 10 of our most popular correlating+events+and+detecting+anomalies+in+splunk courses
- Technical Deep Dive with Incident Response Tools: Infosec
- Intrusion Detection: Johns Hopkins University
- Advanced Threat Hunting and Incident Response: LearnQuest
- Analyze Network Traffic with TCPDump: Build a Logging Tool: Coursera Project Network
- Advanced Malware and Network Anomaly Detection: Johns Hopkins University
- Advanced Network Analysis and Incident Response: Johns Hopkins University
- Detecting and Mitigating Cyber Threats and Attacks: University of Colorado System
- Computer Vision: YOLO Custom Object Detection with Colab GPU: Packt
- Risk Identification, Monitoring, and Analysis: ISC2
- Incident Response and Recovery: ISC2