Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "evading+ids"
- Status: Preview
Skills you'll gain: Cloud Security, Microsoft Azure, Threat Management, Security Controls, Security Information and Event Management (SIEM), Key Management, Continuous Monitoring, Role-Based Access Control (RBAC), Virtual Environment, Query Languages
- Status: Preview
EIT Digital
Skills you'll gain: Email Security, Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Identity and Access Management, Threat Management, Threat Detection, Data Security, User Accounts, Entrepreneurship
- Status: Free Trial
Microsoft
Skills you'll gain: Identity and Access Management, Azure Active Directory, Microsoft Azure, Network Troubleshooting, Hybrid Cloud Computing, Network Security, Network Administration, Windows PowerShell, Virtual Machines, Infrastructure as Code (IaC), Virtualization, Role-Based Access Control (RBAC), Cloud Security, Command-Line Interface
- Status: New
Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), Web Applications, Vulnerability Scanning, Vulnerability Assessments, Cyber Security Assessment, Application Security, Web Servers, Content Management Systems, Application Programming Interface (API), Authorization (Computing), Databases
- Status: Free Trial
Microsoft
Skills you'll gain: Role-Based Access Control (RBAC), Azure Active Directory, Microsoft Azure, Cyber Governance, System Monitoring, Identity and Access Management, Cloud Security, Enterprise Security, Data Security, Authorization (Computing), User Provisioning, Multi-Factor Authentication, Security Management, Authentications
- Status: Free Trial
University of Michigan
Skills you'll gain: PostgreSQL, JSON, Text Mining, SQL, Databases, Natural Language Processing, Database Management, Data Processing, Application Programming Interface (API), Data Storage, Python Programming
- Status: Free Trial
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Computer Security Incident Management, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Malware Protection, Endpoint Security, Network Security, Firewall
- Status: New
Google Cloud
Skills you'll gain: Generative AI, Big Data, Applied Machine Learning, Query Languages, Natural Language Processing
- Status: Free Trial
Infosec
Skills you'll gain: Network Analysis, Network Security, Cybersecurity, Threat Detection, Network Monitoring, Anomaly Detection, Network Protocols, TCP/IP
- Status: Free Trial
Universidad de los Andes
Skills you'll gain: Penetration Testing, Threat Detection, Vulnerability Assessments, Threat Modeling, Cybersecurity, Vulnerability Management, Cyber Security Assessment, Risk Management Framework, Cyber Attacks, Security Testing, Information Technology, Cyber Risk, Web Servers, Servers, Web Applications
Skills you'll gain: Vulnerability Assessments, Cyber Security Assessment, Network Security, Penetration Testing, Network Administration, Software Installation, System Configuration, Cyber Security Policies, Web Applications, Authentications, Microsoft Windows, Integration Testing, Linux
- Status: Free Trial
Skills you'll gain: Database Management, Databases, Relational Databases, Database Architecture and Administration, Data Security, User Accounts, Secure Coding, SQL, Application Security, Vulnerability Scanning, NoSQL, Role-Based Access Control (RBAC), Encryption
In summary, here are 10 of our most popular evading+ids courses
- Microsoft Defender Cloud Compliance - Secure Azure Services: Microsoft
- Cybersecurity Awareness and Innovation: EIT Digital
- Azure Identity and Networking Essentials: Microsoft
- Hands-On Web App Pentesting: Packt
- Identity Protection and Governance : Microsoft
- JSON and Natural Language Processing in PostgreSQL: University of Michigan
- Detecting and Mitigating Cyber Threats and Attacks: University of Colorado System
- 運用 BigQuery 建立嵌入項目、向量搜尋和 RAG: Google Cloud
- Defensive Python: Infosec
- Vulnerabilidades y pruebas de penetración: Universidad de los Andes