Filter by
The language used throughout the course, in both instruction and assessments.
Results for "attack+classification+and+analysis"
Edureka
Skills you'll gain: Power BI, Data Analysis Expressions (DAX), Exploratory Data Analysis, Matplotlib, Data Visualization Software, Data Presentation, Web Scraping, Probability Distribution, Predictive Modeling, Seaborn, Statistical Visualization, Interactive Data Visualization, SQL, Statistical Methods, Statistical Inference, Pandas (Python Package), Database Management, Data Storytelling, Databases, Dashboard
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Network Planning And Design, Network Protocols, Network Model, Cloud Computing, TCP/IP
Skills you'll gain: Incident Response, Computer Security Incident Management, Penetration Testing, Security Management, Cyber Security Assessment, Cyber Attacks, Cybersecurity, Threat Management, Vulnerability Assessments, Data Security, Malware Protection, Network Security
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Cloud Infrastructure, Cloud Security, Load Balancing, User Accounts, Authorization (Computing), Network Security, Identity and Access Management, Threat Detection, Information Systems Security, Cybersecurity, Encryption, Geospatial Information and Technology
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Endpoint Detection and Response, Threat Management, Cyber Operations, Cybersecurity, Disaster Recovery, Cyber Threat Hunting, Security Management, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Event Monitoring, Network Security, Network Monitoring, Data Security, Business Continuity
University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Cybersecurity, Computer Networking, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks, Cyber Risk
University of Colorado Boulder
Skills you'll gain: Unsupervised Learning, Regression Analysis, Dimensionality Reduction, Data Analysis, Anomaly Detection, Supervised Learning, Machine Learning, Machine Learning Algorithms, Analytics, Scikit Learn (Machine Learning Library), Predictive Modeling, Statistical Analysis, Applied Machine Learning, Machine Learning Methods, Statistical Modeling, Data-Driven Decision-Making, Exploratory Data Analysis, Classification And Regression Tree (CART), Data Mining, Feature Engineering
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Threat Modeling, Email Security, Security Engineering, System Design and Implementation, Network Security, Jupyter, Authentications, Deep Learning, Machine Learning Software
Cisco Learning and Certifications
Skills you'll gain: Key Management, Data Security, Cryptography, Encryption, Information Systems Security, Cybersecurity, Network Security, Security Information and Event Management (SIEM), Network Monitoring, Information Assurance, Network Analysis, Intrusion Detection and Prevention, Event Monitoring, Data Capture, Data Integrity, Network Troubleshooting, Incident Response
Cisco Learning and Certifications
Skills you'll gain: Cyber Threat Hunting, Threat Detection, Threat Modeling, Threat Management, Event Monitoring, Vulnerability Management, Security Information and Event Management (SIEM), Cybersecurity, Continuous Monitoring, Incident Response, Security Management, Network Security, Network Monitoring
University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Risk Management Framework, Infrastructure Security, Cyber Attacks, Cyber Risk, Cyber Threat Intelligence, Cyber Security Policies, Public Safety and National Security, Cyber Security Assessment, Cyber Governance, Continuous Monitoring, Security Management, Incident Response, Security Strategy, Technology Roadmaps, Network Infrastructure, Technology Solutions, Transportation Operations, Infrastructure Architecture
ESSEC Business School
Skills you'll gain: Marketing Analytics, Business Analytics, Forecasting, Peer Review, Statistical Methods, Data Presentation, Predictive Analytics, R Programming, Customer Analysis, Information Technology, Digital Transformation, Advanced Analytics, Statistical Analysis, Communication, Market Research, Complex Problem Solving, Analytics, Business Analysis, Data Analysis, Value Propositions
In summary, here are 10 of our most popular attack+classification+and+analysis courses
- Applied Data Analytics: Edureka
- Network Security: ISC2
- Cybersecurity Case Studies and Capstone Project: IBM
- Advanced System Security Design: University of Colorado System
- Cyber Incident Response: Infosec
- Cyber Security – Technology and Governance: University of London
- Data Analysis with Python: University of Colorado Boulder
- AI for Cybersecurity: Johns Hopkins University
- Data Security: Cisco Learning and Certifications
- Threat Investigation: Cisco Learning and Certifications