Intrusion Detection and Prevention

Intrusion Detection and Prevention is the practice of managing security incidents by identifying and preventing malicious network activities. Coursera's Intrusion Detection and Prevention catalogue teaches you about the various principles, techniques and tools used in managing security events. You'll learn about different approaches to intrusion detection, from anomaly-based to signature-based methods, network traffic analysis, incident response strategies, and the design and deployment of intrusion prevention systems. This knowledge will allow you to effectively monitor and protect a network from potential threats, making you an indispensable asset in the world of cybersecurity.
32credentials
1online degree
97courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "intrusion detection and prevention"

  • Status: Free Trial

    University of Colorado System

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Malware Protection, Security Engineering, Network Security, Threat Detection, Firewall, Code Review, Network Routing, Proxy Servers, Linux, Internet Of Things

  • Status: Free Trial

    Skills you'll gain: Email Security, Incident Response, Computer Security Incident Management, Malware Protection, Cybersecurity, Network Security, Intrusion Detection and Prevention, Event Monitoring, Cyber Security Strategy, Threat Detection, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Wireless Networks

  • Status: New
    Status: Free Trial

    Skills you'll gain: Exploit development, Penetration Testing, Malware Protection, Network Monitoring, Object Oriented Programming (OOP), Cyber Security Assessment, Intrusion Detection and Prevention, Network Security, Network Protocols, Network Analysis, Scripting, Remote Access Systems, Python Programming, Command-Line Interface

  • Status: New

    Skills you'll gain: Cybersecurity, Cyber Governance, Cyber Attacks, Endpoint Security, Threat Detection, Incident Response, Cyber Security Assessment, Malware Protection, Network Security, Security Management, Information Systems Security, Computer Security, Intrusion Detection and Prevention, Threat Management, Firewall, Network Analysis, Encryption

  • Status: Free Trial

    Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Information Systems Security, Intrusion Detection and Prevention, Endpoint Security, Network Infrastructure, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention

  • Status: Free Trial

    Skills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Assessments, Intrusion Detection and Prevention, Application Security, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Virtual Local Area Network (VLAN), Cloud Security, Wireless Networks, Application Programming Interface (API)

  • Status: Free Trial

    Skills you'll gain: Virtual Private Networks (VPN), Firewall, Network Routing, Intrusion Detection and Prevention, Authentications, Network Security, Network Administration, Security Controls, User Accounts, System Configuration, Network Monitoring, Web Servers

  • Status: Free Trial

    Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Intrusion Detection and Prevention, Anomaly Detection, Cyber Security Strategy, Threat Detection, Network Analysis, Network Security, Network Monitoring, NIST 800-53, Cloud Security

  • Skills you'll gain: Vulnerability Assessments, Risk Management, Continuous Monitoring, Operational Risk, Threat Management, Intrusion Detection and Prevention, Business Risk Management, Cyber Risk, Vulnerability Management, Security Controls, Enterprise Risk Management (ERM), Risk Mitigation, Risk Analysis, Compliance Management, Security Information and Event Management (SIEM), Technical Communication, Network Monitoring, Network Analysis

  • Status: New
    Status: Free Trial

    Skills you'll gain: Network Troubleshooting, Distributed Denial-Of-Service (DDoS) Attacks, Network Administration, Hardening, Network Monitoring, Intrusion Detection and Prevention, Cybersecurity, Network Protocols, Firewall, General Networking, Network Performance Management, Authentications, Identity and Access Management, Encryption, Hardware Troubleshooting, Virtual Local Area Network (VLAN), Key Management, Wireless Networks, Data Integrity

  • Status: Free Trial

    Skills you'll gain: Cloud Security, Intrusion Detection and Prevention, Email Security, Incident Response, Application Security, Cloud Computing, Computer Security Incident Management, Cyber Attacks, Cyber Threat Intelligence, Threat Detection, Web Applications, Malware Protection, Network Security, Threat Management, Security Information and Event Management (SIEM), Network Monitoring, Data Security, Authentications

  • Status: Free Trial

    Skills you'll gain: Network Security, Intrusion Detection and Prevention, Command-Line Interface, Cybersecurity, Information Systems Security, Local Area Networks, Firewall, Windows PowerShell, Hardening, Threat Detection, Linux, Penetration Testing, Network Architecture, Wireless Networks, Vulnerability Assessments, System Configuration, IT Automation, Encryption, Network Analysis, Public Key Infrastructure