Intrusion Detection and Prevention

Intrusion Detection and Prevention is the practice of managing security incidents by identifying and preventing malicious network activities. Coursera's Intrusion Detection and Prevention catalogue teaches you about the various principles, techniques and tools used in managing security events. You'll learn about different approaches to intrusion detection, from anomaly-based to signature-based methods, network traffic analysis, incident response strategies, and the design and deployment of intrusion prevention systems. This knowledge will allow you to effectively monitor and protect a network from potential threats, making you an indispensable asset in the world of cybersecurity.
32credentials
1online degree
95courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "intrusion detection and prevention"

  • Status: Free Trial

    Skills you'll gain: Network Security, Cryptography, Firewall, Cybersecurity, Intrusion Detection and Prevention, Virtual Private Networks (VPN), Cloud Security, Cyber Attacks, Public Key Infrastructure, Encryption, Threat Modeling, Network Architecture, Dynamic Host Configuration Protocol (DHCP), Human Factors (Security), Security Awareness, Virtual Local Area Network (VLAN), Network Switches

  • Status: Free Trial

    Skills you'll gain: Open Web Application Security Project (OWASP), Mobile Security, Network Security, Cybersecurity, Cryptography, Exploit development, Penetration Testing, Intrusion Detection and Prevention, Vulnerability Assessments, Wireless Networks, Encryption, Secure Coding, Application Security, Threat Modeling, Web Applications, Cloud Security, Internet Of Things

  • Status: Free Trial

    Skills you'll gain: Cyber Threat Hunting, Incident Response, Computer Security Incident Management, Cybersecurity, Network Security, Cyber Security Policies, Threat Detection, Security Controls, Threat Management, Intrusion Detection and Prevention, Firewall, Security Information and Event Management (SIEM), Continuous Monitoring, Endpoint Security, Network Monitoring, Malware Protection

  • Status: Free Trial

    Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Cyber Threat Hunting, Cyber Threat Intelligence, Cyber Operations, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Network Security, Network Monitoring, Data Security, Network Analysis, Exploitation techniques, Malware Protection, Vulnerability Assessments, Operating Systems

  • Status: Free Trial

    Johns Hopkins University

    Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Threat Intelligence, Cyber Security Assessment, Cybersecurity, Operating Systems, Malware Protection, Vulnerability Assessments, Security Controls, Intrusion Detection and Prevention, System Programming, Computer Architecture

  • Status: Free Trial

    Skills you'll gain: Threat Modeling, Security Controls, Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Vulnerability Management, Cybersecurity, Hardening, Network Security, Stakeholder Communications, Vulnerability Assessments, Security Information and Event Management (SIEM), TCP/IP, SQL, Relational Databases, Data Security, Cloud Security, Bash (Scripting Language), Debugging, Information Systems Security Assessment Framework (ISSAF)

  • Status: Free Trial

    Skills you'll gain: Virtual Private Networks (VPN), Linux Administration, Public Key Infrastructure, Linux, Intrusion Detection and Prevention, Firewall, Remote Access Systems, Authentications, Authorization (Computing), Network Security, Security Controls, Identity and Access Management, File Management, Systems Administration, Cybersecurity, Encryption, Information Technology, Disaster Recovery

  • Status: Free Trial

    Skills you'll gain: Threat Detection, Cybersecurity, Intrusion Detection and Prevention, Cyber Threat Intelligence, Network Infrastructure, Network Security, Network Architecture, General Networking, Endpoint Security, Malware Protection, System Monitoring, Incident Response, Email Security, Operating Systems, Identity and Access Management

  • Status: Free Trial

    Skills you'll gain: Incident Response, Disaster Recovery, Incident Management, Security Management, Cyber Operations, Business Continuity Planning, Safety and Security, Change Control, Threat Management, Security Information and Event Management (SIEM), Patch Management, Security Controls, Cybersecurity, Threat Detection, Intrusion Detection and Prevention, Hardening, Configuration Management, Continuous Monitoring, Vulnerability Management

  • Status: New

    Skills you'll gain: Cyber Threat Hunting, Threat Detection, Incident Response, Cloud Security, Intrusion Detection and Prevention, Microsoft Azure, Security Information and Event Management (SIEM), Malware Protection, Endpoint Security, Azure Active Directory, Anomaly Detection, Email Security, Identity and Access Management, Automation

  • Status: Free Trial

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Exploitation techniques, Vulnerability Assessments, MITRE ATT&CK Framework, Intrusion Detection and Prevention, Threat Detection, Application Security, Technical Communication, Infrastructure Security, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Virtual Local Area Network (VLAN), Payment Card Industry (PCI) Data Security Standards, Scripting, Technical Writing, NIST 800-53, Automation, Technical Consulting

  • Status: Free

    Check Point Software Technologies Ltd.

    Skills you'll gain: Threat Detection, Cyber Security Policies, Intrusion Detection and Prevention, Network Troubleshooting, Firewall, Security Management, Infrastructure Security, Network Administration, System Configuration, Technical Support and Services, Software Installation