Intrusion Detection and Prevention

Intrusion Detection and Prevention is the practice of managing security incidents by identifying and preventing malicious network activities. Coursera's Intrusion Detection and Prevention catalogue teaches you about the various principles, techniques and tools used in managing security events. You'll learn about different approaches to intrusion detection, from anomaly-based to signature-based methods, network traffic analysis, incident response strategies, and the design and deployment of intrusion prevention systems. This knowledge will allow you to effectively monitor and protect a network from potential threats, making you an indispensable asset in the world of cybersecurity.
34credentials
1online degree
96courses

Most popular

Trending now

New releases

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "intrusion detection and prevention"

  • Status: Free Trial

    Johns Hopkins University

    Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Intelligence, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Cybersecurity, Cyber Security Strategy, Threat Management, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Applied Machine Learning, Network Analysis, Data Analysis

  • Status: Free Trial

    Johns Hopkins University

    Skills you'll gain: Anomaly Detection, Generative AI, Fraud detection, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Security Strategy, Threat Modeling, Email Security, System Design and Implementation, Network Security, Jupyter, Authentications, Deep Learning, Machine Learning Software

  • Status: Free Trial

    Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Cybersecurity, Cyber Threat Hunting, Continuous Monitoring, Network Security, Network Monitoring, Document Management, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols

  • Status: New
    Status: Free Trial

    Skills you'll gain: Cybersecurity, Threat Management, Cyber Attacks, Threat Detection, Cloud Security, Disaster Recovery, Network Security, Malware Protection, Data Security, Intrusion Detection and Prevention, Hardening, Systems Architecture, Encryption

  • Status: New
    Status: Free Trial

    Skills you'll gain: Intrusion Detection and Prevention, Continuous Monitoring

  • Status: Free Trial

    Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Management, Security Information and Event Management (SIEM), Data Integrity, Technical Communication

What brings you to Coursera today?

  • Status: Free Trial

    Skills you'll gain: Vulnerability Management, Azure Active Directory, Cloud Security, Distributed Denial-Of-Service (DDoS) Attacks, Penetration Testing, Generative AI, Vulnerability Assessments, Intrusion Detection and Prevention, Security Testing, Single Sign-On (SSO), Microsoft Azure, Cyber Security Policies, Security Management, Network Security, Identity and Access Management, Generative Model Architectures, Data Management, Cybersecurity, Cyber Threat Intelligence, System Monitoring

  • Status: Free Trial

    Skills you'll gain: Network Security, Hardening, Network Protocols, Cloud Security, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Vulnerability Assessments, Computer Networking, Network Infrastructure, Firewall, Cloud Computing, Virtual Private Networks (VPN)

  • Status: New
    Status: Preview

    Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Security Information and Event Management (SIEM), Intrusion Detection and Prevention, Threat Detection, Anomaly Detection, Computer Security Incident Management, Scripting, Cyber Operations, Event Monitoring, Network Analysis, Automation, Machine Learning Methods, Machine Learning Algorithms

  • Status: New
    Status: Preview

    Skills you'll gain: Cybersecurity, Information Systems Security, Cyber Threat Intelligence, Data Ethics, Deep Learning, Intrusion Detection and Prevention, Artificial Intelligence and Machine Learning (AI/ML), Malware Protection, Natural Language Processing, Artificial Intelligence, Threat Detection, Anomaly Detection, Machine Learning, Supervised Learning

  • Status: New
    Status: Free Trial

    Skills you'll gain: Mobile Security, Anomaly Detection, Criminal Investigation and Forensics, Cyber Security Strategy, Cyber Threat Intelligence, Threat Detection, Investigation, Cyber Attacks, File Systems, Intrusion Detection and Prevention, Fraud detection, Mobile Development, Cybersecurity, Applied Machine Learning, Malware Protection, Cyber Security Policies, Apple iOS, Threat Modeling, Artificial Intelligence and Machine Learning (AI/ML), Data Security

  • Status: New
    Status: Free Trial

    Skills you'll gain: Hardening, Distributed Denial-Of-Service (DDoS) Attacks, Incident Response, Network Architecture, Network Security, Computer Security Incident Management, Intrusion Detection and Prevention, Incident Management, Network Protocols, Threat Detection, Event Monitoring, Threat Management, Network Infrastructure, Infrastructure Security, Cybersecurity, System Monitoring, Operating Systems, Linux, Bash (Scripting Language), Databases

What brings you to Coursera today?

Leading partners

  • Packt
  • Google Cloud
  • Pearson
  • Google
  • Infosec
  • Johns Hopkins University
  • EC-Council
  • IBM