Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "endpoint detection and response"
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Incident Response, Incident Management, Computer Security Incident Management, Cyber Security Strategy, Security Management, Cyber Attacks, Intrusion Detection and Prevention, Cyber Security Policies, Threat Detection, Disaster Recovery, Cyber Risk, Cybersecurity, Cyber Security Assessment, Crisis Management, Threat Management, Business Continuity, Safety and Security, Strategic Communication, Security Software, Regulation and Legal Compliance
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Endpoint Security, Threat Detection, Malware Protection, Security Management, Cybersecurity, Cyber Attacks, Remote Access Systems, Zero Trust Network Access, Application Deployment, Network Protocols, Software Installation, Systems Architecture, Linux
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Intrusion Detection and Prevention, Anomaly Detection, Cyber Security Strategy, Threat Detection, Network Analysis, Network Security, Network Monitoring, NIST 800-53, Cloud Security
- Status: Free Trial
MathWorks
Skills you'll gain: Computer Vision, Image Analysis, Deep Learning, Matlab, Data Visualization, Machine Learning Methods, Data Analysis, Data Validation
Skills you'll gain: OSI Models, TCP/IP, Vulnerability Scanning, General Networking, Network Protocols, Cyber Security Assessment, Network Security, Network Administration, Vulnerability Assessments, Firewall, Network Analysis, Scripting, System Configuration
- Status: Preview
Coursera Instructor Network
Skills you'll gain: API Design, Back-End Web Development, Secure Coding, Data Security, Application Programming Interface (API), Restful API, Server Side, IT Infrastructure, Application Security, Infrastructure Security, Data Integrity, Servers, OAuth, Cloud Security, Server Administration, System Configuration, Encryption, Authentications, Authorization (Computing)
- Status: Free Trial
New York University
Skills you'll gain: Network Security, Firewall, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
- Status: Free Trial
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Threat Management, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Threat Detection, Event Monitoring, Business Continuity, System Monitoring, Verification And Validation, Technical Communication
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Endpoint Detection and Response, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Anomaly Detection, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Network Analysis
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Threat Detection, Network Analysis, Cybersecurity, System Design and Implementation, Network Security, Machine Learning Software, Machine Learning Methods, Performance Testing, Machine Learning Algorithms, Machine Learning, Supervised Learning, Microsoft Windows
- Status: Free Trial
Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Cyber Threat Hunting, Cyber Threat Intelligence, Cyber Operations, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Network Security, Network Monitoring, Data Security, Network Analysis, Exploitation techniques, Malware Protection, Vulnerability Assessments, Operating Systems
- Status: Preview
Skills you'll gain: Fraud detection, Generative AI, Data Ethics, Generative Model Architectures, Responsible AI, Anomaly Detection, Personally Identifiable Information, Business Ethics, Regulatory Compliance, Deep Learning, Data Security, Artificial Neural Networks, Compliance Management, Information Privacy, Natural Language Processing
In summary, here are 10 of our most popular endpoint detection and response courses
- Cyber Security: Incident Response - Theory to Practice: Macquarie University
- Check Point Jump Start: Harmony Endpoint Security: Check Point Software Technologies Ltd.
- Advanced Network Analysis and Incident Response: Johns Hopkins University
- Deep Learning for Object Detection: MathWorks
- Nmap for Penetration Testing: From Beginner to Advanced: Packt
- Back-End Infrastructure: Servers, Secure APIs and Data: Coursera Instructor Network
- Real-Time Cyber Threat Detection and Mitigation: New York University
- Stages of Incident Response: Infosec
- Introduction to Intrusion Detection Systems (IDS): Johns Hopkins University
- Advanced Malware and Network Anomaly Detection: Johns Hopkins University