Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "network attack mitigation"
Skills you'll gain: Git (Version Control System), GitHub, Version Control, Cloud Services, Debugging, Puppet (Configuration Management Tool), Infrastructure as Code (IaC), Bash (Scripting Language), Configuration Management, CI/CD, Cloud Computing, Technical Communication, Docker (Software), Unit Testing, Scripting, Network Troubleshooting, Web Services, Python Programming, Restful API, Programming Principles
Skills you'll gain: Data Literacy, Data Mining, Big Data, Cloud Computing, Data Analysis, Data Science, Digital Transformation, Data-Driven Decision-Making, Deep Learning, Machine Learning, Artificial Intelligence
DeepLearning.AI
Skills you'll gain: Natural Language Processing, Supervised Learning, Markov Model, Text Mining, Dimensionality Reduction, Artificial Intelligence and Machine Learning (AI/ML), Artificial Neural Networks, PyTorch (Machine Learning Library), Deep Learning, Tensorflow, Machine Learning Methods, Data Processing, Feature Engineering, Machine Learning Algorithms, Artificial Intelligence, Algorithms, Keras (Neural Network Library), Linear Algebra, Data Cleansing, Probability & Statistics
Akamai Technologies, Inc.
Skills you'll gain: SQL, Linux, Endpoint Security, Database Management, Incident Response, Relational Databases, Network Security, Database Systems, Vulnerability Scanning, Linux Administration, File Systems, Routing Protocols, OSI Models, Application Development, Remote Access Systems, Linux Commands, TCP/IP, Scripting, MySQL, Data Structures
Johns Hopkins University
Skills you'll gain: Shiny (R Package), Rmarkdown, Exploratory Data Analysis, Regression Analysis, Leaflet (Software), Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Statistical Inference, Statistical Hypothesis Testing, Predictive Modeling, Data Wrangling, Data Visualization, Plotly, Machine Learning Algorithms, Plot (Graphics), Knitr
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Intrusion Detection and Prevention, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
- Status: New
Skills you'll gain: PyTorch (Machine Learning Library), Keras (Neural Network Library), Deep Learning, Reinforcement Learning, Unsupervised Learning, Image Analysis, Data Manipulation, Tensorflow, Verification And Validation, Generative AI, Artificial Neural Networks, Data Processing, Applied Machine Learning, Artificial Intelligence and Machine Learning (AI/ML), Computer Vision, Artificial Intelligence, Scientific Visualization, Time Series Analysis and Forecasting, Predictive Modeling, Natural Language Processing
Imperial College London
Skills you'll gain: Linear Algebra, Dimensionality Reduction, NumPy, Regression Analysis, Calculus, Applied Mathematics, Probability & Statistics, Feature Engineering, Jupyter, Advanced Mathematics, Data Science, Statistics, Machine Learning Algorithms, Machine Learning Methods, Statistical Analysis, Artificial Neural Networks, Algorithms, Data Manipulation, Python Programming, Machine Learning
Skills you'll gain: Systems Administration, Cloud Infrastructure, IT Infrastructure, Lightweight Directory Access Protocols, Active Directory, Disaster Recovery, Server Administration, Data Storage Technologies, Cloud Computing, Servers, System Configuration, Technical Support and Services, Virtualization, User Accounts
Rutgers the State University of New Jersey
Skills you'll gain: Strategic Sourcing, Lean Six Sigma, Lean Manufacturing, Demand Planning, Procurement, Supplier Relationship Management, Forecasting, Process Improvement, Supplier Management, Operations Management, Customer Demand Planning, Purchasing, Production Process, Supply Management, Operational Efficiency, Warehouse Management, Supply Chain Planning, Inventory and Warehousing, Inventory Management System, Transportation, Supply Chain, and Logistics
Skills you'll gain: Istio, Open Web Application Security Project (OWASP), Software Development Life Cycle, Linux Commands, Unit Testing, Application Deployment, NoSQL, Kubernetes, Bash (Scripting Language), MongoDB, Shell Script, Django (Web Framework), Object-Relational Mapping, OpenShift, Git (Version Control System), Cloud Applications, Containerization, GitHub, Jupyter, Grafana
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Threat Management, Network Planning And Design, Firewall, Network Protocols, Cloud Computing, TCP/IP, Encryption
In summary, here are 10 of our most popular network attack mitigation courses
- Google IT Automation with Python:Â Google
- What is Data Science? :Â IBM
- Natural Language Processing:Â DeepLearning.AI
- Akamai Network Engineering:Â Akamai Technologies, Inc.
- Data Science:Â Johns Hopkins University
- IBM Cybersecurity Analyst:Â IBM
- IBM Deep Learning with PyTorch, Keras and Tensorflow:Â IBM
- Mathematics for Machine Learning:Â Imperial College London
- System Administration and IT Infrastructure Services:Â Google
- Supply Chain Management:Â Rutgers the State University of New Jersey