Search result for Real-time threat detection Online Courses & Certifications
Get Course Alerts by Email
Learning Path: OpenCV: Master Image Processing with OpenCV 3
by Packt Publishing- 3.2
5.5 hours on-demand video
Develop interactive computer vision applications with the popular C++ libraries of OpenCV 3 OpenCV 3 is a native cross-platform C++ Library for computer vision, machine learning, and image processing. This has led to a very high demand for computer vision expertise. The highlights of this Learning Path are: Dive into the essentials of OpenCV and build your own projects...
$11.99
Manomotion Fundamentals - Hand Gesture Recognition
by Augmented Startups- 3.5
1 hour on-demand video
Hand Gesture Detection that gives you Super Powers! Using Manomotion Manual hand gesture detection and recognition is quite computationally expensive, So essentially, we've structured this training to reduce debugging, speed up your time to market and get you results sooner....
$9.99
Artificial Intelligence Projects with Python-HandsOn: 2-in-1
by Packt Publishing- 3.6
4 hours on-demand video
Hands-on projects that simplify your first steps into the world of artificial intelligence with Python Artificial Intelligence is one of the hottest fields in computer science right now and has taken the world by storm as a major field of research and development. You will solve real-world problems such as face detection, handwriting recognition, and more....
$9.99
MikroTik Security Engineer with LABS
by Maher Haddad- 0.0
12.5 hours on-demand video
This is most of the the time a challenge when it comes to deploy a security plan to your network. The goal of this course is to show you all different steps using real LAB scenarios of how to protect your MikroTik router(s) from any type of cyber attacks and do not let hackers to compromise your network....
$13.99
Chatfuel + Integromat = Ultimate Chatbot
by Jinhoe Lian- 4.4
3 hours on-demand video
It will never be a better time to upgrade your chatbot creation skills than today!...
$12.99
IT Security Fundamentals: CompTIA Security+ 2015
by LearnSmart LLC- 0.0
24.5 hours on-demand video
You will also spend time going through discussions on varieties of each, along with some real life examples. In this section understand SQL injection methodology, attacks, buffer overflow exploit, testing for SQL injection, countermeasures, and detection tools. Section 30: Intrusion Detection System (IDS) is a device or software that monitors network activities and system activities....
$199.99
Ethical Hacking & Penetration Testing with Kali Linux
by Packt Publishing- 0.0
14 hours on-demand video
Employ methods effectively used by real hackers to ensure the most effective penetration testing of your network; select and configure the most effective tools from Kali Linux to test network security; employ stealth to avoid detection in the network being tested, and recognize when stealthy attacks are being used against your network....
$12.99
Related searches
Data Science:Data Mining & Natural Language Processing in R
by Minerva Singh- 4.5
13 hours on-demand video
My course will help you implement the methods using real data obtained from different sources. Many courses use made-up data that does not empower students to implement R based data science in real life. After taking this course, you’ll easily use packages like caret, dplyr to work with real data in R....
$12.99
Learn Apache Solr with Big Data and Cloud Computing
by QScutter Tutorials- 3.1
5 hours on-demand video
Apache Solr, Zookeeper, Clusters, Replication, Cloud, Big data, Search algorithms and Much More Solr is the popular, blazing fast open source enterprise search platform from the Apache LuceneTMproject. Its major features include powerful full-text search, hit highlighting, faceted search, near real-time indexing, dynamic clustering, database integration, rich document (e. g. , Word, PDF) handling, and geospatial search....
$13.99
Process Mining: Data science in Action
by Wil van der Aalst- 4.7
Approx. 22 hours to complete
An example is the detection of non-conformance at the moment the deviation actually takes place. Another example is time prediction for running cases, i. , given a partially executed case the remaining processing time is estimated based on historic information of similar cases. Real Life Session 01: The Demo Scenario (7 min....