Search result for Threat detection Online Courses & Certifications
Get Course Alerts by Email
Microsoft Cybersecurity Pro Track: Threat Detection
by Cristian Calinescu- 0.0
6 hours on-demand video
Learn about Microsoft Threat Detection concepts, tools and services (with Hands-on Lab) and Threat Detection concepts In this course, we will examine the concepts of Threat Detection in an Enterprise using the Microsoft tools and security services for On-Premises, Hybrid and Cloud environments. List the capabilities of on-premise threat detection and mitigation tools...
$12.99
Real-Time Cyber Threat Detection and Mitigation
by Dr. Edward G. Amoroso- 4.7
Approx. 15 hours to complete
Required: “Intrusion Detection via Static Analysis,” Wagner and Dean Basics of Intrusion Detection Signature Versus Behavioral Detection...
CompTIA CySA+ (CS0-002) : Practice Tests (updated 2020)
by Mehul Patel- 3.8
The CompTIA Cybersecurity Analyst (CySA+) certification verifies that successful candidates have the knowledge and skills required to leverage intelligence and threat detection techniques, analyze and interpret data, identify and address vulnerabilities, suggest preventative measures, and effectively respond to and recover from incidents. Threat and Vulnerability Management...
$12.99
TOTAL: CompTIA CySA+ Cybersecurity Analyst (CS0-002)
by Total Seminars • 750,000+ Enrollments- 4.6
11.5 hours on-demand video
Are you looking to get into the exciting world of hackers, cybersecurity, threat hunting, and digital forensics? Leverage intelligence and threat detection techniques Threat and Vulnerability Management (22% of the exam) Threat data and intelligence Implementing intrusion prevention systems (IPS) and intrusion detection systems (IDS) Threat hunting Threat hunter Threat intelligence analyst...
$20.99
Detecting and Mitigating Cyber Threats and Attacks
by Greg Williams- 4.7
Approx. 12 hours to complete
This course looks at detection and mitigation of threats and attack vectors and discusses how to use tools and principles to protect information. Intrusion Detection and Prevention Detection Methods Intrusion Detection Systems Intrusion Detection Readings Week 2 - Intrusion Detection and Prevention Detection and Prevention tools Week 3 - Detection and Prevention Tools Understanding detection and mitigation...
Introduction to Cyber Security
by Arosha K. Bandara- 0.0
8
Threat landscape: terminology, cyber security threats, keeping up to dateAuthentication: access control, passwords, two-factor authenticationMalware: types of malware, attack vectors, preventing infectionNetworking and communications: fundamentals, security challenges, standardsCryptography: symmetric and asymmetric cryptography, applicationsNetwork security: firewalls, virtual private networks, intrusion detection / preventionWhen your defences fail: cyber security laws, recovering from attacksManaging security risks: risk analysis and management...
Free
Getting Started in Port Scanning Using Nmap and Kali Linux
by Andrew Mallett- 0.0
2.5 hours on-demand video
Cockpit is disabled by default leaving the system with one open port 22 and one closed port 9090 just what is needed for an effective Operating System detection scan. The detection phases used by nmap...
$12.99
Related searches
CompTIA Cybersecurity Analyst (CySA+) Express Bootcamp
by Joseph Holbrook (The Cloud Tech Guy)- 0.0
9.5 hours on-demand video
The behavioral analytics skills covered by CSA+ identify and combat malware, and advanced persistent threats (APTs), resulting in enhanced threat visibility across a broad attack surface. Configure and use threat detection tools. Threat Management 27%...
$12.99
SAP Cyber Security
by Alexander Polyakov- 0.0
3 hours on-demand video
SAP Cyber Security beyond Segregation of Duties - learn how to earn a 6-digit salary in the new cybersecurity market Hey SAP Security wannabes, Stop spending your time on old-school “SAP Security” trainings! Of course, segregation of duties and access control are important but we are in 2016 now! All the top consulting companies now offer SAP Cyber Security services ...
$15.99
Kibana Visualization Beginner To Pro (ELK & ElasticSearch)
by Ivan Westen- 3.6
2.5 hours on-demand video
Huge Demand: ELK stack is a technology through which you can setup variety of use cases of data mining such as log analytics, monitoring systems activity, anomaly detection etc. I am having great experience in Log and Event management, UTM and SIEM device Management, Vulnerability Management, Linux Administration, Open Source Threat Intelligence and Many more....
$11.99