Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "endpoint detection and response"
New York University
Skills you'll gain: Network Security, Firewall, IT Security Architecture, Distributed Denial-Of-Service (DDoS) Attacks, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
Skills you'll gain: Malware Protection, Endpoint Security, Mobile Security, Cloud Security, Application Security, Cloud Computing, Threat Detection, Cybersecurity, Information Systems Security, Virtualization, Virtual Machines, Intrusion Detection and Prevention, Containerization, Encryption
Multiple educators
Skills you'll gain: Dashboard, Pseudocode, Jupyter, Algorithms, Data Mining, Pandas (Python Package), Data Visualization Software, Correlation Analysis, Web Scraping, NumPy, R Programming, Probability & Statistics, Predictive Modeling, Big Data, Automation, Computer Programming Tools, GitHub, Data Analysis Software, Machine Learning Algorithms, Unsupervised Learning
DeepLearning.AI
Skills you'll gain: Deep Learning, Artificial Neural Networks, Tensorflow, Supervised Learning, Keras (Neural Network Library), Artificial Intelligence, Machine Learning, Python Programming, NumPy, Performance Tuning
Skills you'll gain: Fire And Life Safety, Safety Assurance, Safety Training, Safety and Security, System Monitoring, Threat Detection, Basic Electrical Systems, Building Services Engineering, Continuous Monitoring, Systems Integration, Architectural Engineering, System Configuration, Regulatory Compliance, Control Panels
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Computer Security Incident Management, Cyber Threat Intelligence, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Anomaly Detection, Cyber Security Strategy, Continuous Monitoring, System Monitoring, Network Analysis, Virtual Machines, Network Security, Information Systems Security, Network Monitoring, NIST 800-53, Applied Machine Learning, Machine Learning Algorithms
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Endpoint Detection and Response, Threat Management, Cyber Operations, Cybersecurity, Disaster Recovery, Cyber Threat Hunting, Security Management, Cyber Threat Intelligence, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Event Monitoring, Network Security, Network Monitoring, Data Security, Business Continuity
- Status: Free
Coursera Instructor Network
Skills you'll gain: Generative AI, Regulatory Compliance, Regulatory Requirements, Compliance Management, Governance, Governance Risk Management and Compliance, Risk Management, Financial Regulation, Anomaly Detection, Artificial Intelligence, Threat Detection, Artificial Intelligence and Machine Learning (AI/ML), Predictive Analytics
Skills you'll gain: Generative AI, Data Ethics, Anomaly Detection, Advanced Analytics, Threat Detection, Artificial Intelligence and Machine Learning (AI/ML), Deep Learning, Data Security, Applied Machine Learning, Artificial Neural Networks, Email Security, Natural Language Processing
Skills you'll gain: Microsoft Intune (Mobile Device Management Software), Azure Active Directory, Role-Based Access Control (RBAC), Microsoft Windows, Application Deployment, Endpoint Security, Group Policy, Active Directory, Enterprise Security, Identity and Access Management, Patch Management, Microsoft Azure, Cloud Applications, Mobile Security, System Configuration, Desktop Support, System Monitoring, Endpoint Detection and Response, Vulnerability Management, User Provisioning
Skills you'll gain: Incident Response, Computer Security Incident Management, Business Continuity, Security Management, Disaster Recovery, Risk Management Framework, Threat Management, Risk Management, Security Controls, Information Systems Security, Cybersecurity, Virtualization and Virtual Machines, Information Systems, Vulnerability Assessments, Cloud Computing
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
In summary, here are 10 of our most popular endpoint detection and response courses
- Real-Time Cyber Threat Detection and Mitigation: New York University
- Systems and Application Security: ISC2
- Data Science Foundations: IBM
- Neural Networks and Deep Learning: DeepLearning.AI
- Fire Detection & Fire Alarm Systems and Safety Signages: L&T EduTech
- Intrusion Detection: Johns Hopkins University
- Cyber Incident Response: Infosec
- GenAI for Fraud Detection and Compliance: Coursera Instructor Network
- Gen AI for Fraud Detection Analytics: Edureka
- MD-102: Endpoint Administrator: Packt