Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "wireless network attacks"
Johns Hopkins University
Skills you'll gain: Shiny (R Package), Rmarkdown, Exploratory Data Analysis, Regression Analysis, Leaflet (Software), Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Statistical Inference, Predictive Modeling, Statistical Hypothesis Testing, Data Visualization, Plotly, Machine Learning Algorithms, Interactive Data Visualization, Probability & Statistics, Knitr
Skills you'll gain: Git (Version Control System), GitHub, Version Control, Puppet (Configuration Management Tool), CI/CD, Containerization, Debugging, Bash (Scripting Language), Infrastructure as Code (IaC), Docker (Software), Continuous Deployment, Continuous Integration, Technical Communication, Network Troubleshooting, Linux Commands, Linux, Scripting, Automation, Python Programming, Computer Programming
University of Michigan
Skills you'll gain: Web Scraping, Data Processing, Relational Databases, JSON, Database Design, SQL, Network Protocols, Databases, Web Services, Restful API, Programming Principles, Data Cleansing, Data Structures, Data Storytelling, Data Collection, Computer Programming, Python Programming, Data Manipulation, Development Environment, Computational Thinking
New York University
Skills you'll gain: Network Security, Firewall, IT Security Architecture, Distributed Denial-Of-Service (DDoS) Attacks, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
Skills you'll gain: ChatGPT, Generative AI, Artificial Intelligence, Data Ethics, OpenAI, Artificial Intelligence and Machine Learning (AI/ML), Deep Learning, Artificial Neural Networks, Application Deployment, IBM Cloud, Governance, Machine Learning, Business Transformation, Ethical Standards And Conduct, Computer Vision, Self Service Technologies, Information Architecture, Business Process Automation, Software Development Tools, Image Analysis
Google
Skills you'll gain: Generative AI, Artificial Intelligence and Machine Learning (AI/ML), Productivity Software, Artificial Intelligence, Data Ethics, Security Awareness, Business Workflow Analysis, Innovation, Automation, Workflow Management, Information Privacy, Human Computer Interaction, Content Creation, Natural Language Processing, Complex Problem Solving
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Malware Protection, Network Security, Threat Detection, Firewall, Code Review, Routing Protocols, Proxy Servers, Linux, Internet Of Things, Servers
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Skills you'll gain: Open Web Application Security Project (OWASP), Istio, Software Development Life Cycle, Linux Commands, Unit Testing, Application Deployment, Kubernetes, NoSQL, Bash (Scripting Language), MongoDB, Shell Script, Django (Web Framework), Object-Relational Mapping, OpenShift, Git (Version Control System), Cloud Applications, Containerization, GitHub, Jupyter, Grafana
Skills you'll gain: PyTorch (Machine Learning Library), Supervised Learning, Feature Engineering, Generative AI, Keras (Neural Network Library), Jupyter, Unsupervised Learning, Natural Language Processing, Reinforcement Learning, Deep Learning, Scikit Learn (Machine Learning Library), Machine Learning Algorithms, Data Manipulation, Tensorflow, Python Programming, Verification And Validation, Applied Machine Learning, ChatGPT, Artificial Neural Networks, Statistical Machine Learning
Johns Hopkins University
Skills you'll gain: Rmarkdown, Exploratory Data Analysis, Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Data Visualization, Statistical Programming, Ggplot2, Dimensionality Reduction, Data Visualization Software, Data Integration, Knitr, Data Analysis, Data Import/Export, General Science and Research, Data Sharing, Statistical Reporting
Skills you'll gain: Data Storytelling, Performance Measurement, Data-Driven Decision-Making, E-Commerce, Digital Marketing, Branding, Marketing Channel, Marketing Strategy and Techniques, Customer Analysis, Advertising, Marketing Analytics, Search Engine Marketing, Customer Engagement, Content Marketing, Brand Awareness, Search Engine Optimization, Social Media Marketing, Target Audience
In summary, here are 10 of our most popular wireless network attacks courses
- Data Science:Â Johns Hopkins University
- Google IT Automation with Python:Â Google
- Python for Everybody:Â University of Michigan
- Real-Time Cyber Threat Detection and Mitigation:Â New York University
- AI Foundations for Everyone:Â IBM
- Google AI Essentials:Â Google
- DDoS Attacks and Defenses:Â University of Colorado System
- IBM Cybersecurity Analyst:Â IBM
- IBM Back-End Development:Â IBM
- IBM AI Engineering:Â IBM