Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "wireless network attacks"
DeepLearning.AI
Skills you'll gain: Natural Language Processing, Artificial Neural Networks, Tensorflow, Artificial Intelligence and Machine Learning (AI/ML), PyTorch (Machine Learning Library), Deep Learning, Applied Machine Learning, Text Mining, Machine Learning
Rutgers the State University of New Jersey
Skills you'll gain: Strategic Sourcing, Lean Six Sigma, Lean Manufacturing, Demand Planning, Procurement, Supplier Relationship Management, Manufacturing Operations, Forecasting, Process Improvement, Supplier Management, Operations Management, Purchasing, Supply Management, Operational Efficiency, Warehouse Management, Supply Chain Planning, Sales Management, Inventory and Warehousing, Inventory Management System, Transportation, Supply Chain, and Logistics
Imperial College London
Skills you'll gain: Linear Algebra, Dimensionality Reduction, NumPy, Regression Analysis, Calculus, Applied Mathematics, Probability & Statistics, Data Transformation, Jupyter, Data Science, Advanced Mathematics, Statistics, Numerical Analysis, Geometry, Statistical Analysis, Machine Learning Methods, Artificial Neural Networks, Algorithms, Data Manipulation, Machine Learning
Akamai Technologies, Inc.
Skills you'll gain: Routing Protocols, OSI Models, TCP/IP, General Networking, Network Protocols, Network Troubleshooting, Computer Networking, Networking Hardware, Network Security, Network Infrastructure, Network Model, Virtual Private Networks (VPN), Wireless Networks, Network Routers, Dynamic Host Configuration Protocol (DHCP), Intrusion Detection and Prevention, Network Analysis, Security Controls
Google
Skills you'll gain: Generative AI, Artificial Intelligence and Machine Learning (AI/ML), Productivity Software, Artificial Intelligence, Data Ethics, Security Awareness, Business Workflow Analysis, Innovation, Automation, Workflow Management, Information Privacy, Human Computer Interaction, Content Creation, Natural Language Processing, Complex Problem Solving
Skills you'll gain: ChatGPT, Generative AI, Artificial Intelligence, Data Ethics, OpenAI, Artificial Intelligence and Machine Learning (AI/ML), Deep Learning, Artificial Neural Networks, Application Deployment, IBM Cloud, Governance, Machine Learning, Business Transformation, Ethical Standards And Conduct, Computer Vision, Self Service Technologies, Information Architecture, Business Process Automation, Software Development Tools, Image Analysis
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Johns Hopkins University
Skills you'll gain: Shiny (R Package), Rmarkdown, Exploratory Data Analysis, Regression Analysis, Leaflet (Software), Version Control, Statistical Analysis, R Programming, Data Manipulation, Data Cleansing, Data Science, Statistical Inference, Predictive Modeling, Statistical Hypothesis Testing, Data Visualization, Plotly, Machine Learning Algorithms, Interactive Data Visualization, Probability & Statistics, Knitr
Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Zero Trust Network Access, Cyber Threat Intelligence, Malware Protection, Network Security, Infrastructure Security, Firewall, Cloud Security, Endpoint Security, Security Controls, Enterprise Security, Software As A Service, Cloud Computing, System Configuration
Akamai Technologies, Inc.
Skills you'll gain: SQL, Linux, Endpoint Security, Database Management, Incident Response, Relational Databases, Network Security, Database Systems, Vulnerability Scanning, Linux Administration, File Systems, Routing Protocols, OSI Models, Application Development, Linux Commands, TCP/IP, General Networking, Scripting, MySQL, Data Structures
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
Skills you'll gain: Git (Version Control System), GitHub, Version Control, Puppet (Configuration Management Tool), CI/CD, Containerization, Debugging, Bash (Scripting Language), Infrastructure as Code (IaC), Docker (Software), Continuous Deployment, Continuous Integration, Technical Communication, Network Troubleshooting, Linux Commands, Linux, Scripting, Automation, Python Programming, Computer Programming
In summary, here are 10 of our most popular wireless network attacks courses
- Sequence Models:Â DeepLearning.AI
- Supply Chain Management:Â Rutgers the State University of New Jersey
- Mathematics for Machine Learning:Â Imperial College London
- Networking Fundamentals:Â Akamai Technologies, Inc.
- Google AI Essentials:Â Google
- AI Foundations for Everyone:Â IBM
- IBM Cybersecurity Analyst:Â IBM
- Data Science:Â Johns Hopkins University
- Palo Alto Networks Cybersecurity Foundation:Â Palo Alto Networks
- Akamai Network Engineering:Â Akamai Technologies, Inc.