Introduction to Intrusion Systems
Start anytime. Learn at your own pace.
Reveal insights, drive decisions, advance your career.

Cybersecurity
Online Self-Paced
20 Hours
500
Instructor: Dr. Jason Crossland
- Designed and taught by Jason Crossland
- LIVE monthly seminars and office hours
- Engaging learning including video walkthroughs and hands-on activities
- Satisfaction guaranteed. Explore the course with no risk.
- Save $300 with the Certificate vs. buying courses separately
Cyberattacks lurk in terabytes of logs and flows until properly tuned intrusion detection systems (IDS) brings them to light.
Introduction to Intrusion Systems—the entry point in Johns Hopkins Engineering’s three-course certificate program in intrusion detection—builds the conceptual bedrock you need to spot, understand, and explain those threats.
Created by senior Applied Physics Laboratory engineer Jason Crossland, the course is designed for learners at all levels and delivers a practical, immersive introduction to intrusion detection systems. You will explore how real-world defenders use the principles of host and network intrusion detection systems to cyber resiliency and operational survivability processes, methods, and techniques.
Powered by Engineering for Professionals
The #1 Ranked Online Grad Program for Computer Information Technology by U.S. News & World Report
Johns Hopkins Engineering’s Executive and Professional Education delivers executive education courses from the same faculty and support team behind Johns Hopkins Engineering for Professionals, the nation’s #1 online, part-time graduate program in computer information technology. This ranking includes our master’s programs in computer science, artificial intelligence, cybersecurity, information systems engineering, and data science.
This course follows an industry-standard defensive approach and builds critical skills across the entire defensive cyber lifecycle—from identify and detect to protect, then respond and recover activities. Through interactive assignments, guided instruction, reflective essays, monthly live seminars, and case studies, you will learn:
- IDS types and components
- Risk and threat correlations and dependencies
- Host and network IDS and intrusion prevention systems characteristics
- Host integrity attack detection
- Hardware and side-channel attack description
- Static and dynamic malware detection
- Signature and anomalies in hosts and network IDS
- NetFlow and establishing a baseline
- Type I and type II errors
By the end of the course, you will know exactly which IDS architecture to recommend, how to justify it to leadership, and articulate the risk it mitigates—skills prized by SOC analysts, incident responders, systems engineers, and managers who govern security budgets.
Save $300 and Earn the Full Certificate
Introduction to Intrusion Systems is one of 3 courses in the full
The image is for illustrative purposes only. Actual certificate design subject to change,
Complete this course as well as:
and the capstone project to earn your Johns Hopkins Certificate of Achievement.
Say $300 when you purchase the full Certificate Program in Intrusion Detection instead of paying for each individually.
No Risk: Satisfaction Guaranteed
Feel confident in your learning journey! If the certificate content is too advanced, not advanced enough, or simply doesn’t meet your expectations, we’ve got you covered with our money-back guarantee. Just contact our team within 7 days from purchase to receive a full refund—no questions asked.
Meet Your Instructor
Jason Crossland
Johns Hopkins University, Johns Hopkins Applied Physics Laboratory

Jason Crossland has over 16 years of military commissioned and civilian experience in cyber security engineering, information assurance, information systems, and information technology. He served in the Air Force, where he was assigned to satellites, fiber-optics, and telecommunications networks, systems, and equipment. He currently works at the John Hopkins University Applied Physics Laboratory in the Critical Infrastructure Sector and as an instructor in the Johns Hopkins Engineering for Professionals program.
Jason is Here to Help!
Questions about course content? Looking for insight on intrusion detection? Stop by monthly Zoom office hours to talk with Jason and fellow students about what you’re learning in the course and the theoretical application of intrusion detection.
Prerequisites
The Certificate is designed for cybersecurity professionals and experienced students. No prior cybersecurity experience is required. A baseline understanding of cybersecurity concepts will be helpful, but there are no formal prerequisites.
Projects You’ll Build (With Expert Guidance)
Learners gain practical experience through case studies and reflective assignments that discuss and reinforce the concepts presented in each module.
- Tool-comparison briefs: Study open-source HIDS options such as Tripwire and OSSEC, then write short decision memos recommending the right tool for a given mission or budget.
- Insider-threat case study: Using supplied host-event traces, you will learn to pinpoint tell-tale artifacts (unexpected process launches, checksum changes) that flag an internal adversary.
- Host-integrity attack analysis: Experience a guided exercise on BIOS/TPM and side-channel exploits, learn how hardware-level compromise evades poorly placed IDS controls, and what integrity checks prevent it.
- Hybrid-IDS architecture walk-through: Explore Suricata and Snort to see how signature and anomaly engines corroborate the same event and enrich context identification.
- NetFlow baselining drill: Graph flow data and learn to distinguish normal traffic from flash crowd and DDoS precursors.
Course Delivery and Support
The courses are delivered entirely online through the industry-leading Canvas Learning Management System. This system is supported by the same instructional design team behind Johns Hopkins’ renowned Engineering for Professionals program, which serves thousands of online graduate students each year. Upon registration, you will receive an email with instructions to create your Hopkins Canvas account and access the videos, readings, files and quizzes.
Introduction to Intrusion Systems
Cybersecurity
500
Online Self-Paced
20 Hours
2 CEUs
No Risk: Explore the Certificate for 7 Days