Machine Learning and Emerging Technologies for Intrusion Detection

Start anytime. Learn at your own pace.

Reveal insights, drive decisions, advance your career.

Cybersecurity

Online Self-Paced

20 Hours

500

Instructor: Dr. Jason Crossland

  • Designed and taught by Jason Crossland
  • LIVE monthly seminars and office hours
  • Engaging learning including video walkthroughs and hands-on activities
  • Satisfaction guaranteed. Explore the course with no risk.
  • Save $300 with the Certificate vs. buying courses separately

Move beyond analytics to the algorithms, tools, and cyber incident response playbooks that power today’s best IDPS deployments.  In Johns Hopkins Engineering’s Machine Learning and Emerging Technology for Intrusion Detection course, created by senior APL engineer Jason Crossland, you will complete the final course in the Intrusion Detection certificate program.  

Each hands-on project will discuss and present various concepts of machine learning principles and algorithms used, anonymization, de-anonymization, and how “the onion router” (ToR) is used to obfuscate and hide a person’s Internet Protocol (IP) address.  We will conclude this course with a discussion on cybersecurity incident response (IR) management principles, prioritization approaches, and activities. The top five challenges for cyber IR management will be presented, and a case study reinforcing the importance of organizations having a cyber incident response plan will be provided. 
Imagine if no technologies, capabilities, or solutions existed to enhance IDPS activities or free cyber defenders, incident responders, and cybersecurity service providers (CSSPs) to focus on advanced and critical tasks such as identifying, detecting, protecting, responding, and recovering. Commercial IDPSs and related cybersecurity tools would advance more slowly, leaving our nation further behind cyber adversaries in adopting advanced tools, technologies, and processes needed to project cyber strength at scale.  

Powered by Engineering for Professionals

The #1 Ranked Online Grad Program for Computer Information Technology by U.S. News & World Report

Johns Hopkins Engineering’s Executive and Professional Education delivers executive education courses from the same faculty and support team behind Johns Hopkins Engineering for Professionals, the nation’s #1 online, part-time graduate program in computer information technology. This ranking includes our master’s programs in computer science, artificial intelligence, cybersecurity, information systems engineering, and data science.

This course follows an industry-standard hacking methodology and builds critical skills across the entire hacking lifecycle—from reconnaissance to exploitation and post-access activities. Through interactive assignments, guided instruction, reflective essays, monthly live seminars with the instructor, and case studies, you will learn: 

  • Train and tune ML models—supervised, unsupervised, and hybrid—to slash false-positives and surface true threats in host- and network-based systems 
  • Demystify clustering and neural-network principles so you can choose the right algorithm for each data set and explain your decision to leadership
  • Decode and defend against Tor traffic. Learn why encrypted, onion-routed flows slip past traditional sensors and design detection logic that respects privacy while blocking abuse 
  • Map NIST-aligned incident-response steps into actionable playbooks, sequencing the people and technologies you just refined 

Each module ends with a portfolio project—training a live classifier, mapping anonymized traffic, or drafting a rapid-response workflow—and all deliverables ladder into a faculty-judged capstone where you redesign an enterprise IDPS architecture using your new ML pipelines and ToR insights. 

Become equipped to deploy smarter models, outwit obfuscated attackers, and lead response teams with confidence. 

Save $300 and Earn the Full Certificate

Machine Learning and Emerging Technologies for Intrusion Detection is one of 3 courses in the full

The image is for illustrative purposes only. Actual certificate design subject to change,

Complete this course as well as:

and the capstone project to earn your Johns Hopkins Certificate of Achievement.

Say $300 when you purchase the full Certificate Program in Intrusion Detection instead of paying for each individually.

No Risk: Satisfaction Guaranteed

Feel confident in your learning journey! If the certificate content is too advanced, not advanced enough, or simply doesn’t meet your expectations, we’ve got you covered with our money-back guarantee. Just contact our team within 7 days from purchase to receive a full refund—no questions asked.

Meet Your Instructor

Jason Crossland

Johns Hopkins University, Johns Hopkins Applied Physics Laboratory

Jason Crossland has over 16 years of military commissioned and civilian experience in cyber security engineering, information assurance, information systems, and information technology. He served in the Air Force, where he was assigned to satellites, fiber-optics, and telecommunications networks, systems, and equipment. He currently works at the John Hopkins University Applied Physics Laboratory in the Critical Infrastructure Sector and as an instructor in the Johns Hopkins Engineering for Professionals program.

Jason is Here to Help!

Questions about course content? Looking for insight on intrusion detection? Stop by monthly Zoom office hours to talk with Jason and fellow students about what you’re learning in the course and the theoretical application of intrusion detection.

Prerequisites

The Certificate is designed for cybersecurity professionals and experienced students. A baseline understanding of cybersecurity concepts will be useful, but there are no formal prerequisites

Projects You’ll Build (With Expert Guidance)

Learners gain practical experience through case studies and reflective assignments that discuss and reinforce the concepts presented in each module.

  • Machine learning I: Study methods of integrating ML into IDPSs to gain high detection accuracy while minimizing false positives.  
  • Machine learning II: Compare and contrast two highly used ML applications that perform deep learning and artificial intelligence (AI) principles. 
  • The Onion Router (Tor): Understand how the leading anonymization network is often used to implement deanonymization attacks due to errors in usage and operation.  
  • NIST-CSF functions: Translate NIST-CSF functions into a sequenced incident response plan that integrates  ML approaches to detect misuses of ToR network. 
  • The Capstone Project: Analyze nine recent attack reports, identify detection gaps, recommend host- and network-level IDS/IPS solutions (with ML enhancements), and integrate them into a defense-in-depth architecture aligned to NIST CSF functions. The final deliverable is a high-stakes briefing to network engineering and C-suite stakeholders, including ROC visualizations, active-vs-passive response rationale, and a phased mitigation roadmap.

Course Delivery and Support

The courses are delivered entirely online through the industry-leading Canvas Learning Management System. This system is supported by the same instructional design team behind Johns Hopkins’ renowned Engineering for Professionals program, which serves thousands of online graduate students each year. Upon registration, you will receive an email with instructions to create your Hopkins Canvas account and access the videos, readings, files and quizzes.

Machine Learning and Emerging Technologies for Intrusion Detection

Cybersecurity

500

Online Self-Paced

20 Hours

2 CEUs

No Risk: Explore the Certificate for 7 Days