Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Contingency Planning, Risk Management, Cyber Security Strategy, Security Management, Enterprise Risk Management (ERM), Business Risk Management, IT Management, Cybersecurity, Governance, Cyber Risk, Information Technology, Staff Management, Organizational Leadership, Organizational Structure
- Status: Preview
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Network Monitoring
Skills you'll gain: Azure Active Directory, Data Loss Prevention, Endpoint Security, Cloud Security, Active Directory, Personally Identifiable Information, Multi-Factor Authentication, Data Security, Multi-Tenant Cloud Environments, User Provisioning, Single Sign-On (SSO), Security Controls, Threat Management, Role-Based Access Control (RBAC), User Accounts
- Status: Free
Coursera Project Network
Skills you'll gain: Linux Commands, Linux, TCP/IP, Scripting, Shell Script, Network Monitoring, Network Analysis, Network Security, Network Protocols
- Status: Free Trial
University of California, Irvine
Skills you'll gain: Data Security, System Design and Implementation, Data Ethics, Cybersecurity, Safety and Security, Information Technology, Information Privacy, Software Development Tools, Technology Strategies, Data Management, Digital Communications
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Security Management, Incident Response, Risk Management, Cyber Security Policies, Cyber Governance, Business Risk Management, Enterprise Risk Management (ERM), Cyber Security Strategy, Information Management, Business Ethics, Performance Measurement, Compliance Management, Governance, Business Planning, Organizational Strategy
- Status: Free Trial
Skills you'll gain: Threat Modeling, Cyber Operations, Threat Detection, Cybersecurity, Incident Response, Scripting, Command-Line Interface, Python Programming, Encryption, Network Analysis
- Status: Free Trial
University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Cybersecurity, Intrusion Detection and Prevention, Encryption, Proxy Servers, Information Privacy, Web Servers, System Configuration, Cloud Hosting
Coursera Project Network
Skills you'll gain: Job Analysis, Compensation Analysis, Company, Product, and Service Knowledge, Recruitment, Business Research, Research
- Status: Free Trial
Skills you'll gain: Splunk, Dashboard, Data Transformation, Data Manipulation, Data Analysis, Statistical Analysis, Query Languages, Data Visualization Software, Ad Hoc Reporting, Real Time Data, Data Modeling, Continuous Monitoring, Taxonomy
Skills you'll gain: Threat Detection, Threat Management, Cloud Security, Google Cloud Platform, Vulnerability Management, Vulnerability Assessments, Security Information and Event Management (SIEM), Public Cloud
- Status: Free Trial
Liberty Mutual Insurance
Skills you'll gain: Workers Compensation, Insurance Policies, Insurance, Product Knowledge, Claims Processing, Underwriting, Cyber Risk, Business Risk Management, Property Inspection, Risk Management
In summary, here are 10 of our most popular cyber threat hunting courses
- Road to the CISO – Culminating Project Course: Kennesaw State University
- In the Trenches: Security Operations Center : EC-Council
- MS-102: Microsoft 365 Administrator: Packt
- Analyze Network Traffic with TCPDump: Build a Logging Tool: Coursera Project Network
- Data, Security, and Privacy: University of California, Irvine
- The Business of Cybersecurity Capstone: Kennesaw State University
- Python for Command-and-control, Exfiltration and Impact: Infosec
- Security and Privacy in TOR Network: University of Colorado System
- Learn to Job Search with Indeed: Coursera Project Network
- Splunk Query Language and Data Analysis: EDUCBA