Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Preview
Google Cloud
Skills you'll gain: Cyber Operations, Cyber Security Strategy, Cyber Threat Intelligence, Threat Management, Cybersecurity, Continuous Monitoring, Cyber Security Assessment, Threat Detection, DevOps, Security Information and Event Management (SIEM), Security Engineering, Incident Response, Site Reliability Engineering, Automation, Agile Methodology, Critical Thinking
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Security Policies, Cyber Governance, Risk Management, Contingency Planning, Cyber Security Strategy, Security Management, Business Risk Management, Cybersecurity, Cyber Risk, Information Technology, Security Controls, Governance, Organizational Leadership, Organizational Structure
- Status: Preview
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Cyber Operations, Vulnerability Management, Cyber Attacks, Cybersecurity, Threat Detection, Threat Management, Intrusion Detection and Prevention, Security Information and Event Management (SIEM), Vulnerability Assessments, Network Security, Data Loss Prevention
- Status: Free Trial
University of California, Irvine
Skills you'll gain: Security Awareness, Threat Management, Data Security, Computer Security Awareness Training, Safety and Security, Cyber Attacks, Cybersecurity, Personally Identifiable Information, Information Privacy, Data Ethics, Digital Communications, Data Management
- Status: Free Trial
Microsoft
Skills you'll gain: Microsoft Azure, Data Security, Cloud Security, Role-Based Access Control (RBAC), Network Security, Cloud Storage, Application Security, Firewall, Web Applications, Cloud Management, Key Management, Database Architecture and Administration, Identity and Access Management, Encryption, Threat Detection
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Governance, Security Management, Risk Management, Incident Response, Business Planning, Governance, Security Controls, Organizational Strategy, Business Risk Management, IT Management, Cyber Security Strategy, Cyber Risk, Regulatory Compliance, Cyber Security Policies, Compliance Management, Business Ethics, Contingency Planning
Skills you'll gain: Threat Detection, Threat Management, Cyber Threat Hunting, Vulnerability Assessments, Cloud Security, Vulnerability Management, Security Management, Computer Security Incident Management, Security Information and Event Management (SIEM)
- Status: Free Trial
Skills you'll gain: Threat Modeling, Cyber Operations, Threat Detection, Cybersecurity, Incident Response, Scripting, Command-Line Interface, Python Programming, Encryption, Network Analysis
Skills you'll gain: Data Loss Prevention, Microsoft 365, Azure Active Directory, Authentications, Endpoint Security, Microsoft Azure, Multi-Factor Authentication, Vulnerability Management, Active Directory, Security Management, Cloud Security, Threat Management, Compliance Management, Multi-Tenant Cloud Environments, Personally Identifiable Information, Information Management, Data Security, User Accounts
- Status: Preview
Politecnico di Milano
Skills you'll gain: Water Resources, Environmental Monitoring, Environmental Engineering, Risk Management Framework, Quality Assurance, Risk Analysis, Continuous Monitoring, Research, Civil Engineering, Environmental Science, Environmental Regulations, Chemical Engineering, Pollution Prevention, Threat Detection, Real Time Data, Computational Thinking, Microbiology, Applied Machine Learning, Artificial Intelligence
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Generative AI, Anomaly Detection, Feature Engineering, Data Processing, Threat Modeling, Deep Learning, Security Testing, Cybersecurity, Artificial Intelligence, Reinforcement Learning, Artificial Neural Networks, Machine Learning, Performance Tuning
- Status: Free
Coursera Project Network
Skills you'll gain: Linux Commands, Linux, Scripting, Network Monitoring, Network Security, TCP/IP, Command-Line Interface, Network Analysis, Cybersecurity, Network Protocols
In summary, here are 10 of our most popular cyber threat hunting courses
- Modern Security Operations: Google Cloud
- Road to the CISO – Culminating Project Course: Kennesaw State University
- In the Trenches: Security Operations Center : EC-Council
- Data, Security, and Privacy: University of California, Irvine
- Secure your Cloud Data: Microsoft
- The Business of Cybersecurity Capstone: Kennesaw State University
- Detect and Investigate Threats with Security Command Center: Google Cloud
- Python for Command-and-control, Exfiltration and Impact: Infosec
- MS-102: Microsoft 365 Administrator: Packt
- Water: an essential resource: Politecnico di Milano