• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Online Degrees
  • Careers
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Cyber Threat Hunting
    Skip to search results

    Filter by

    Subject
    Required
     *

    Language
    Required
     *

    The language used throughout the course, in both instruction and assessments.

    Learning Product
    Required
     *

    Level
    Required
     *

    Duration
    Required
     *

    Skills
    Required
     *

    Subtitles
    Required
     *

    Educator
    Required
     *

    Results for "cyber threat hunting"

    • Status: Preview
      Preview
      G

      Google Cloud

      Modern Security Operations

      Skills you'll gain: Cyber Operations, Cyber Security Strategy, Cyber Threat Intelligence, Threat Management, Cybersecurity, Continuous Monitoring, Cyber Security Assessment, Threat Detection, DevOps, Security Information and Event Management (SIEM), Security Engineering, Incident Response, Site Reliability Engineering, Automation, Agile Methodology, Critical Thinking

      4.3
      Rating, 4.3 out of 5 stars
      ·
      11 reviews

      Beginner · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      K

      Kennesaw State University

      Road to the CISO – Culminating Project Course

      Skills you'll gain: Cyber Security Policies, Cyber Governance, Risk Management, Contingency Planning, Cyber Security Strategy, Security Management, Business Risk Management, Cybersecurity, Cyber Risk, Information Technology, Security Controls, Governance, Organizational Leadership, Organizational Structure

      4.8
      Rating, 4.8 out of 5 stars
      ·
      36 reviews

      Intermediate · Course · 1 - 3 Months

    • Status: Preview
      Preview
      E

      EC-Council

      In the Trenches: Security Operations Center

      Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Cyber Operations, Vulnerability Management, Cyber Attacks, Cybersecurity, Threat Detection, Threat Management, Intrusion Detection and Prevention, Security Information and Event Management (SIEM), Vulnerability Assessments, Network Security, Data Loss Prevention

      4.7
      Rating, 4.7 out of 5 stars
      ·
      51 reviews

      Beginner · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      U

      University of California, Irvine

      Data, Security, and Privacy

      Skills you'll gain: Security Awareness, Threat Management, Data Security, Computer Security Awareness Training, Safety and Security, Cyber Attacks, Cybersecurity, Personally Identifiable Information, Information Privacy, Data Ethics, Digital Communications, Data Management

      4.6
      Rating, 4.6 out of 5 stars
      ·
      44 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      M

      Microsoft

      Secure your Cloud Data

      Skills you'll gain: Microsoft Azure, Data Security, Cloud Security, Role-Based Access Control (RBAC), Network Security, Cloud Storage, Application Security, Firewall, Web Applications, Cloud Management, Key Management, Database Architecture and Administration, Identity and Access Management, Encryption, Threat Detection

      4.6
      Rating, 4.6 out of 5 stars
      ·
      18 reviews

      Intermediate · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      K

      Kennesaw State University

      The Business of Cybersecurity Capstone

      Skills you'll gain: Cyber Governance, Security Management, Risk Management, Incident Response, Business Planning, Governance, Security Controls, Organizational Strategy, Business Risk Management, IT Management, Cyber Security Strategy, Cyber Risk, Regulatory Compliance, Cyber Security Policies, Compliance Management, Business Ethics, Contingency Planning

      4.8
      Rating, 4.8 out of 5 stars
      ·
      52 reviews

      Beginner · Course · 1 - 3 Months

    • G

      Google Cloud

      Detect and Investigate Threats with Security Command Center

      Skills you'll gain: Threat Detection, Threat Management, Cyber Threat Hunting, Vulnerability Assessments, Cloud Security, Vulnerability Management, Security Management, Computer Security Incident Management, Security Information and Event Management (SIEM)

      Intermediate · Project · Less Than 2 Hours

    • Status: Free Trial
      Free Trial
      I

      Infosec

      Python for Command-and-control, Exfiltration and Impact

      Skills you'll gain: Threat Modeling, Cyber Operations, Threat Detection, Cybersecurity, Incident Response, Scripting, Command-Line Interface, Python Programming, Encryption, Network Analysis

      4.7
      Rating, 4.7 out of 5 stars
      ·
      40 reviews

      Intermediate · Course · 1 - 4 Weeks

    • P

      Packt

      MS-102: Microsoft 365 Administrator

      Skills you'll gain: Data Loss Prevention, Microsoft 365, Azure Active Directory, Authentications, Endpoint Security, Microsoft Azure, Multi-Factor Authentication, Vulnerability Management, Active Directory, Security Management, Cloud Security, Threat Management, Compliance Management, Multi-Tenant Cloud Environments, Personally Identifiable Information, Information Management, Data Security, User Accounts

      Intermediate · Course · 1 - 3 Months

    • Status: Preview
      Preview
      P

      Politecnico di Milano

      Water: an essential resource

      Skills you'll gain: Water Resources, Environmental Monitoring, Environmental Engineering, Risk Management Framework, Quality Assurance, Risk Analysis, Continuous Monitoring, Research, Civil Engineering, Environmental Science, Environmental Regulations, Chemical Engineering, Pollution Prevention, Threat Detection, Real Time Data, Computational Thinking, Microbiology, Applied Machine Learning, Artificial Intelligence

      4.7
      Rating, 4.7 out of 5 stars
      ·
      53 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      J

      Johns Hopkins University

      Securing AI and Advanced Topics

      Skills you'll gain: Generative AI, Anomaly Detection, Feature Engineering, Data Processing, Threat Modeling, Deep Learning, Security Testing, Cybersecurity, Artificial Intelligence, Reinforcement Learning, Artificial Neural Networks, Machine Learning, Performance Tuning

      4.7
      Rating, 4.7 out of 5 stars
      ·
      12 reviews

      Intermediate · Course · 1 - 3 Months

    • Status: Free
      Free
      C

      Coursera Project Network

      Analyze Network Traffic with TCPDump: Build a Logging Tool

      Skills you'll gain: Linux Commands, Linux, Scripting, Network Monitoring, Network Security, TCP/IP, Command-Line Interface, Network Analysis, Cybersecurity, Network Protocols

      4.6
      Rating, 4.6 out of 5 stars
      ·
      7 reviews

      Intermediate · Guided Project · Less Than 2 Hours

    1…333435…59

    In summary, here are 10 of our most popular cyber threat hunting courses

    • Modern Security Operations: Google Cloud
    • Road to the CISO – Culminating Project Course: Kennesaw State University
    • In the Trenches: Security Operations Center : EC-Council
    • Data, Security, and Privacy: University of California, Irvine
    • Secure your Cloud Data: Microsoft
    • The Business of Cybersecurity Capstone: Kennesaw State University
    • Detect and Investigate Threats with Security Command Center: Google Cloud
    • Python for Command-and-control, Exfiltration and Impact: Infosec
    • MS-102: Microsoft 365 Administrator: Packt
    • Water: an essential resource: Politecnico di Milano

    Other topics to explore

    Arts and Humanities
    338 courses
    Business
    1095 courses
    Computer Science
    668 courses
    Data Science
    425 courses
    Information Technology
    145 courses
    Health
    471 courses
    Math and Logic
    70 courses
    Personal Development
    137 courses
    Physical Science and Engineering
    413 courses
    Social Sciences
    401 courses
    Language Learning
    150 courses

    Coursera Footer

    Technical Skills

    • ChatGPT
    • Coding
    • Computer Science
    • Cybersecurity
    • DevOps
    • Ethical Hacking
    • Generative AI
    • Java Programming
    • Python
    • Web Development

    Analytical Skills

    • Artificial Intelligence
    • Big Data
    • Business Analysis
    • Data Analytics
    • Data Science
    • Financial Modeling
    • Machine Learning
    • Microsoft Excel
    • Microsoft Power BI
    • SQL

    Business Skills

    • Accounting
    • Digital Marketing
    • E-commerce
    • Finance
    • Google
    • Graphic Design
    • IBM
    • Marketing
    • Project Management
    • Social Media Marketing

    Career Resources

    • Essential IT Certifications
    • High-Income Skills to Learn
    • How to Get a PMP Certification
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Popular Data Analytics Certifications
    • What Does a Data Analyst Do?
    • Career Development Resources
    • Career Aptitude Test
    • Share your Coursera Learning Story

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • ECTS Credit Recommendations

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Manage Cookie Preferences
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok