Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: NewStatus: Preview
Skills you'll gain: Penetration Testing, Metasploit, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cyber Security Assessment, Cyber Threat Intelligence, Generative AI, Cyber Operations, Data Ethics, Prompt Engineering, Automation
- Status: Free Trial
Skills you'll gain: LinkedIn, Data Analysis, Data Processing, Spreadsheet Software, Case Studies, Google Sheets, Analysis, Analytical Skills, Interviewing Skills, Data Storytelling, Data Visualization Software, Business Analytics, Artificial Intelligence, Portfolio Management, Data Cleansing, Data Visualization, Presentations
- Status: Free Trial
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Threat Management, Network Planning And Design, Firewall, Network Protocols, Cloud Computing, TCP/IP, Encryption
- Status: New
Skills you'll gain: Security Information and Event Management (SIEM), Threat Detection, Microsoft Azure, Anomaly Detection, Cyber Threat Intelligence, Security Management, Application Deployment, Role-Based Access Control (RBAC), Incident Response, Query Languages
- Status: NewStatus: Free Trial
Skills you'll gain: Vulnerability Assessments, Vulnerability Management, Malware Protection, Cyber Security Assessment, Threat Detection, Penetration Testing, Threat Management, Exploitation techniques, Infrastructure Security, Network Security, Information Systems Security
- Status: Free Trial
Google Cloud
Skills you'll gain: Google Cloud Platform, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Prompt Engineering, Kubernetes, Cloud Security, Containerization, OAuth, Cloud Storage, Cloud Services, Application Deployment, Virtual Machines, Security Controls, Cloud Computing, Application Development, Threat Management, Application Security, Data Security
- Status: NewStatus: Free Trial
Skills you'll gain: Vulnerability Management, Authentications, Security Controls, Vulnerability Assessments, Authorization (Computing), Continuous Monitoring, Identity and Access Management, Security Management, Information Systems Security, Role-Based Access Control (RBAC), Network Security, User Accounts, Multi-Factor Authentication, Threat Detection
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Internet Of Things, Cybersecurity, Cyber Security Policies, Mobile Security, Security Awareness, Wireless Networks, Information Privacy, Data Security, Emerging Technologies, Enterprise Security, Risk Management Framework
- Status: Preview
Yale University
Skills you'll gain: Political Sciences, Policy Analysis, Social Justice, Economics, Policy, and Social Studies, Social Sciences, European History, Law, Regulation, and Compliance, Governance, Ethical Standards And Conduct, Socioeconomics, Economics
- Status: Free Trial
Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cybersecurity, Cyber Security Strategy, Vulnerability Scanning, Cyber Attacks, Vulnerability Assessments, Network Security, Network Analysis
- Status: Free Trial
Skills you'll gain: Intrusion Detection and Prevention, Computer Security Incident Management, Cyber Threat Hunting, Cyber Attacks, Cybersecurity, Cyber Operations, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Security Information and Event Management (SIEM), Threat Detection, Cloud Security, Security Controls, Threat Management, System Monitoring, IT Automation, Record Keeping, Problem Management
- Status: Free Trial
University of Colorado System
Skills you'll gain: Infrastructure Security, Public Safety and National Security, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Strategy, Threat Modeling, Policty Analysis, Research, and Development, World History, Risk Management Framework
In summary, here are 10 of our most popular cyber threat hunting courses
- Generative AI for Penetration Testing: Red Team:Â LearnQuest
- Google Data Analytics Capstone: Complete a Case Study:Â Google
- Network Security:Â ISC2
- Microsoft Sentinel Skills:Â Packt
- Certified Ethical Hacker (CEH): Unit 3:Â Pearson
- Security in Google Cloud:Â Google Cloud
- (SSCP) Systems Security Certified Practitioner: Unit 3:Â Pearson
- Cybersecurity and the Internet of Things:Â Kennesaw State University
- Moral Foundations of Politics :Â Yale University
- Introduction to Ethical Hacking and Recon Techniques:Â Packt