Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: NewStatus: Preview
Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Threat Detection, Zero Trust Network Access, Cyber Threat Hunting, MITRE ATT&CK Framework, Cyber Threat Intelligence, Intrusion Detection and Prevention, IT Security Architecture, Threat Management, Cybersecurity, Security Controls, Continuous Monitoring, Anomaly Detection, System Monitoring, Identity and Access Management, Virtual Machines
- Status: Free Trial
New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
- Status: Preview
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
- Status: New
Macquarie University
Skills you'll gain: DevSecOps, Secure Coding, Cloud-Native Computing, Software Architecture, Security Engineering, Software Design, Microsoft Azure, Cybersecurity, DevOps, Kubernetes, Infrastructure as Code (IaC), Web Applications, Azure DevOps, Containerization, API Design, Docker (Software), Software Engineering, Role-Based Access Control (RBAC), Dependency Analysis, Git (Version Control System)
- Status: New
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Cyber Threat Hunting, Threat Management, Cybersecurity, Google Gemini, Continuous Monitoring, Vulnerability Management, Incident Response, Infrastructure Security, Generative AI Agents
- Status: New
Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Cyber Threat Hunting, Threat Management, Endpoint Detection and Response, Incident Response, Security Awareness, Computer Security Incident Management, Continuous Monitoring, Google Gemini, Vulnerability Management, Infrastructure Security, Risk Management Framework, Cloud Security, Generative AI Agents, Data Integration
- Status: Free Trial
University at Buffalo
Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Incident Response, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Cyber Security Assessment, Threat Detection, Information Assurance, Network Security, Risk Management Framework, Cloud Security, Authentications
- Status: New
Macquarie University
Skills you'll gain: Cryptography, Encryption, Data Security, Cybersecurity, Application Security, Key Management, Network Security, Public Key Infrastructure, Data Encryption Standard, Security Engineering, Blockchain, Wireless Networks, Security Management, Virtual Private Networks (VPN), Intellectual Property, Data Integrity, Authentications, Hardware Architecture, Emerging Technologies
- Status: Free Trial
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Threat Detection, Threat Management, Amazon Web Services, Incident Response, Continuous Monitoring, Cloud Security, Identity and Access Management, Amazon Elastic Compute Cloud, Network Security, Event Monitoring
- Status: New
Macquarie University
Skills you'll gain: Responsible AI, Security Controls, Application Security, Cyber Attacks, Cyber Threat Intelligence, Cybersecurity, Data Security, DevSecOps, Security Engineering, Artificial Intelligence, Threat Modeling, Cyber Governance, Artificial Intelligence and Machine Learning (AI/ML), Risk Management, Encryption, Application Programming Interface (API), Machine Learning, Governance, Regulation and Legal Compliance, Applied Machine Learning
Skills you'll gain: Secure Coding, Application Security, Open Web Application Security Project (OWASP), Security Engineering, Cybersecurity, Security Requirements Analysis, Security Testing, Vulnerability Assessments, Code Review, Software Design, Encryption, Vulnerability Management, Data Security, Cryptography, Continuous Monitoring, Authentications, Development Testing, System Monitoring, Authorization (Computing)
- Status: New
Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Threat Management, Cyber Threat Hunting, Incident Response, Continuous Monitoring, Google Gemini, Vulnerability Assessments, Infrastructure Security, Cloud Security, Interactive Data Visualization, Generative AI
In summary, here are 10 of our most popular cyber threat hunting courses
- Mastering Endpoint Security & Threat Defense : Starweaver
- Cyber Attack Countermeasures: New York University
- Cyber Security Technologies: Illinois Tech
- Cyber Security: DevSecOps: Macquarie University
- Google Threat Intelligence - Português Brasileiro: Google Cloud
- Google Threat Intelligence - Bahasa Indonesia: Google Cloud
- Cyber Security in Manufacturing : University at Buffalo
- Cyber Security: Applied Cryptography: Macquarie University
- AWS: Threat Detection, Logging and Monitoring: Whizlabs
- Cyber Security: Security of AI: Macquarie University