Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
Skills you'll gain: Intrusion Detection and Prevention, Computer Security Incident Management, Cyber Threat Hunting, Cyber Attacks, Cybersecurity, Cyber Operations, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Security Information and Event Management (SIEM), Threat Detection, Cloud Security, Security Controls, Threat Management, System Monitoring, IT Automation, Record Keeping, Problem Management
- Status: Preview
Kennesaw State University
Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Business Continuity, Cryptography, Secure Coding, Systems Development Life Cycle, Security Controls, Law, Regulation, and Compliance, Infrastructure Security, Safety and Security, Identity and Access Management, Governance, Risk Management
- Status: NewStatus: Free Trial
Skills you'll gain: Vulnerability Management, Authentications, Security Controls, Vulnerability Assessments, Authorization (Computing), Continuous Monitoring, Identity and Access Management, Security Management, Information Systems Security, Role-Based Access Control (RBAC), Network Security, User Accounts, Multi-Factor Authentication, Threat Detection
- Status: Preview
Edureka
Skills you'll gain: Cyber Security Assessment, Malware Protection, Automation, Human Machine Interfaces
- Status: Free Trial
Board Infinity
Skills you'll gain: Business Continuity Planning, Incident Response, Cybersecurity, Risk Mitigation, Cyber Threat Hunting, Risk Management Framework, Cyber Risk, Risk Management, Risk Analysis, Network Security, Threat Management, IT Management, Vulnerability Management, Security Management, Enterprise Risk Management (ERM), Cyber Security Strategy, Cyber Security Policies, Business Risk Management, Cyber Threat Intelligence, Computer Security Incident Management
- Status: Free Trial
Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cybersecurity, Cyber Security Strategy, Vulnerability Scanning, Cyber Attacks, Vulnerability Assessments, Network Security, Network Analysis
- Status: Preview
Yale University
Skills you'll gain: Political Sciences, Policy Analysis, Social Justice, Economics, Policy, and Social Studies, Social Sciences, European History, Law, Regulation, and Compliance, Governance, Ethical Standards And Conduct, Socioeconomics, Economics
- Status: NewStatus: Free Trial
Skills you'll gain: IT Management, Information Assurance, Test Planning
- Status: NewStatus: Free Trial
Skills you'll gain: Kubernetes, Application Security, Containerization, Threat Detection, Encryption, Infrastructure Security, Security Engineering, API Gateway, Network Security, Hardening, Scenario Testing, Continuous Monitoring, Authorization (Computing), Authentications
- Status: Free Trial
University of Colorado System
Skills you'll gain: Infrastructure Security, Public Safety and National Security, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Strategy, Threat Modeling, Policty Analysis, Research, and Development, World History, Risk Management Framework
- Status: Free Trial
Vanderbilt University
Skills you'll gain: Prompt Engineering, ChatGPT, Prompt Patterns, Generative AI, Crisis Management, LLM Application, Productivity, Incident Response, Responsible AI, OpenAI, AI Personalization, Data Ethics, Computer Security Incident Management, Artificial Intelligence, Personalized Service, Large Language Modeling, Business Ethics, Information Privacy, Threat Modeling, Cybersecurity
- Status: Free Trial
Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Zero Trust Network Access, Malware Protection, Firewall, Cyber Threat Intelligence, Endpoint Security, Cloud Security, System Configuration, Cloud Computing, Software As A Service, Cryptography, Authentications, Artificial Intelligence
In summary, here are 10 of our most popular cyber threat hunting courses
- Detect, Respond, and Recover from Cloud Cybersecurity Attacks:Â Google Cloud
- Cybersecurity and Its Ten Domains:Â Kennesaw State University
- (SSCP) Systems Security Certified Practitioner: Unit 3:Â Pearson
- Industrial Cybersecurity:Â Edureka
- Cisco Cybersecurity Fundamentals:Â Board Infinity
- Introduction to Ethical Hacking and Recon Techniques:Â Packt
- Moral Foundations of Politics :Â Yale University
- The Pearson Complete Course for CISM Certification: Unit 5:Â Pearson
- Certified Kubernetes Security Specialist (CKS): Unit 8:Â Pearson
- Homeland Security & Cybersecurity Connection - It's Not About the Terrorists:Â University of Colorado System