Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
Skills you'll gain: IT Security Architecture, Information Systems Security Assessment Framework (ISSAF), Information Systems Security, Zero Trust Network Access, Risk Management Framework, Application Security, Computer Security, Threat Modeling, Cybersecurity, Vulnerability Assessments, Network Security, Cyber Security Strategy, Security Controls, Information Assurance, Data Security, Cyber Security Assessment, Cyber Risk, Data Integrity, Identity and Access Management
Skills you'll gain: Network Security, OSI Models, TCP/IP, Network Troubleshooting, Network Protocols, Network Administration, General Networking, Network Infrastructure, Network Engineering, Network Routers, Command-Line Interface, Dynamic Host Configuration Protocol (DHCP), Local Area Networks, Wireless Networks, Network Switches
- Status: Free
DeepLearning.AI
Skills you'll gain: Large Language Modeling, Security Testing, Threat Modeling, Application Security, Data Loss Prevention, Continuous Monitoring, Threat Detection, Security Controls, Prompt Engineering, System Monitoring, Personally Identifiable Information, Anomaly Detection, Generative AI, Data Security
- Status: Free
Google Cloud
Skills you'll gain: Security Information and Event Management (SIEM), Security Management, Event Monitoring, Threat Detection, Continuous Monitoring, System Monitoring, Google Cloud Platform
- Status: Free Trial
Skills you'll gain: Hardware Architecture, Security Engineering, Internet Of Things, Encryption, Information Systems Security, Vulnerability Assessments, Cybersecurity, Threat Modeling, Data Security, Security Requirements Analysis, Vulnerability Management, Information Privacy
Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Cyber Security Assessment, Network Security, Penetration Testing, Network Administration, Software Installation, System Configuration, Cyber Security Policies, Web Applications, Authentications, Microsoft Windows, Integration Testing, Linux
- Status: NewStatus: Free Trial
Packt
Skills you'll gain: Threat Management, Vulnerability Assessments, Incident Response, Computer Security Incident Management, Vulnerability Management, Threat Detection, Cyber Security Assessment, Cyber Threat Intelligence, Security Management, Security Information and Event Management (SIEM), Infrastructure Security, Network Analysis
University of Copenhagen
Skills you'll gain: International Relations, Political Sciences, Environmental Issue, Environmental Policy, Advocacy, Systems Thinking, Community Organizing, Environment, Social Sciences, Lobbying, Public Policies, Innovation, Governance
Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), TCP/IP, Network Protocols, Vulnerability Assessments, Cyber Security Assessment, Windows PowerShell, Active Directory, Network Security, Network Analysis, Microsoft Windows, Wireless Networks, Scripting, Virtual Environment
- Status: Free Trial
University of Michigan
Skills you'll gain: Debugging, Unit Testing, Integrated Development Environments, Development Testing, Technical Communication, Python Programming, File Management
- Status: New
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Security Testing, Cyber Security Assessment, Unix, Application Security, Vulnerability Assessments, Secure Coding, Unix Commands, Microsoft Windows, System Programming, Linux, Debugging, Computer Architecture, OS Process Management
- Status: NewStatus: Free Trial
Board Infinity
Skills you'll gain: Incident Response, Risk Management Framework, Cyber Risk, Risk Management, Security Management, Enterprise Risk Management (ERM), Business Risk Management, Cyber Threat Intelligence, Governance Risk Management and Compliance, Continuous Monitoring, Cyber Security Strategy, Security Information and Event Management (SIEM), Threat Detection, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Key Performance Indicators (KPIs)
In summary, here are 10 of our most popular cyber threat hunting courses
- Fundamentals of Information System Security Architecture:Â LearnQuest
- Cisco CCST Networking - Video Training Series:Â Packt
- Quality and Safety for LLM Applications:Â DeepLearning.AI
- Chronicle SIEM: Multi Event Rules:Â Google Cloud
- Implementing Security in IoT and Edge Devices:Â LearnQuest
- Nessus Scanner - Network Scanning from Beginner to Advanced:Â Packt
- Security Operations:Â Packt
- Making Democracy Fit for Climate:Â University of Copenhagen
- Intermediate Ethical Hacking Hands-on Training:Â Packt
- Debugging: Hunting and Squashing Bugs:Â University of Michigan