Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: New
Coursera Instructor Network
Skills you'll gain: Prompt Engineering, Risk Modeling, Risk Analysis, Continuous Monitoring, Generative AI, Project Risk Management, Risk Management Framework, Risk Management, Operational Risk, Data-Driven Decision-Making, Business Risk Management, Data Integration, Anomaly Detection, Artificial Intelligence, Threat Detection, Automation
Coursera Project Network
Skills you'll gain: Competitive Analysis, Business Strategy, Strategic Thinking, Market Analysis, Market Dynamics, Market Opportunities, New Business Development, Supplier Management, Company, Product, and Service Knowledge, Consumer Behaviour
- Status: NewStatus: Free Trial
Duke University
Skills you'll gain: Health Disparities, Health Equity, Environmental Issue, Advocacy, Environmental Science, Community Health, Health Care, Public Health, Patient Education And Counseling, Health Systems, Public Health and Disease Prevention, Systems Thinking, Healthcare Industry Knowledge, Health Policy, Emergency Response
Google Cloud
Skills you'll gain: Cloud Security, Google Cloud Platform, Cyber Security Policies, Cloud Management, Security Management, Vulnerability Assessments
- Status: NewStatus: Free Trial
Council on Foreign Relations
Skills you'll gain: Energy and Utilities, Social Justice, Environmental Issue, Mitigation, Environmental Resource Management, Environmental Policy, Emerging Technologies, Pollution Prevention, Environment, Technology Solutions, Environmental Science, Building Design, Artificial Intelligence
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Threat Management, Threat Detection, Cyber Security Policies, Intrusion Detection and Prevention, Network Troubleshooting, Firewall, Security Management, Infrastructure Security, Network Administration, System Configuration, Software Installation, System Implementation
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Security Assessment, Cybersecurity, Security Management, Cyber Attacks, Security Strategy, Threat Management, Malware Protection, Data Security, Vulnerability Assessments, Cyber Risk, Threat Detection, Vulnerability Management, Computer Security Awareness Training, Distributed Denial-Of-Service (DDoS) Attacks, Email Security
- Status: NewStatus: Free Trial
Skills you'll gain: Governance Risk Management and Compliance, Security Management, Risk Management, Compliance Management, Risk Appetite, Risk Analysis, Risk Mitigation, Business Risk Management, Cyber Governance, Compliance Auditing, Cyber Security Policies, Penetration Testing, Governance, Data Governance, Security Controls, Vulnerability Assessments, Security Awareness, Vendor Management
- Status: NewStatus: Free Trial
Skills you'll gain: Email Security, Cloud Security, Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Incident Management, Vulnerability Management, Risk Management Framework, Malware Protection, Security Management, Threat Management, Application Security, Cloud Computing, Cybersecurity, Cyber Attacks, Network Security, Disaster Recovery, Cyber Threat Intelligence, Vulnerability Assessments, Threat Detection
- Status: NewStatus: Free Trial
Skills you'll gain: Ansible, Puppet (Configuration Management Tool), Software-Defined Networking, Network Security, Network Administration, Security Awareness, Threat Modeling, Chef (Configuration Management Tool), Information Systems Security, Virtual Private Networks (VPN), JSON, Authentications, Computer Networking, Network Architecture, Authorization (Computing), Automation, Configuration Management, Application Programming Interface (API)
- Status: NewStatus: Free Trial
Skills you'll gain: Computer Security Incident Management, Incident Response, Incident Management, Vulnerability Management, Risk Management Framework, Security Management, Threat Management, Disaster Recovery, Vulnerability Assessments, Information Assurance, Cyber Security Policies, Computer Security Awareness Training, Continuous Monitoring, Security Controls, Technical Communication
Skills you'll gain: PostgreSQL, Data Maintenance, Database Administration, Database Architecture and Administration, SQL, Secure Coding, Database Management, Relational Databases, Query Languages, Security Controls, Data Access, Data Security, Role-Based Access Control (RBAC), Threat Detection
In summary, here are 10 of our most popular cyber threat hunting courses
- GenAI for Risk Managers: Advanced Risk Analysis Techniques:Â Coursera Instructor Network
- Using Porter’s Five Forces Model for Competitive Analysis : Coursera Project Network
- Climate and Health for Healthcare Professions:Â Duke University
- Securing Google Cloud with CFT Scorecard:Â Google Cloud
- Climate Change: Mitigation and Adaptation:Â Council on Foreign Relations
- Check Point Jump Start: Quantum Management:Â Check Point Software Technologies Ltd.
- Cybersecurity Specialist Capstone:Â IBM
- Security Governance, Compliance & Risk Management:Â Packt
- Certified Incident Handler (ECIH) v2:Â Packt
- Security Fundamentals & Network Automation:Â Packt