Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: New
Kennesaw State University
Skills you'll gain: Cyber Security Policies, Cybersecurity, Incident Response, Cyber Attacks, Computer Security Awareness Training, Network Security, Security Awareness, Remote Access Systems, Mobile Security, Malware Protection, Human Factors (Security), Email Security, Identity and Access Management
- Status: Preview
Coursera Instructor Network
Skills you'll gain: Cloud Security, Oracle Cloud, Identity and Access Management, Encryption, Infrastructure Security, Network Security, Data Security, Continuous Monitoring, Security Controls, Cloud Computing, Cloud Infrastructure, Security Strategy, Threat Detection, Data Encryption Standard, Authorization (Computing), Authentications
Skills you'll gain: Open Web Application Security Project (OWASP), API Design, Application Programming Interface (API), Application Security, Secure Coding, Security Testing, Threat Modeling, DevSecOps, OAuth, Cloud API, Restful API, Security Controls, Vulnerability Assessments, Authorization (Computing), Security Engineering, Cryptography, Authentications, Server Side, Encryption, Incident Response
Skills you'll gain: Google Cloud Platform, Intrusion Detection and Prevention, Network Monitoring, Network Security, Virtual Machines, Security Information and Event Management (SIEM), Cloud Infrastructure, General Networking, Threat Detection, Network Infrastructure, Load Balancing, System Configuration, Network Analysis
- Status: Preview
Institut Mines-Télécom
Skills you'll gain: Threat Modeling, Security Requirements Analysis, Open Web Application Security Project (OWASP), Cybersecurity, Cyber Attacks, Application Security, Security Testing, Vulnerability Assessments, Vulnerability Management, Secure Coding, SQL
- Status: New
Skills you'll gain: Generative AI, Scalability, Cloud Computing Architecture, Systems Architecture, Cloud Applications, Load Balancing, Large Language Modeling, Application Deployment, Distributed Computing, Software Architecture, Application Performance Management, Infrastructure as Code (IaC), Artificial Intelligence, Containerization, Threat Modeling, Security Engineering, MLOps (Machine Learning Operations), Disaster Recovery, Simulations
Google Cloud
Skills you'll gain: Cloud Security, Google Cloud Platform, Cyber Security Policies, Cloud Management, Security Management, Vulnerability Assessments
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Intrusion Detection and Prevention, Anomaly Detection, Cyber Security Strategy, Threat Detection, Network Analysis, Network Security, Network Monitoring, NIST 800-53, Cloud Security
- Status: NewStatus: Free Trial
Whizlabs
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Identity and Access Management, Cloud Security, Network Security, Threat Detection, Amazon S3, Infrastructure Security, Data Security, Security Management, Vulnerability Management, Vulnerability Assessments, Application Security, Key Management, User Provisioning, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Authorization (Computing), Encryption
- Status: Free Trial
Skills you'll gain: Public Key Infrastructure, Cloud Security, Hardening, Infrastructure Security, Application Security, Information Systems Security, Network Security, Cyber Security Assessment, System Configuration, Cryptography, Encryption, Mobile Security
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: DevSecOps, Secure Coding, DevOps, IT Security Architecture, Cloud-Native Computing, Azure DevOps, Software Architecture, Security Engineering, Hardening, Software Design, Kubernetes, Microsoft Azure, Cybersecurity, Web Applications, Infrastructure as Code (IaC), Containerization, API Design, Software Engineering, Role-Based Access Control (RBAC), Git (Version Control System)
- Status: Free Trial
Skills you'll gain: Risk Analysis, Risk Management, Incident Response, Business Continuity Planning, Security Management, Threat Modeling, Threat Management, Disaster Recovery, Vulnerability Assessments, Cyber Risk, Cyber Threat Intelligence, Continuous Monitoring, Cybersecurity, Vulnerability Management, Security Strategy, General Data Protection Regulation (GDPR)
In summary, here are 10 of our most popular cyber threat hunting courses
- An Employee's Guide to Cybersecurity:Â Kennesaw State University
- Demystifying Oracle Cloud Infrastructure (OCI) Security:Â Coursera Instructor Network
- A Detailed Guide to the OWASP Top 10:Â Packt
- Google Cloud Packet Mirroring with OpenSource IDS:Â Google Cloud
- Cybersécurité : comment sécuriser un site web: Institut Mines-Télécom
- Architecting AI Solutions – Scalable GenAI Systems: Packt
- Securing Google Cloud with CFT Scorecard:Â Google Cloud
- Advanced Network Analysis and Incident Response:Â Johns Hopkins University
- AWS: Security and Key Management:Â Whizlabs
- Security Engineering and Cryptography:Â Packt