Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Information Systems Security, Intrusion Detection and Prevention, Endpoint Security, Network Infrastructure, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
- Status: Free Trial
University of Colorado System
Skills you'll gain: Windows Servers, Linux Administration, Contingency Planning, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, OSI Models, User Accounts, Group Policy, Security Management, Cyber Security Policies, Systems Administration, Virtualization, Red Hat Enterprise Linux, Information Technology, Information Systems Security
- Status: Free Trial
New York University
Skills you'll gain: Network Security, Firewall, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
- Status: Free Trial
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Intrusion Detection and Prevention, Security Management, Disaster Recovery
- Status: Free Trial
University of California, Irvine
Skills you'll gain: Security Strategy, Cyber Governance, Security Management, Cyber Risk, Compliance Management, Risk Management, Regulatory Compliance, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Data Governance, Program Standards, Computer Security
- Status: Free Trial
Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Incident Response, Cyber Threat Intelligence, Cyber Threat Hunting, Key Management, Data Security, Threat Modeling, Computer Security Incident Management, File Systems, Endpoint Security, Cryptography, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Linux, Malware Protection, Vulnerability Assessments, Encryption, Incident Management, Threat Management, Threat Detection
- Status: Free Trial
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Security Awareness, Cyber Attacks, Network Security, Vulnerability Assessments, Cloud Services, Data Security, Human Factors (Security)
Coursera Instructor Network
Skills you'll gain: Cybersecurity, Threat Management, Security Controls, Cyber Security Strategy, Threat Detection, Cyber Security Policies, Security Awareness, Computer Security Awareness Training, Cyber Risk, Data Security, Network Security, Security Management, Enterprise Security, Information Assurance, Incident Response, Data Integrity, Disaster Recovery
- Status: Free TrialStatus: AI skills
Google Cloud
Skills you'll gain: Cloud Security, Identity and Access Management, Intrusion Detection and Prevention, Computer Security Incident Management, Threat Management, Cyber Threat Hunting, Risk Management Framework, Cyber Attacks, Cyber Operations, Vulnerability Management, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Generative AI, DevSecOps, Cloud Computing, Data Security, Google Cloud Platform, Cybersecurity
- Status: Free Trial
Palo Alto Networks
Skills you'll gain: Network Security, Cloud Security, DevSecOps, Cybersecurity, Cloud-Native Computing, General Networking, TCP/IP, Zero Trust Network Access, Cryptography, Endpoint Security, Cyber Threat Intelligence, Cloud Computing Architecture, Malware Protection, Firewall, Cloud Computing, Encryption, Network Infrastructure, Security Information and Event Management (SIEM), Application Security, Infrastructure Security
- Status: Free Trial
Skills you'll gain: Cybersecurity, Technical Support and Services, Information Technology, Network Security, Cyber Security Strategy, Data Security, Computer Security Awareness Training, Cyber Security Policies
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Security Strategy, Cybersecurity, Mobile Security, Cyber Threat Intelligence, Network Security, Internet Of Things, Data Security, Emerging Technologies, Technology Strategies, Business, Enterprise Application Management
In summary, here are 10 of our most popular cyber threat hunting courses
- Computer Networks and Network Security:Â IBM
- Computer Security and Systems Management:Â University of Colorado System
- Real-Time Cyber Threat Detection and Mitigation:Â New York University
- Cyber Incident Response:Â Infosec
- Security Governance & Compliance:Â University of California, Irvine
- Cybersecurity Operations Fundamentals:Â Cisco Learning and Certifications
- Cyber Threats and Attack Vectors:Â University of Colorado System
- Cybersecurity Best Practices:Â Coursera Instructor Network
- Google Cloud Cybersecurity:Â Google Cloud
- Palo Alto Networks Cybersecurity:Â Palo Alto Networks