Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Penetration Testing, Application Security, Data Security, Security Controls, Vulnerability Assessments, Software Design, C and C++, Authorization (Computing), Java, Linux, Programming Principles, Debugging, Security Engineering, Personally Identifiable Information
Coursera Instructor Network
Skills you'll gain: Cyber Threat Intelligence, Cybersecurity, Penetration Testing, Threat Detection, Security Information and Event Management (SIEM), Incident Response, Generative AI, Data Ethics, Security Testing, Vulnerability Assessments, Prompt Engineering
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Threat Detection, Network Analysis, Cybersecurity, System Design and Implementation, Network Security, Machine Learning Software, Machine Learning Methods, Performance Testing, Machine Learning Algorithms, Machine Learning, Supervised Learning, Microsoft Windows
- Status: Free Trial
Skills you'll gain: Identity and Access Management, Endpoint Security, Network Security, Cybersecurity, Threat Detection, Cyber Attacks, Data Security, Cyber Security Strategy, Secure Coding, Firewall, Application Security, Authentications, Infrastructure Security, Security Controls, Authorization (Computing), Security Information and Event Management (SIEM), Data Governance, Security Testing, Virtual Private Networks (VPN)
- Status: NewStatus: Free Trial
Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Mobile Security, Cybersecurity, Threat Modeling, Penetration Testing, Cyber Threat Intelligence, Open Web Application Security Project (OWASP), Malware Protection, Threat Detection, Network Security, Cyber Attacks, MITRE ATT&CK Framework, Cyber Threat Hunting, Intrusion Detection and Prevention, Information Systems Security, Wireless Networks, Cryptography, Risk Management Framework
- Status: Free Trial
EC-Council
Skills you'll gain: Malware Protection, Cybersecurity, Data Security, Intrusion Detection and Prevention, Computer Security Awareness Training, Cyber Threat Intelligence, Data Integrity, Network Analysis, Microsoft Windows, Mac OS, Linux, Web Applications, File Systems
- Status: Free Trial
Skills you'll gain: Security Controls, Role-Based Access Control (RBAC), Authorization (Computing), Cyber Security Policies, Identity and Access Management, Data Access, Security Awareness, Authentications
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Intelligence, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Cybersecurity, Cyber Security Strategy, Threat Management, Continuous Monitoring, System Monitoring, Network Analysis, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, NIST 800-53, Applied Machine Learning
- Status: Free Trial
Palo Alto Networks
Skills you'll gain: Endpoint Security, Security Information and Event Management (SIEM), Zero Trust Network Access, Cybersecurity, Cyber Threat Intelligence, Threat Modeling, Security Engineering, Continuous Monitoring, IT Security Architecture, Threat Detection, Incident Response, Malware Protection, Automation, Data Lakes
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Cyber Threat Intelligence, Cybersecurity, Threat Modeling, MITRE ATT&CK Framework, Cyber Threat Hunting, Cyber Attacks, Risk Management Framework, Threat Detection, Cyber Risk, Vulnerability Scanning, Network Security, Vulnerability Assessments, Data Ethics, Network Analysis, TCP/IP
- Status: Free Trial
Cisco Learning and Certifications
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Event Monitoring, Threat Detection, General Networking, Network Security, Network Administration, Cybersecurity, Infrastructure Security, Data Management
University of Copenhagen
Skills you'll gain: Epidemiology, Pollution Prevention, Public Health, Environment Health And Safety, Health Disparities, Environmental Policy, Environmental Science, Environmental Monitoring, Health Assessment, Respiratory Care, Chronic Diseases, Mitigation, Vulnerability
In summary, here are 10 of our most popular cyber threat hunting courses
- Secure Coding Practices:Â University of California, Davis
- GenAI for Cybersecurity Analysts:Â Coursera Instructor Network
- Advanced Malware and Network Anomaly Detection:Â Johns Hopkins University
- Cybersecurity Architecture:Â IBM
- Certified Ethical Hacker (CEH) v.12:Â Packt
- Digital Forensics Essentials (DFE):Â EC-Council
- Access Control Concepts:Â ISC2
- Intrusion Detection:Â Johns Hopkins University
- Palo Alto Networks Security Operations Fundamentals:Â Palo Alto Networks
- Introduction to Ethical Hacking and Recon Techniques:Â Packt