Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls, Software Design Patterns
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Email Security, Wireless Networks, Mobile Security, Incident Response, Cybersecurity, Personally Identifiable Information, Cyber Attacks, Firewall, General Networking, Threat Detection, Computer Security Awareness Training, Proxy Servers, Computer Security Incident Management, Network Security, Security Awareness, Cyber Risk, Virtual Private Networks (VPN), Information Privacy, Authentications, Infrastructure Security
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Intelligence, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Cybersecurity, Cyber Security Strategy, Threat Management, Continuous Monitoring, System Monitoring, Network Analysis, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, NIST 800-53, Applied Machine Learning
- Status: Free Trial
Skills you'll gain: Cryptography, Security Requirements Analysis, Network Architecture, Network Security, Internet Of Things, Cybersecurity, Web Services, Encryption, Embedded Systems, Network Protocols, Public Key Cryptography Standards (PKCS), Computer Networking, Threat Modeling, Simple Object Access Protocol (SOAP), TCP/IP, Restful API, Information Privacy, OSI Models
- Status: Free Trial
Skills you'll gain: Cloud Security, Data Management, Cloud Computing Architecture, Records Management, Security Management, Cloud Computing, Cyber Security Policies, Microsoft Azure, Data Security, Disaster Recovery, Data Governance, Information Assurance, Security Controls, Information Privacy, General Data Protection Regulation (GDPR)
- Status: Free Trial
University of Colorado System
Skills you'll gain: Contingency Planning, Disaster Recovery, Business Continuity Planning, Security Management, Cyber Security Policies, Enterprise Security, Compliance Auditing, Systems Administration, Governance, Security Controls, Patch Management, Auditing, Continuous Monitoring, Information Systems Security, Unix, Procedure Development, Incident Response, Change Management
Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Configuration Management, Data Ethics, Data Integrity, Identity and Access Management
- Status: Free Trial
Google Cloud
Skills you'll gain: Cloud Security, Risk Management Framework, Data Security, DevSecOps, Personally Identifiable Information, Cloud Management, Security Management, ISO/IEC 27001, Cloud Computing, Information Privacy, NIST 800-53, General Data Protection Regulation (GDPR), Infrastructure as Code (IaC), Security Controls, Cybersecurity, Identity and Access Management, Platform As A Service (PaaS), Threat Detection
- Status: Free Trial
Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Risk Management, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Network Security, Authorization (Computing), Threat Management, Security Strategy, Enterprise Risk Management (ERM), Business Risk Management, Cyber Security Policies
- Status: Free Trial
Arizona State University
Skills you'll gain: Cyber Attacks, Data Security, Safety and Security, Cybersecurity, Computer Security Awareness Training, Information Systems Security, Content Creation, Media and Communications, Storytelling, Productivity, Digital Communications, Creativity, Web Content, Interpersonal Communications, Digital Design, Personal Development, Self-Awareness, De-escalation Techniques, Stress Management, Health Technology
- Status: NewStatus: Free Trial
Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Cybersecurity, Threat Modeling, Malware Protection, Penetration Testing, Threat Detection, Cyber Attacks, Network Security, Intrusion Detection and Prevention, Information Systems Security, Security Awareness, Network Protocols, Authentications
Kennesaw State University
Skills you'll gain: Cybersecurity, Interviewing Skills, Cyber Security Strategy, Cyber Security Policies, Organizational Structure, Cyber Governance, Workforce Development, Security Management, Professional Networking, Training and Development
In summary, here are 10 of our most popular cyber threat hunting courses
- Fundamentals of Computer Network Security:Â University of Colorado System
- Cybersecurity Awareness for Everyone:Â Kennesaw State University
- Intrusion Detection:Â Johns Hopkins University
- Web Connectivity and Security in Embedded Systems:Â EIT Digital
- Cybersecurity Management and Compliance:Â Microsoft
- Planning, Auditing and Maintaining Enterprise Systems:Â University of Colorado System
- Security Concepts and Practices:Â ISC2
- Strategies for Cloud Security Risk Management:Â Google Cloud
- Tools for Security Specialists:Â Codio
- Digital Intelligence for Everyone:Â Arizona State University