Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
Coursera Instructor Network
Skills you'll gain: Large Language Modeling, Cybersecurity, Prompt Engineering, Cyber Security Strategy, Cyber Attacks, Threat Modeling, Risk Analysis, Application Security, Vulnerability Assessments, Network Security, Risk Mitigation, Natural Language Processing
- Status: Free Trial
University of Colorado System
Skills you'll gain: Risk Management Framework, Infrastructure Security, Cyber Security Policies, Continuous Monitoring, Cyber Security Assessment, Security Management, NIST 800-53, Cyber Governance, Cybersecurity, Cyber Security Strategy, Cyber Risk, Configuration Management
- Status: Free Trial
Skills you'll gain: Cyber Governance, Security Management, Incident Management, Cyber Security Strategy, Business Continuity Planning, Business Continuity, Disaster Recovery, IT Management, Information Systems Security, Cybersecurity, Governance, Cyber Risk, Cyber Security Policies, Security Controls, Asset Management, Security Requirements Analysis, Cyber Security Assessment, Information Assurance, Risk Analysis, Key Performance Indicators (KPIs)
- Status: Free Trial
Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Security Management, Penetration Testing, Cybersecurity, Authentications, Vulnerability Assessments, Encryption, Firewall, Identity and Access Management, Hardening, Threat Detection, Disaster Recovery, Public Key Infrastructure, Mobile Security, Risk Management Framework, Wireless Networks
- Status: Free Trial
University of London
Skills you'll gain: Network Security, OSI Models, TCP/IP, Threat Modeling, Network Protocols, Computer Networking, Cybersecurity, Application Security, Network Architecture, Cryptographic Protocols, Vulnerability Assessments, Network Infrastructure
- Status: NewStatus: Free Trial
Skills you'll gain: Threat Detection, Cybersecurity, Intrusion Detection and Prevention, Cyber Threat Intelligence, Network Infrastructure, Network Security, Network Architecture, General Networking, Endpoint Security, Malware Protection, System Monitoring, Incident Response, Email Security, Operating Systems, Identity and Access Management
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Personally Identifiable Information, Cyber Risk, Information Privacy, Safety and Security, Multi-Factor Authentication
- Status: Free Trial
University of Colorado System
Skills you'll gain: Firewall, Network Security, Intrusion Detection and Prevention, Information Systems Security, Security Controls, Infrastructure Security, Threat Detection, Linux Administration, Linux
- Status: Free Trial
Infosec
Skills you'll gain: Cyber Threat Hunting, Threat Detection, Cyber Security Strategy, System Monitoring, Cybersecurity, Cyber Operations, Continuous Monitoring, Network Security, Network Monitoring, Scripting, Scripting Languages
- Status: NewStatus: Free Trial
Skills you'll gain: Incident Response, Cybersecurity, Risk Management, Cyber Security Assessment, Cyber Governance, Secure Coding, Malware Protection, Threat Modeling, Governance Risk Management and Compliance, Application Security, Threat Detection, Compliance Management, Data Security, Penetration Testing, Infrastructure Security
- Status: Free Trial
Skills you'll gain: NIST 800-53, Risk Analysis, Business Risk Management, Security Management, Continuous Monitoring, Asset Management, Security Controls, System Monitoring, Risk Management, Cybersecurity, Cyber Risk, Cyber Security Policies, Enterprise Security, Threat Detection, Auditing
- Status: NewStatus: Free Trial
Board Infinity
Skills you'll gain: Cyber Risk, Risk Management Framework, Risk Management, Threat Management, Risk Mitigation, Vulnerability Management, Business Risk Management, Security Management, Enterprise Risk Management (ERM), Risk Analysis, Operational Risk, Risk Control, Risk Modeling, Risk Appetite, Cybersecurity, Governance Risk Management and Compliance, ISO/IEC 27001, Continuous Monitoring, Business Continuity, Governance
In summary, here are 10 of our most popular cyber threat hunting courses
- Introduction to Prompt Injection Vulnerabilities:Â Coursera Instructor Network
- Cybersecurity Policy for Water and Electricity Infrastructures:Â University of Colorado System
- Cybersecurity Leadership and Management:Â Infosec
- Introduction to IT Security:Â Akamai Technologies, Inc.
- Introduction to Network Security:Â University of London
- Cybersecurity Concepts:Â Packt
- Cybersecurity: What to Do When You Are a Victim:Â Kennesaw State University
- Secure Networked System with Firewall and IDS:Â University of Colorado System
- Python for Active Defense:Â Infosec
- Incident Response, Risk Management, and Compliance:Â Packt