Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Intrusion Detection and Prevention, Anomaly Detection, Cyber Security Strategy, Threat Detection, Network Analysis, Network Security, Network Monitoring, NIST 800-53, Cloud Security
- Status: NewStatus: Free Trial
Whizlabs
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Identity and Access Management, Cloud Security, Network Security, Threat Detection, Amazon S3, Infrastructure Security, Data Security, Security Management, Vulnerability Management, Vulnerability Assessments, Application Security, Key Management, User Provisioning, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Authorization (Computing), Encryption
- Status: Free Trial
Skills you'll gain: Public Key Infrastructure, Cloud Security, Hardening, Infrastructure Security, Application Security, Information Systems Security, Network Security, Cyber Security Assessment, System Configuration, Cryptography, Encryption, Mobile Security
- Status: New
Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Intelligence, Cyber Security Strategy, Cybersecurity, Threat Modeling, Computer Security, Cyber Attacks, Threat Detection, Artificial Intelligence, Anomaly Detection, Data Ethics, Information Privacy, Innovation
- Status: Free Trial
Skills you'll gain: Risk Analysis, Risk Management, Incident Response, Business Continuity Planning, Security Management, Threat Modeling, Threat Management, Disaster Recovery, Vulnerability Assessments, Cyber Risk, Cyber Threat Intelligence, Continuous Monitoring, Cybersecurity, Vulnerability Management, Security Strategy, General Data Protection Regulation (GDPR)
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: DevSecOps, Secure Coding, DevOps, IT Security Architecture, Cloud-Native Computing, Azure DevOps, Software Architecture, Security Engineering, Hardening, Software Design, Kubernetes, Microsoft Azure, Cybersecurity, Web Applications, Infrastructure as Code (IaC), Containerization, API Design, Software Engineering, Role-Based Access Control (RBAC), Git (Version Control System)
Skills you'll gain: Authentications, Cryptography, Encryption, .NET Framework, Open Web Application Security Project (OWASP), Application Security, Vulnerability Assessments, Data Security, Data Validation, Cross Platform Development, Development Environment
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Threat Management, Threat Detection, Cyber Security Policies, Intrusion Detection and Prevention, Network Troubleshooting, Firewall, Security Management, Infrastructure Security, Network Administration, System Configuration, Software Installation, System Implementation
- Status: Free Trial
University of California San Diego
Skills you'll gain: Energy and Utilities, Mitigation, Social Justice, Community Organizing, International Relations, Pollution Prevention, Social Sciences, Community Development, Socioeconomics, Consumer Behaviour, Environmental Policy, Environment, Environmental Engineering, Natural Resource Management, Physical Science, Persuasive Communication, Economics, Transportation Operations, Corporate Sustainability, Public Policies
Skills you'll gain: Threat Detection, Vulnerability Management, Cyber Threat Hunting, Vulnerability Assessments, Cloud Security, Multi-Cloud, Intrusion Detection and Prevention, Threat Management, Google Cloud Platform, Enterprise Security
- Status: Free Trial
Skills you'll gain: Cloud Security, Intrusion Detection and Prevention, Email Security, Incident Response, Application Security, Cloud Computing, Computer Security Incident Management, Cyber Attacks, Cyber Threat Intelligence, Threat Detection, Web Applications, Malware Protection, Network Security, Threat Management, Security Information and Event Management (SIEM), Network Monitoring, Incident Management, Data Security, Authentications
- Status: Preview
Skills you'll gain: PostgreSQL, Data Maintenance, Database Administration, Database Architecture and Administration, SQL, Secure Coding, Database Management, Relational Databases, Query Languages, Security Controls, Data Access, Data Security, Role-Based Access Control (RBAC), Threat Detection
In summary, here are 10 of our most popular cyber threat hunting courses
- Advanced Network Analysis and Incident Response:Â Johns Hopkins University
- AWS: Security and Key Management:Â Whizlabs
- Security Engineering and Cryptography:Â Packt
- Generative AI and its Impact on Cybersecurity:Â Packt
- Risk Management and Incident Response:Â Packt
- DevSecOps:Â Macquarie University
- Writing Secure Code in ASP.NET:Â Packt
- Check Point Jump Start: Quantum Management:Â Check Point Software Technologies Ltd.
- Bending the Curve: Climate Change Solutions:Â University of California San Diego
- Getting Started with Security Command Center Enterprise:Â Google Cloud