Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
Skills you'll gain: Google Cloud Platform, Intrusion Detection and Prevention, Network Monitoring, Network Security, Virtual Machines, Security Information and Event Management (SIEM), Cloud Infrastructure, General Networking, Threat Detection, Network Infrastructure, Load Balancing, System Configuration, Network Analysis
- Status: New
Skills you'll gain: Generative AI, Cloud Computing Architecture, Systems Architecture, Cloud-Native Computing, Scalability, Solution Architecture, Large Language Modeling, Cloud Platforms, Artificial Intelligence and Machine Learning (AI/ML), Security Engineering, Threat Modeling, System Monitoring, Containerization, MLOps (Machine Learning Operations), Simulations, Disaster Recovery
Google Cloud
Skills you'll gain: Cloud Security, Google Cloud Platform, Cyber Security Policies, Cloud Management, Security Management, Vulnerability Assessments
- Status: Free Trial
Skills you'll gain: Identity and Access Management, Cloud Security, Kubernetes, Encryption, Google Cloud Platform, Security Controls, Data Security, Authorization (Computing), Application Security, Threat Detection, Cloud Computing, OAuth, Vulnerability Scanning, Cloud Storage, Virtual Machines, Authentications
- Status: NewStatus: Free Trial
Whizlabs
Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Cloud Security, Amazon S3, Key Management, Threat Detection, Network Security, Data Security, Vulnerability Assessments, Encryption, Amazon Elastic Compute Cloud, Authentications, Public Key Infrastructure
Skills you'll gain: Cryptography, Authentications, Application Security, .NET Framework, Threat Modeling, Data Security, Authorization (Computing), Vulnerability Management, Security Controls, Application Development, Data Validation, File Management, SQL
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Vulnerability Assessments, Security Management, Vulnerability Management, Cybersecurity, Threat Modeling, Data Security, Cyber Attacks, Cyber Security Assessment, Threat Management, Cyber Risk, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Payment Card Industry (PCI) Data Security Standards, Email Security, Network Infrastructure
- Status: Free Trial
Google Cloud
Skills you'll gain: Cloud Security, Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Data Security, Network Security, Cybersecurity, Cloud Computing, Authorization (Computing), Infrastructure Security, Threat Detection, Identity and Access Management, Google Cloud Platform, Encryption
- Status: Free Trial
University of California San Diego
Skills you'll gain: Energy and Utilities, Social Justice, Mitigation, Socioeconomics, International Relations, Electric Power Systems, Social Sciences, Cultural Responsiveness, Pollution Prevention, Consumer Behaviour, Environmental Policy, Community Development, Advocacy, Natural Resource Management, Environment, Health Disparities, Transportation Operations, Environmental Engineering, Economics, Corporate Sustainability
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: System Configuration, Firewall, Network Troubleshooting, Security Management, System Monitoring, Network Security, Patch Management, Software Installation, System Implementation, Threat Detection, Identity and Access Management
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: DevSecOps, Infrastructure as Code (IaC), Azure DevOps, Secure Coding, DevOps, Security Engineering, Infrastructure Security, Kubernetes, Cybersecurity, API Design, Software Design, Containerization, Machine Learning, Software Architecture, Role-Based Access Control (RBAC), Software Engineering, Git (Version Control System)
- Status: New
Skills you'll gain: Authentications, Data Security, Key Management, Software Installation, Cloud Security, Encryption, Application Security, Authorization (Computing), Role-Based Access Control (RBAC), Identity and Access Management, YAML, Cyber Security Policies, Data Architecture, System Configuration, Multi-Factor Authentication, Systems Architecture, Application Programming Interface (API), JSON, Command-Line Interface
In summary, here are 10 of our most popular cyber threat hunting courses
- Google Cloud Packet Mirroring with OpenSource IDS: Google Cloud
- Architecting AI Solutions – Scalable GenAI Systems: Packt
- Securing Google Cloud with CFT Scorecard: Google Cloud
- Security Best Practices in Google Cloud en Français: Google Cloud
- AWS: Security and Key Management: Whizlabs
- Writing Secure Code in ASP.NET: Packt
- Cybersecurity Specialist Capstone: IBM
- Trust and Security with Google Cloud - Español: Google Cloud
- Bending the Curve: Climate Change Solutions: University of California San Diego
- Check Point Jump Start: Quantum Management: Check Point Software Technologies Ltd.