Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: New
Skills you'll gain: Identity and Access Management, Cloud Services, Microsoft Azure, Microsoft Teams, Security Controls, Endpoint Security, Cloud Solutions, Zero Trust Network Access, Cloud Computing, Azure Active Directory, Software As A Service, Role-Based Access Control (RBAC), Information Privacy
- Status: New
Google Cloud
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Large Language Modeling, Application Security, Secure Coding, Security Controls, Prompt Engineering, Google Cloud Platform, Systems Architecture, Application Programming Interface (API)
- Status: New
Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Threat Management, Cyber Threat Hunting, Endpoint Detection and Response, Incident Response, Continuous Monitoring, Vulnerability Assessments, Generative AI Agents
- Status: New
Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Threat Management, MITRE ATT&CK Framework, Endpoint Detection and Response, Security Information and Event Management (SIEM), Vulnerability Management, Interactive Data Visualization, Data Security, Incident Response, Cloud Security, Artificial Intelligence
- Status: New
Macquarie University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Applied Machine Learning, Malware Protection, Cyber Threat Intelligence, Cyber Security Strategy, Threat Modeling, Artificial Intelligence and Machine Learning (AI/ML), Cybersecurity, Threat Detection, MLOps (Machine Learning Operations), Machine Learning, Network Security, Machine Learning Algorithms, Network Analysis, Artificial Intelligence, Data-Driven Decision-Making, Artificial Neural Networks
- Status: Free Trial
Skills you'll gain: Network Security, Incident Response, Business Continuity, Disaster Recovery, Security Controls, Configuration Management, Governance, Cybersecurity, Security Management, Computer Security Incident Management, Cyber Attacks, Computer Security Awareness Training, Information Assurance, Data Security, Infrastructure Security, Risk Management Framework, Event Monitoring, Encryption, Role-Based Access Control (RBAC), Authorization (Computing)
- Status: NewStatus: Free Trial
EC-Council
Skills you'll gain: Network Security, Incident Response, Computer Security Incident Management, Cryptography, Penetration Testing, Vulnerability Management, Cybersecurity, Application Security, Cyber Security Policies, Security Information and Event Management (SIEM), Threat Detection, Network Monitoring, Cloud Security, Vulnerability Assessments, Malware Protection, Mobile Security, Identity and Access Management, Internet Of Things, Risk Analysis, Web Applications
- Status: New
Coursera Instructor Network
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Cyber Security Strategy, Data Ethics, Cybersecurity, Penetration Testing, Threat Detection, Vulnerability Assessments, Artificial Intelligence, Data Security, Incident Response, Tensorflow, Risk Management Framework, Data Integrity
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Email Security, System Design and Implementation, Network Security, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Jupyter, Authentications, Deep Learning, Machine Learning Software
- Status: New
Packt
Skills you'll gain: System Monitoring
- Status: New
Macquarie University
Skills you'll gain: Security Awareness, Mobile Security, Cyber Attacks, Cyber Security Strategy, Cyber Risk, Cybersecurity, Cyber Governance, Cyber Security Assessment, Cyber Security Policies, Cyber Threat Intelligence, Data Security, Malware Protection, Security Strategy, Human Factors (Security), Security Management, Authentications, Cyber Threat Hunting, Email Security, Identity and Access Management, Cloud Security
- Status: Free Trial
University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Computer Networking, Cybersecurity, Network Protocols, Cyber Security Strategy, Computer Architecture, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks
In summary, here are 10 of our most popular cyber threat hunting courses
- Microsoft 365 Fundamentals (MS-900) : Packt
- Model Armor: Securing AI Deployments: Google Cloud
- Google Threat Intelligence 한국어: Google Cloud
- Google Threat Intelligence - 繁體中文: Google Cloud
- AI for Cyber Security: Macquarie University
- Certified in Cybersecurity: ISC2
- Information Security Analyst: EC-Council
- Cybersecurity Strategies for AI-Driven Organizations: Coursera Instructor Network
- AI for Cybersecurity: Johns Hopkins University
- OWASP Top 10: Packt