Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: NewStatus: Free Trial
Skills you'll gain: Threat Management, Vulnerability Assessments, Incident Response, Computer Security Incident Management, Public Key Infrastructure, IT Security Architecture, Disaster Recovery, Vulnerability Management, Regulation and Legal Compliance, Threat Detection, Risk Management, Compliance Management, Governance Risk Management and Compliance, Network Security, Infrastructure Security, Cloud Security, Hardening, Security Engineering, Software-Defined Networking, Application Security
- Status: Free Trial
Infosec
Skills you'll gain: Medical Privacy, Information Privacy, Data Governance, Security Management, Computer Security Incident Management, Personally Identifiable Information, Law, Regulation, and Compliance, Data Security, Governance, Information Assurance, Document Management, Security Controls, Threat Management, General Data Protection Regulation (GDPR), Compliance Management, Training Programs, Compliance Training, Incident Management, Regulation and Legal Compliance, Data Management
- Status: New
Skills you'll gain: Security Management, Incident Management, Vulnerability Assessments, Threat Management, IT Management, Security Strategy, Cyber Governance, Risk Management Framework, Security Controls, Cyber Risk, Security Awareness, Disaster Recovery
Skills you'll gain: Feature Engineering, Big Data, Anomaly Detection, Google Cloud Platform, Unsupervised Learning, Data Manipulation, Applied Machine Learning, Decision Tree Learning, Machine Learning Methods, Risk Modeling, Threat Detection, Supervised Learning, Advanced Analytics, Predictive Modeling, Predictive Analytics, Transaction Processing
- Status: Free Trial
Infosec
Skills you'll gain: Penetration Testing, Linux Commands, Command-Line Interface, Cyber Security Assessment, Linux, Cybersecurity, Operating Systems, Vulnerability Assessments, Windows PowerShell, Microsoft Windows, Computer Systems, Mac OS
Skills you'll gain: Threat Modeling, Cyber Governance, Cybersecurity, Cyber Security Policies, Cryptography, Network Security, Cyber Risk, Cyber Attacks, Cyber Security Strategy, Threat Detection, Vulnerability Assessments, Incident Response
- Status: Free Trial
Skills you'll gain: Network Analysis, Network Security, Cyber Operations, MITRE ATT&CK Framework, Cybersecurity, Threat Detection, Network Monitoring, Penetration Testing, Anomaly Detection, Scripting, Network Protocols, Authentications, TCP/IP, Python Programming, Data Access, User Accounts, System Programming, Automation
- Status: Free Trial
Board Infinity
Skills you'll gain: Organizational Change, Process Optimization, Robotic Process Automation, Internet Of Things, Process Improvement, Manufacturing Operations, Manufacturing Processes, Manufacturing and Production, Cloud Computing, Workforce Development, Change Management, Augmented and Virtual Reality (AR/VR), Innovation, Production Process, Workforce Planning, Automation Engineering, 3D Modeling, Automation, Industrial Engineering, Emerging Technologies
- Status: Free Trial
Michigan State University
Skills you'll gain: Journalism, Multimedia, Media and Communications, Storytelling, Content Creation, Report Writing, Interviewing Skills, Oral Expression, Photo/Video Production and Technology, Video Production, Writing, Research, Ethical Standards And Conduct
Coursera Instructor Network
Skills you'll gain: Generative AI, Law, Regulation, and Compliance, Regulatory Requirements, Compliance Management, Compliance Reporting, Governance, Business Risk Management, Governance Risk Management and Compliance, Risk Management, Financial Regulation, Anomaly Detection, Compliance Auditing, Data Governance, Artificial Intelligence, Large Language Modeling, Threat Detection, Advanced Analytics
- Status: Free Trial
University of London
Skills you'll gain: Linux, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Vulnerability Assessments, Hardware Architecture, Application Security, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, Authentications, Network Monitoring, Network Analysis
- Status: Free Trial
University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Information Systems Security, Threat Detection, Test Tools
In summary, here are 10 of our most popular cyber threat hunting courses
- CompTIA CASP+ (CAS-004):Â Packt
- Privacy Fundamentals:Â Infosec
- Certified Information Security Manager (CISM):Â Packt
- Fraud Detection on Financial Transactions with Machine Learning on Google Cloud:Â Google Cloud
- Operating System Foundations:Â Infosec
- Introduction to Automotive Cybersecurity & Vehicle Networks:Â Starweaver
- Advanced Python Scripting for Cybersecurity:Â Infosec
- Advances in Manufacturing Technology:Â Board Infinity
- Effectively delivering the news to your audience:Â Michigan State University
- GenAI for Fraud Detection and Compliance:Â Coursera Instructor Network