Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free
Google Cloud
Skills you'll gain: Security Information and Event Management (SIEM), Cybersecurity, Cyber Threat Intelligence, Cloud Security, Computer Security Incident Management, Google Cloud Platform, System Monitoring
Skills you'll gain: Network Security, OSI Models, TCP/IP, Network Troubleshooting, Network Protocols, Network Administration, General Networking, Network Infrastructure, Network Engineering, Network Routers, Command-Line Interface, Dynamic Host Configuration Protocol (DHCP), Local Area Networks, Wireless Networks, Network Switches
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cybersecurity, Cyber Threat Intelligence, Application Security, Threat Modeling, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Intrusion Detection and Prevention, Encryption, Network Protocols, Authentications
University of Colorado Boulder
Skills you'll gain: Policy Development, Policy Analysis, Socioeconomics, Cyber Governance, Public Policies, Diversity Equity and Inclusion Initiatives, Network Infrastructure, Telecommunications, Regulation and Legal Compliance, Economics
- Status: Free
DeepLearning.AI
Skills you'll gain: Large Language Modeling, Security Testing, Threat Modeling, Application Security, Data Loss Prevention, Continuous Monitoring, Threat Detection, Security Controls, Prompt Engineering, System Monitoring, Personally Identifiable Information, Anomaly Detection, Generative AI, Data Security
- Status: NewStatus: Free Trial
Packt
Skills you'll gain: Threat Management, Vulnerability Assessments, Incident Response, Computer Security Incident Management, Vulnerability Management, Threat Detection, Cyber Security Assessment, Cyber Threat Intelligence, Security Management, Security Information and Event Management (SIEM), Infrastructure Security, Network Analysis
- Status: Free Trial
University of Michigan
Skills you'll gain: Debugging, Unit Testing, Integrated Development Environments, Development Testing, Technical Communication, Python Programming, File Management
University of Copenhagen
Skills you'll gain: International Relations, Political Sciences, Environmental Issue, Environmental Policy, Advocacy, Systems Thinking, Community Organizing, Environment, Social Sciences, Lobbying, Public Policies, Innovation, Governance
- Status: Free
Google Cloud
Skills you'll gain: Security Information and Event Management (SIEM), Security Management, Event Monitoring, Threat Detection, Continuous Monitoring, System Monitoring, Google Cloud Platform
- Status: Free Trial
Skills you'll gain: Hardware Architecture, Security Engineering, Internet Of Things, Encryption, Information Systems Security, Vulnerability Assessments, Cybersecurity, Threat Modeling, Data Security, Security Requirements Analysis, Vulnerability Management, Information Privacy
- Status: NewStatus: Free Trial
Board Infinity
Skills you'll gain: Incident Response, Risk Management Framework, Cyber Risk, Risk Management, Security Management, Enterprise Risk Management (ERM), Business Risk Management, Cyber Threat Intelligence, Governance Risk Management and Compliance, Continuous Monitoring, Cyber Security Strategy, Security Information and Event Management (SIEM), Threat Detection, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Key Performance Indicators (KPIs)
Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Cyber Security Assessment, Network Security, Penetration Testing, Network Administration, Software Installation, System Configuration, Cyber Security Policies, Web Applications, Authentications, Microsoft Windows, Integration Testing, Linux
In summary, here are 10 of our most popular cyber threat hunting courses
- Chronicle SIEM: Outcomes & Functions:Â Google Cloud
- Cisco CCST Networking - Video Training Series:Â Packt
- Advanced Cybersecurity Techniques:Â Johns Hopkins University
- When to Regulate? The Digital Divide and Net Neutrality:Â University of Colorado Boulder
- Quality and Safety for LLM Applications:Â DeepLearning.AI
- Security Operations:Â Packt
- Debugging: Hunting and Squashing Bugs:Â University of Michigan
- Making Democracy Fit for Climate:Â University of Copenhagen
- Chronicle SIEM: Multi Event Rules:Â Google Cloud
- Implementing Security in IoT and Edge Devices:Â LearnQuest