Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: NewStatus: Free Trial
Skills you'll gain: Network Troubleshooting, Network Administration, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, General Networking, Technical Support and Services, Hardening, Network Infrastructure, Network Protocols, Intrusion Detection and Prevention, Threat Modeling, Identity and Access Management, Authentications, Virtual Local Area Network (VLAN), Encryption, Key Management
Coursera Project Network
Skills you'll gain: Competitive Analysis, Customer Analysis, Market Analysis, Business Strategy, Market Share, Market Dynamics, Strategic Planning, Supplier Management, New Business Development, Leadership, Entrepreneurship
Skills you'll gain: Google Cloud Platform, Intrusion Detection and Prevention, Network Monitoring, Network Security, Virtual Machines, Security Information and Event Management (SIEM), Cloud Infrastructure, General Networking, Threat Detection, Network Infrastructure, Load Balancing, System Configuration, Network Analysis
- Status: New
Skills you'll gain: Generative AI, Cloud Computing Architecture, Systems Architecture, Cloud-Native Computing, Scalability, Solution Architecture, Large Language Modeling, Cloud Platforms, Artificial Intelligence and Machine Learning (AI/ML), Security Engineering, Threat Modeling, System Monitoring, Containerization, MLOps (Machine Learning Operations), Simulations, Disaster Recovery
Google Cloud
Skills you'll gain: Cloud Security, Google Cloud Platform, Cyber Security Policies, Cloud Management, Security Management, Vulnerability Assessments
Skills you'll gain: Cryptography, Authentications, Application Security, .NET Framework, Threat Modeling, Data Security, Authorization (Computing), Vulnerability Management, Security Controls, Application Development, Data Validation, File Management, SQL
- Status: NewStatus: Free Trial
Whizlabs
Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Cloud Security, Amazon S3, Key Management, Threat Detection, Network Security, Data Security, Vulnerability Assessments, Encryption, Amazon Elastic Compute Cloud, Authentications, Public Key Infrastructure
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Vulnerability Assessments, Security Management, Vulnerability Management, Cybersecurity, Threat Modeling, Data Security, Cyber Attacks, Cyber Security Assessment, Threat Management, Cyber Risk, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Payment Card Industry (PCI) Data Security Standards, Email Security, Network Infrastructure
- Status: Free Trial
University of California San Diego
Skills you'll gain: Energy and Utilities, Social Justice, Mitigation, Socioeconomics, International Relations, Electric Power Systems, Social Sciences, Cultural Responsiveness, Pollution Prevention, Consumer Behaviour, Environmental Policy, Community Development, Advocacy, Natural Resource Management, Environment, Health Disparities, Transportation Operations, Environmental Engineering, Economics, Corporate Sustainability
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: System Configuration, Firewall, Network Troubleshooting, Security Management, System Monitoring, Network Security, Patch Management, Software Installation, System Implementation, Threat Detection, Identity and Access Management
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Anomaly Detection, Threat Detection, Cyber Security Policies, Security Information and Event Management (SIEM), Cyber Threat Hunting, Cybersecurity, Network Security, Cyber Risk, Network Analysis, Cloud Security, NIST 800-53, Graph Theory
- Status: New
Skills you'll gain: Authentications, Data Security, Key Management, Software Installation, Cloud Security, Encryption, Application Security, Authorization (Computing), Role-Based Access Control (RBAC), Identity and Access Management, YAML, Cyber Security Policies, Data Architecture, System Configuration, Multi-Factor Authentication, Systems Architecture, Application Programming Interface (API), JSON, Command-Line Interface
In summary, here are 10 of our most popular cyber threat hunting courses
- Network Security, Troubleshooting, & Certification Prep:Â Packt
- Using Porter’s Five Forces Model for Competitive Analysis : Coursera Project Network
- Google Cloud Packet Mirroring with OpenSource IDS:Â Google Cloud
- Architecting AI Solutions – Scalable GenAI Systems: Packt
- Securing Google Cloud with CFT Scorecard:Â Google Cloud
- Writing Secure Code in ASP.NET:Â Packt
- AWS: Security and Key Management:Â Whizlabs
- Cybersecurity Specialist Capstone:Â IBM
- Bending the Curve: Climate Change Solutions:Â University of California San Diego
- Check Point Jump Start: Quantum Management:Â Check Point Software Technologies Ltd.