Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: NewStatus: Preview
SkillUp
Skills you'll gain: Personally Identifiable Information, Cybersecurity, General Data Protection Regulation (GDPR), Information Privacy, Data Security, Threat Detection, Data Loss Prevention, Incident Response, Data Governance, Law, Regulation, and Compliance, Data Management, Data Storage, Data Integrity, Data Ethics, Regulation and Legal Compliance
- Status: NewStatus: Free Trial
Skills you'll gain: Prompt Engineering, Prompt Patterns, Generative AI, Large Language Modeling, ChatGPT, LLM Application, Responsible AI, OpenAI, Natural Language Processing, Artificial Intelligence, Threat Detection
- Status: Free Trial
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Exploit development, Encryption, Penetration Testing, Vulnerability Assessments, Data Security, Application Security, Exploitation techniques, Security Controls, Vulnerability Management, Software Design, C and C++, Verification And Validation, Java, Programming Principles, Cybersecurity
- Status: Free Trial
University of Colorado System
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Risk Management, Enterprise Security, Vulnerability Assessments, Encryption, Network Security, Data Security, Security Awareness, Authentications
- Status: NewStatus: Preview
Birla Institute of Technology & Science, Pilani
Skills you'll gain: Operating Systems, OS Process Management, System Programming, File Systems, Unix Commands, Command-Line Interface, System Monitoring, System Design and Implementation, Performance Tuning, Package and Software Management, File Management, Algorithms, Cloud Platforms, Security Controls, User Accounts, Debugging
- Status: NewStatus: Free Trial
Skills you'll gain: Threat Modeling, Security Management, Risk Management, Disaster Recovery, Governance, Business Continuity, Application Security, Information Management, Risk Appetite, Security Controls, Continuous Monitoring, Configuration Management, Governance Risk Management and Compliance, Cybersecurity, Enterprise Security, Cloud Computing, Malware Protection, IT Management, Information Assurance, Test Planning
- Status: Free Trial
University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Infrastructure Security, Cyber Attacks, Cyber Operations, Cyber Risk, Cyber Security Policies, Cyber Governance, Incident Response, Risk Management Framework, Technology Solutions, Legal Risk
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Security Strategy, Cybersecurity, Mobile Security, Cyber Threat Intelligence, Network Security, Internet Of Things, Cyber Governance, Data Security, Wireless Networks, Emerging Technologies, Business Technologies, Enterprise Application Management
- Status: Preview
Universiteit Leiden
Skills you'll gain: Risk Management, Business Risk Management, Operational Risk, Risk Analysis, Safety and Security, Environmental Issue, Cyber Security Strategy, Decision Making, Public Health
- Status: Preview
EIT Digital
Skills you'll gain: Email Security, Cybersecurity, Security Awareness, Cyber Attacks, Identity and Access Management, Threat Detection, Data Security, Secure Coding, Human Factors (Security), Fraud detection, Entrepreneurship
- Status: NewStatus: Preview
Fractal Analytics
Skills you'll gain: Tool Calling, Middleware, Threat Modeling, Application Security, Security Controls, Real Time Data, Generative AI Agents, Interoperability, Systems Architecture, Agentic systems, Generative AI, Servers, Computer Programming
- Status: NewStatus: Free Trial
Fractal Analytics
Skills you'll gain: Data Governance, Metadata Management, Data Ethics, Data Management, Data Architecture, Interoperability, Data Strategy, Data Store, Responsible AI, Generative AI Agents, Threat Modeling, Data Storage, Data Pipelines, Data Processing, Data Security, Zero Trust Network Access, Large Language Modeling, Agentic systems, Machine Learning
In summary, here are 10 of our most popular cyber threat hunting courses
- Data Privacy and Protection:Â SkillUp
- Generative AI and Prompt Engineering Essentials:Â Edureka
- Secure Coding Practices:Â University of California, Davis
- Introduction to Cybersecurity for Business:Â University of Colorado System
- Operating Systems:Â Birla Institute of Technology & Science, Pilani
- The Pearson Complete Course for CISM Certification:Â Pearson
- Homeland Security and Cybersecurity Future:Â University of Colorado System
- Cybersecurity and Mobility:Â Kennesaw State University
- Risk in Modern Society :Â Universiteit Leiden
- Cybersecurity Awareness and Innovation:Â EIT Digital