Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Information Systems Security, Software Installation, Virtual Machines
- Status: Free Trial
Skills you'll gain: Penetration Testing, Exploitation techniques, Scripting, Scripting Languages, Python Programming, Cyber Operations, Object Oriented Programming (OOP), Network Security, Network Protocols, Debugging
- Status: Free Trial
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, C and C++, Verification And Validation, Vulnerability Management, Linux, Security Controls, Vulnerability Assessments, Threat Modeling, Data Validation, Debugging, Cryptography, C (Programming Language), Identity and Access Management, Encryption, File Management, OS Process Management
- Status: Free Trial
Skills you'll gain: Threat Modeling, IT Security Architecture, Secure Coding, Application Security, Security Testing, Security Strategy, Solution Architecture, Security Requirements Analysis, Software Development Methodologies, Software Development Life Cycle, Systems Architecture, Penetration Testing, Business Risk Management, Compliance Management
- Status: NewStatus: Free Trial
Skills you'll gain: Network Monitoring, Network Troubleshooting, Network Security, Incident Response, Anomaly Detection, Network Analysis, Cyber Security Assessment, Network Protocols, Threat Detection, Technical Communication, Distributed Denial-Of-Service (DDoS) Attacks, Computer Security, Cybersecurity, Vulnerability Assessments
- Status: Free
Coursera Project Network
Skills you'll gain: Threat Detection, Anomaly Detection, Network Security, General Networking, Network Monitoring, Network Troubleshooting, Real Time Data, Security Strategy, Network Analysis, Network Protocols, Data Capture
- Status: Preview
Skills you'll gain: Cyber Security Assessment, Cybersecurity, Security Testing, Computer Security Incident Management, Incident Response, Security Controls, Network Security, Encryption
- Status: Free Trial
Skills you'll gain: Data Security, Data Governance, Data Architecture, Data Quality, Personally Identifiable Information, Incident Response, Security Controls, Information Privacy, Threat Detection, Law, Regulation, and Compliance, Risk Management, Cybersecurity, Compliance Management, Encryption, Data Integrity
- Status: Free Trial
Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Cyber Operations, Scripting, Cybersecurity, Vulnerability Assessments, Python Programming, Network Analysis, Automation
- Status: Free Trial
University of California, Irvine
Skills you'll gain: Vendor Management, Security Management, Supplier Management, Risk Analysis, Security Awareness, Cyber Security Strategy, Risk Management, Threat Management, Human Factors (Security), Asset Protection, Due Diligence, Training Programs
- Status: Free Trial
LearnQuest
Skills you'll gain: Threat Modeling, IT Security Architecture, Threat Detection, Internet Of Things, Network Security, Information Systems Security, Infrastructure Security, Security Controls, Data Security, Vulnerability Assessments, Risk Management Framework, Cryptography, Encryption, Cloud Computing
- Status: Preview
Coursera Instructor Network
Skills you'll gain: General Data Protection Regulation (GDPR), Personally Identifiable Information, Information Privacy, Data Governance, Data Security, Cybersecurity, Data Management, Data Ethics, Cyber Governance, Security Controls, Cyber Risk, Data Access, Encryption, Risk Management Framework
In summary, here are 10 of our most popular cyber threat hunting courses
- Exploitation and Penetration Testing with Metasploit:Â IBM
- Advanced Exploitation and Scripting Techniques:Â Packt
- Identifying Security Vulnerabilities in C/C++Programming:Â University of California, Davis
- Designing Robust Information System Security Architectures:Â LearnQuest
- Network Traffic Analysis with Wireshark:Â SkillUp
- Wireshark for Security: Detect Network Anomalies:Â Coursera Project Network
- Practice Exam for ISC2 Certified in Cybersecurity (CC):Â SkillUp
- Data Privacy, Security, Governance, Risk and Compliance:Â SkillUp
- Advanced Python - Reconnaissance:Â Infosec
- Personnel & Third-Party Security:Â University of California, Irvine