Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cost Benefit Analysis, Risk Management Framework, Risk Management, Risk Analysis, Cyber Risk, ISO/IEC 27001, Enterprise Risk Management (ERM), NIST 800-53, Business Risk Management, Risk Mitigation, Governance Risk Management and Compliance, Cybersecurity, Security Controls
- Status: Free Trial
Microsoft
Skills you'll gain: Generative AI, Generative Model Architectures, System Monitoring, Data Ethics, Responsible AI, LLM Application, Cybersecurity, Artificial Intelligence, Prompt Engineering, Image Analysis, Threat Detection, Emerging Technologies, Anomaly Detection
- Status: Preview
Institut Mines-Télécom
Skills you'll gain: Threat Modeling, Cyber Risk, Open Web Application Security Project (OWASP), Cybersecurity, Cyber Attacks, Application Security, Security Testing, Vulnerability Assessments, Secure Coding, SQL
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Crisis Management, Threat Management, Threat Detection, Infrastructure Security, Resilience, Disaster Recovery, Emergency Response, Business Ethics, Risk Management, Organizational Change, Systems Thinking, Hazard Analysis, Safety and Security, Risk Analysis, Industrial and Organizational Psychology, Complex Problem Solving, Ethical Standards And Conduct, Decision Making, Leadership, Case Studies
Skills you'll gain: Kubernetes, Role-Based Access Control (RBAC), DevSecOps, Infrastructure Security, Application Security, Hardening, Cloud Security, Network Security, Containerization, Security Testing, Security Controls, Docker (Software), Cyber Security Policies, Secure Coding, Identity and Access Management, Threat Detection, Encryption, Authentications, Verification And Validation
- Status: Preview
Edureka
Skills you'll gain:
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, Threat Detection, TCP/IP, Network Analysis, Network Protocols, Cybersecurity, Application Security, Vulnerability Scanning, Wireless Networks, Splunk, Information Privacy
- Status: Free Trial
Skills you'll gain: Open Shortest Path First (OSPF), Virtual Local Area Network (VLAN), Wide Area Networks, Network Security, Threat Detection, Threat Management, Network Administration, Multiprotocol Label Switching, Network Routing, Virtual Private Networks (VPN), Network Troubleshooting, Dynamic Host Configuration Protocol (DHCP), Network Switches, Network Protocols
- Status: Free Trial
Skills you'll gain: Cyber Operations, Cybersecurity, Authentications, Python Programming, Data Access, Network Security, System Monitoring, Network Protocols
- Status: New
University of Maryland, College Park
Skills you'll gain: Cybersecurity, Cyber Security Policies, Cyber Risk, Risk Management, Cyber Governance, Cyber Attacks, Stakeholder Engagement, Risk Mitigation, Cyber Security Strategy, Stakeholder Communications, Operational Risk, Enterprise Risk Management (ERM), Security Management, Risk Analysis, Cyber Security Assessment, Threat Modeling, Information Assurance, Risk Modeling, Governance, Vulnerability Assessments
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols, Authentications
- Status: Preview
Skills you'll gain: Mac OS, Network Security, Threat Management, Endpoint Security, Threat Detection, Computer Security Awareness Training, Security Strategy, Information Systems Security, Security Controls, Network Protocols, Automation
In summary, here are 10 of our most popular cyber threat hunting courses
- Dominant Risk Management Standards and Frameworks:Â Kennesaw State University
- Copilot for Cybersecurity:Â Microsoft
- Cybersécurité : comment sécuriser un site web: Institut Mines-Télécom
- Resilience & Leadership: Concepts, Definitions, & Frameworks:Â University of Colorado Boulder
- Certified Kubernetes Security Specialist (CKS) Course:Â Packt
- Cloud Security on AWS:Â Edureka
- Advanced Network Security and Analysis:Â Johns Hopkins University
- CCNA Advanced – WAN, Security, and Network Services: Packt
- Establishing Command-and-Control and Finding Credentials:Â Infosec
- Cybersecurity Risk Management Across Critical Systems:Â University of Maryland, College Park