Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free
University of Washington
Skills you'll gain: Social Justice, Community Organizing, Social Sciences, Cultural Diversity, Public Policies, World History, Political Sciences, Advocacy, Governance, Media and Communications
- Status: Preview
Coursera Project Network
Skills you'll gain: Metasploit, Penetration Testing, Exploitation techniques, Vulnerability Assessments, Vulnerability Scanning, Cyber Security Assessment
- Status: NewStatus: Free Trial
Whizlabs
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Identity and Access Management, Cloud Security, Network Security, Threat Detection, Amazon S3, Infrastructure Security, Data Security, Security Management, Vulnerability Management, Vulnerability Assessments, Application Security, Key Management, User Provisioning, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Authorization (Computing), Encryption
- Status: NewStatus: Free
Skills you'll gain: Prompt Engineering, ChatGPT, Open Web Application Security Project (OWASP), Responsible AI, Penetration Testing, Threat Modeling, Cyber Operations, Exploitation techniques, Vulnerability Scanning, Generative AI, Scripting
- Status: Free Trial
Skills you'll gain: Embedded Systems, Internet Of Things, Control Systems, Electronic Systems, Electronics, Maintenance, Repair, and Facility Services, Automation, Integrated Development Environments, Environmental Monitoring, System Monitoring, Infrastructure Architecture, Communication Systems, Real Time Data, Peripheral Devices
- Status: NewStatus: Free Trial
Skills you'll gain: Ansible, Puppet (Configuration Management Tool), Software-Defined Networking, Network Administration, Security Awareness, Threat Modeling, Chef (Configuration Management Tool), Information Systems Security, Virtual Private Networks (VPN), JSON, Authentications, Computer Networking, Network Architecture, Authorization (Computing), Automation, Configuration Management, Application Programming Interface (API)
- Status: Preview
University of Copenhagen
Skills you'll gain: Climate Change Programs, International Relations, Political Sciences, Environmental Issue, Environmental Policy, Advocacy, Systems Thinking, Policy Analysis, Sustainable Development, Lobbying, Public Policies, Innovation, Governance
- Status: Preview
Corporate Finance Institute
Skills you'll gain: Financial Analysis, Risk Analysis, Financial Modeling, Competitive Analysis, Market Analysis, Business Strategy, Growth Strategies, Business Strategies, Business Analysis, Analysis, Business Risk Management, Market Share, Competitive Intelligence, Strategic Marketing, Strategic Planning
Skills you'll gain: Risk Management, Cyber Risk, Threat Management, Security Management, Vulnerability Management, Business Risk Management, Enterprise Risk Management (ERM), IT Management, Risk Mitigation, Cybersecurity, Cyber Security Strategy, Vulnerability Assessments, Compliance Management, Information Technology
- Status: Free Trial
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Assessments, Intrusion Detection and Prevention, Application Security, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Virtual Local Area Network (VLAN), Cloud Security, Wireless Networks, Application Programming Interface (API)
- Status: New
Skills you'll gain: Identity and Access Management, Cloud Services, Microsoft Azure, Microsoft Teams, Collaborative Software, Security Controls, Endpoint Security, Cloud Solutions, Zero Trust Network Access, Microsoft Office, Cloud Computing, Information Privacy
Skills you'll gain: Penetration Testing, Vulnerability Assessments, Network Security, Network Analysis, Cyber Security Assessment, Virtual Machines, Virtualization and Virtual Machines, Open Source Technology, Malware Protection, Linux, Microsoft Windows
In summary, here are 10 of our most popular cyber threat hunting courses
- Ukraine: History of Civil Society: University of Washington
- للمبتدئين Metasploit: أساسيات الاستغلال : Coursera Project Network
- AWS: Security and Key Management: Whizlabs
- ChatGPT for Offensive Security: Infosec
- CPS Design with ARM Core using MicroPython for Industries: L&T EduTech
- Security Fundamentals & Network Automation: Packt
- Making Democracy Fit for Climate: University of Copenhagen
- Analyzing Growth Drivers & Business Risks: Corporate Finance Institute
- Risk Management for Cybersecurity and IT Managers: Packt
- Advanced Penetration Techniques: Packt