Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: NewStatus: Preview
Coursera Instructor Network
Skills you'll gain: Secure Coding, Agile Methodology, Security Management, Cyber Security Policies, Cyber Security Assessment, Technical Management, Performance Metric, Risk Management
- Status: New
Skills you'll gain: Threat Modeling, DevSecOps, Application Security, Security Requirements Analysis, Vulnerability Management, Threat Management, Security Testing, Secure Coding, Vulnerability Assessments, Penetration Testing, Security Awareness, Security Strategy, DevOps, Technology Roadmaps, Risk Management Framework, Software Development Life Cycle
- Status: NewStatus: Free Trial
Skills you'll gain: Governance, Governance Risk Management and Compliance, Enterprise Security, Compliance Management, Regulatory Requirements, Business Metrics, Performance Metric, Ethical Standards And Conduct
- Status: Free Trial
Palo Alto Networks
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Zero Trust Network Access, Malware Protection, Firewall, Cyber Threat Intelligence, Endpoint Security, Cloud Security, System Configuration, Cloud Computing, Software As A Service, Cryptography, Authentications, Artificial Intelligence
- Status: Free Trial
Vanderbilt University
Skills you'll gain: Prompt Engineering, ChatGPT, Prompt Patterns, Generative AI, Crisis Management, LLM Application, Productivity, Incident Response, Responsible AI, OpenAI, AI Personalization, Data Ethics, Computer Security Incident Management, Artificial Intelligence, Personalized Service, Large Language Modeling, Business Ethics, Information Privacy, Threat Modeling, Cybersecurity
- Status: Free Trial
Skills you'll gain: Encryption, Identity and Access Management, Public Key Infrastructure, Endpoint Security, Cryptography, Network Security, Cybersecurity, Threat Detection, Data Security, Cryptographic Protocols, Cyber Attacks, Advanced Encryption Standard (AES), Secure Coding, Data Encryption Standard, Firewall, Information Technology, Computer Security Awareness Training, Cyber Security Strategy, Cyber Security Policies, Computer Security Incident Management
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Internet Of Things, Cybersecurity, Cyber Security Policies, Mobile Security, Security Awareness, Wireless Networks, Information Privacy, Data Security, Emerging Technologies, Enterprise Security, Risk Management Framework
- Status: NewStatus: Free Trial
Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, Kubernetes, Threat Management, Cloud-Native Computing, Public Key Infrastructure, Infrastructure Security, Threat Detection, Application Security, Cloud Security, Vulnerability Assessments, Cloud Applications
- Status: NewStatus: Free Trial
Skills you'll gain: Vulnerability Management, Authentications, Security Controls, Vulnerability Assessments, Authorization (Computing), Continuous Monitoring, Identity and Access Management, Security Management, Information Systems Security, Role-Based Access Control (RBAC), Network Security, User Accounts, Multi-Factor Authentication, Threat Detection
- Status: Preview
Yale University
Skills you'll gain: Political Sciences, Policy Analysis, Social Justice, Economics, Policy, and Social Studies, Social Sciences, European History, Law, Regulation, and Compliance, Governance, Ethical Standards And Conduct, Socioeconomics, Economics
- Status: NewStatus: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Virtual Private Networks (VPN), Network Security, Firewall, Threat Detection, Network Administration, Endpoint Security, Network Monitoring, Security Controls, System Configuration, Network Troubleshooting, Security Management, UI Components, Email Security, Active Directory
- Status: NewStatus: Free Trial
Skills you'll gain: Kubernetes, Application Security, Containerization, Threat Detection, Encryption, Infrastructure Security, Security Engineering, API Gateway, Network Security, Hardening, Scenario Testing, Continuous Monitoring, Authorization (Computing), Authentications
In summary, here are 10 of our most popular cyber threat hunting courses
- Cybersecurity & Data Privacy for Technical Product Managers:Â Coursera Instructor Network
- Application Security Program Ignition Guide:Â Packt
- The Pearson Complete Course for CISM Certification: Unit 1:Â Pearson
- Palo Alto Networks Cybersecurity Foundation:Â Palo Alto Networks
- Generative AI Cybersecurity & Privacy for Leaders:Â Vanderbilt University
- Cybersecurity Fundamentals:Â IBM
- Cybersecurity and the Internet of Things:Â Kennesaw State University
- Certified Kubernetes Security Specialist (CKS): Unit 1:Â Pearson
- (SSCP) Systems Security Certified Practitioner: Unit 3:Â Pearson
- Moral Foundations of Politics :Â Yale University