Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Preview
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Threat Management, Exploitation techniques, Network Monitoring, Anomaly Detection
- Status: New
Google Cloud
Skills you'll gain: Firewall, Network Security, Cloud Security, Cloud Management, Virtual Private Networks (VPN), Network Monitoring, Threat Detection, Event Monitoring
- Status: Free Trial
EC-Council
Skills you'll gain: Penetration Testing, Threat Modeling, Cloud Security, Vulnerability Assessments, Network Security, Threat Detection, Security Awareness, Cybersecurity, Cloud Computing, Intrusion Detection and Prevention, Cyber Attacks, Application Security, Web Applications, Mobile Security, Internet Of Things, Authentications, Encryption, Wireless Networks
- Status: New
Skills you'll gain: Firewall, Cloud Security, Network Security, Google Cloud Platform, Cloud Infrastructure, Infrastructure Security, Virtual Private Networks (VPN), Cyber Security Assessment, Cloud Management, Threat Detection
- Status: Free Trial
University of Colorado System
Skills you'll gain: TCP/IP, Local Area Networks, Routing Protocols, Network Routing, Digital Communications, OSI Models, Network Protocols, Communication Systems, Dynamic Host Configuration Protocol (DHCP), Network Planning And Design, Network Security, Network Architecture, General Networking, Computer Networking, Network Infrastructure, Network Performance Management, Wireless Networks, Telecommunications, Software-Defined Networking, Algorithms
- Status: Free Trial
Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Information Systems Security, Intrusion Detection and Prevention, Endpoint Security, Network Infrastructure, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
- Status: Preview
Stanford University
Skills you'll gain: Physics, Timelines, Verification And Validation, Scientific Methods, Research, Mechanics, Mathematical Modeling, Systems Of Measurement
- Status: NewStatus: Free Trial
Skills you'll gain: Vulnerability Scanning, Microsoft Azure, Vulnerability Assessments, Cloud Security, Continuous Monitoring, Key Management, Security Controls, Security Information and Event Management (SIEM), Incident Response, Security Management, Hybrid Cloud Computing, Role-Based Access Control (RBAC), Multi-Cloud, Incident Management, Threat Detection, Automation
- Status: Free Trial
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Security Controls, Key Management, Threat Modeling, Authorization (Computing), Encryption, Data Integrity, Authentications, Vulnerability Assessments
- Status: NewStatus: Free Trial
University of Colorado Boulder
Skills you'll gain: Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Server Side, Application Security, Artificial Intelligence and Machine Learning (AI/ML), Vulnerability Scanning, Responsible AI, Data Security, Cyber Attacks, Security Awareness, Generative AI, Large Language Modeling, Personally Identifiable Information, Business Logic
- Status: Free Trial
University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques
- Status: NewStatus: Free Trial
Skills you'll gain: Microsoft Azure, User Provisioning, Cloud Security, Azure Active Directory, Data Governance, DevSecOps, Data Management, Security Information and Event Management (SIEM), Identity and Access Management, Microsoft 365, Endpoint Security, Data Security, Zero Trust Network Access, Role-Based Access Control (RBAC), Multi-Factor Authentication, Authorization (Computing), Hybrid Cloud Computing, Microsoft Copilot, Encryption, Authentications
In summary, here are 10 of our most popular cyber threat hunting courses
- In the Trenches: Security Operations Center : EC-Council
- Introdução ao Cloud Next Generation Firewall: Google Cloud
- Ethical Hacking Essentials (EHE): EC-Council
- Evalúa tus necesidades con Cloud Next Generation Firewall: Google Cloud
- Computer Communications: University of Colorado System
- Computer Networks and Network Security: IBM
- Understanding Einstein: The Special Theory of Relativity: Stanford University
- Configuring and Managing Security Operations in Azure: Packt
- Design and Analyze Secure Networked Systems: University of Colorado System
- Security & Ethical Hacking: Attacking Web and AI Systems: University of Colorado Boulder