Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: NewStatus: Free Trial
Skills you'll gain: Microsoft Azure, User Provisioning, Cloud Security, Azure Active Directory, Data Governance, DevSecOps, Data Management, Security Information and Event Management (SIEM), Identity and Access Management, Microsoft 365, Endpoint Security, Data Security, Zero Trust Network Access, Role-Based Access Control (RBAC), Multi-Factor Authentication, Authorization (Computing), Hybrid Cloud Computing, Microsoft Copilot, Encryption, Authentications
- Status: Free Trial
Skills you'll gain: Cybersecurity, Information Technology, Cyber Security Strategy, Cyber Security Policies, Technical Support and Services, Technical Support, Computer Security Awareness Training, Security Awareness, Network Security, Data Security, Information Assurance, General Networking, Operating Systems, Computer Hardware
- Status: Free Trial
Skills you'll gain: Operating System Administration, Cloud Computing, Linux Commands, Linux Administration, Linux Servers, Cloud Security, Operating Systems, Windows PowerShell, Windows Servers, File Systems, System Software, Mac OS, Command-Line Interface, Active Directory, Computer Systems, Virtual Machines, Firewall, Virtualization, Containerization, User Accounts
- Status: Free Trial
Skills you'll gain: Penetration Testing, Network Security, Threat Modeling, Mobile Security, Cloud Security, Vulnerability Assessments, Public Key Infrastructure, Cryptography, Security Controls, Threat Detection, Cybersecurity, Authorization (Computing), Security Awareness, Cloud Computing, Encryption, Malware Protection, Intrusion Detection and Prevention, Identity and Access Management, Cyber Attacks, Data Integrity
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Intelligence, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Cybersecurity, Cyber Security Strategy, Threat Management, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, NIST 800-53, Network Analysis, Data Analysis
- Status: Free Trial
University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques
- Status: Free Trial
University of California, Irvine
Skills you'll gain: Threat Modeling, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Business Risk Management, Risk Management Framework, Risk Mitigation, Vulnerability Assessments, Asset Management, Disaster Recovery, Security Controls
- Status: Free Trial
Cisco Learning and Certifications
Skills you'll gain: Threat Modeling, Threat Detection, Cyber Operations, Cybersecurity, Security Information and Event Management (SIEM), Incident Response, Security Management, Computer Security Incident Management, Cyber Attacks, Event Monitoring, Network Monitoring, Automation
- Status: Preview
Skills you'll gain: Malware Protection, Exploitation techniques, Exploit development, Cyber Threat Hunting, Cyber Security Assessment, Application Security, Threat Detection, Virtual Machines, Code Review, Debugging, System Programming, Scripting, Windows PowerShell, Virtual Environment, Linux, File Management
- Status: Free Trial
Skills you'll gain: Incident Response, Penetration Testing, Computer Security Incident Management, Cyber Threat Intelligence, Cybersecurity, Threat Detection, Vulnerability Assessments, Threat Modeling, Security Awareness, Distributed Denial-Of-Service (DDoS) Attacks, Data Security, Malware Protection, Email Security, Exploitation techniques, Network Security, Fraud detection, Artificial Intelligence
- Status: Free Trial
University of Colorado System
Skills you'll gain: TCP/IP, Local Area Networks, Routing Protocols, Network Routing, Digital Communications, OSI Models, Network Protocols, Communication Systems, Dynamic Host Configuration Protocol (DHCP), Network Planning And Design, Network Security, Network Architecture, General Networking, Computer Networking, Network Infrastructure, Network Performance Management, Wireless Networks, Telecommunications, Software-Defined Networking, Algorithms
- Status: Free Trial
Google
Skills you'll gain: Vulnerability Management, Threat Modeling, Incident Response, Intrusion Detection and Prevention, Business Risk Management, Network Security, Vulnerability Assessments, Operating Systems, Threat Detection, Risk Management, Security Information and Event Management (SIEM), Computer Security Incident Management, Event Monitoring, Network Architecture, Security Controls, Cyber Risk, Linux, Cybersecurity, Debugging, SQL
In summary, here are 10 of our most popular cyber threat hunting courses
- Exam Prep SC-100: Microsoft Cybersecurity Architect Expert:Â Whizlabs
- Introduction to Cybersecurity Careers:Â IBM
- Operating Systems: Overview, Administration, and Security:Â IBM
- Cybersecurity Attack and Defense Fundamentals:Â EC-Council
- Intrusion Detection:Â Johns Hopkins University
- Fundamentals of Computer Network Security:Â University of Colorado System
- Introduction to Risk Management:Â University of California, Irvine
- Security Operations Center (SOC):Â Cisco Learning and Certifications
- Malware Analysis and Introduction to Assembly Language:Â IBM
- Cybersecurity Case Studies and Capstone Project:Â IBM