Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
Google Cloud
Skills you'll gain: Cloud Infrastructure, Prompt Engineering, Identity and Access Management, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Cloud Development, Infrastructure As A Service (IaaS), Authentications, Kubernetes, Cloud Security, Cloud Applications, Generative AI, Data Loss Prevention, Cloud Services, Cloud Computing, Public Cloud, Threat Management, Encryption, Security Controls, OAuth
- Status: Preview
Erasmus University Rotterdam
Skills you'll gain: Journalism, Media and Communications, Public Affairs, Research, Technical Communication, Driving engagement, Scientific Methods, Persuasive Communication, Digital Communications, Threat Detection, Interpersonal Communications, Public Policies, Policy Development, Content Creation, Social Sciences, Ethical Standards And Conduct
- Status: Free Trial
University of Michigan
Skills you'll gain: Data Quality, Data Cleansing, Data Collection, Data Validation, Data Analysis, Data Processing, Threat Detection, Data Access, Sampling (Statistics)
- Status: Free
Amazon Web Services
Skills you'll gain: Responsible AI, Data Governance, AWS Identity and Access Management (IAM), Cloud Security, Amazon Web Services, Cyber Governance, Information Systems Security, Security Controls
Skills you'll gain: IT Security Architecture, Threat Modeling, Enterprise Architecture, Cybersecurity, Application Security, Threat Management, Network Security, Systems Architecture, Identity and Access Management, Solution Architecture, Endpoint Security, Data Security, Risk Analysis, Remote Access Systems, Case Studies, Risk Management
- Status: Free
Coursera Project Network
Skills you'll gain: Linux Commands, Linux, TCP/IP, Scripting, Shell Script, Network Monitoring, Network Analysis, Network Security, Network Protocols
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Cyber Security Assessment, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Threat Modeling, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Cyber Threat Intelligence, Mobile Security, Cyber Operations, Security Testing, Vulnerability Scanning, Network Security, Operating Systems, Encryption
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Risk Management, Risk Management Framework, Threat Management, Operational Risk, Enterprise Risk Management (ERM), Business Risk Management, Cyber Risk, Risk Mitigation, Risk Analysis, Governance Risk Management and Compliance, Vulnerability Assessments, Continuous Improvement Process
- Status: Free Trial
Skills you'll gain: Security Testing, General Networking, Computer Networking, Problem Solving
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Endpoint Detection and Response, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Anomaly Detection, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Network Analysis
- Status: Free Trial
Skills you'll gain: Audit Planning, Auditing, Internal Controls, Risk Management Framework, Continuous Monitoring, Compliance Auditing, Project Coordination, Financial Controls, Quality Assurance, Information Systems Security, Cyber Security Assessment, Fraud detection, Governance, Presentations
- Status: Preview
Starweaver
Skills you'll gain: Threat Modeling, Cyber Threat Intelligence, Vulnerability Management, Cybersecurity, Threat Detection, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Cyber Attacks, Cyber Operations, Patch Management, Continuous Monitoring, Configuration Management
In summary, here are 10 of our most popular cyber threat hunting courses
- Security in Google Cloud en Français: Google Cloud
- Science Communication: Communicating Trustworthy Information in the Digital World: Erasmus University Rotterdam
- The Total Data Quality Framework: University of Michigan
- Security, Compliance, and Governance for AI Solutions: Amazon Web Services
- Cybersecurity Architecture Fundamentals: Packt
- Analyze Network Traffic with TCPDump: Build a Logging Tool: Coursera Project Network
- Introduction to Ethical Hacking: Johns Hopkins University
- A General Approach to Risk Management: Kennesaw State University
- CEH (v12) Practice Projects and Exam Simulators: LearnKartS
- Introduction to Intrusion Detection Systems (IDS): Johns Hopkins University