Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: NewStatus: Free Trial
Advancing Women in Tech
Skills you'll gain: ISO/IEC 27001, Budget Management, Cyber Governance, Vendor Management, Leadership Development, Cyber Security Strategy, Risk Management, Business Risk Management, Performance Measurement, Business Metrics, Operational Efficiency
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Fraud detection, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Security Strategy, Threat Modeling, Email Security, System Design and Implementation, Network Security, Jupyter, Authentications, Deep Learning, Machine Learning Software
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Human Factors (Security), Security Awareness, Cyber Security Strategy, Cyber Governance, Data Ethics, User Experience Design, Cyber Security Policies, Cyber Security Assessment, Cyber Attacks, Cyber Risk, Security Management, Cybersecurity, Security Strategy, Culture Transformation, Cyber Threat Intelligence, Cyber Threat Hunting, Data Security, Network Security, Cloud Security, Mobile Security
- Status: Preview
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Data Management, Data Validation, Technical Communication, Automation, Requirements Analysis, Machine Learning
- Status: Free Trial
Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Cryptography
- Status: Free Trial
Microsoft
Skills you'll gain: Vulnerability Management, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Security Testing, Network Security, System Testing, Threat Detection, Firewall, Cybersecurity, Cloud Security, Microsoft Azure, Virtual Private Networks (VPN), Windows PowerShell, Command-Line Interface
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Email Security, Wireless Networks, Mobile Security, Incident Response, Cybersecurity, Personally Identifiable Information, Cyber Attacks, Firewall, General Networking, Threat Detection, Cyber Security Policies, Computer Security Awareness Training, Proxy Servers, Computer Security Incident Management, Network Security, Security Awareness, Cyber Threat Intelligence, Cyber Risk, Virtual Private Networks (VPN), Social Media
- Status: Free Trial
Skills you'll gain: Encryption, Cybersecurity, Cyber Attacks, Threat Management, Security Strategy, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
- Status: Free Trial
University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Risk Management Framework, Infrastructure Security, Cyber Attacks, Cyber Risk, Cyber Security Policies, Public Safety and National Security, Cyber Security Assessment, Cyber Operations, Cyber Governance, Security Management, NIST 800-53, Incident Response, Security Strategy, Technology Roadmaps, Network Infrastructure, Technology Solutions, Transportation Operations, Legal Risk
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Risk Management, Cyber Governance, Cost Benefit Analysis, Security Management, Risk Management Framework, Vulnerability Management, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Operational Risk, Risk Analysis, Enterprise Risk Management (ERM), Business Risk Management, Risk Mitigation, Cyber Threat Intelligence, Vulnerability Assessments, ISO/IEC 27001, Threat Detection, Threat Modeling
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Network Security, Incident Response, Network Administration, Vulnerability Management, Cybersecurity, Contingency Planning, Cyber Governance, Cyber Attacks, Disaster Recovery, Cyber Security Policies, Security Management, Firewall, Computer Security Incident Management, Network Monitoring, General Networking, Cyber Security Strategy, Crisis Management, Vulnerability Assessments, Cyber Security Assessment, Risk Management
- Status: Free Trial
FAIR Institute
Skills you'll gain: Risk Analysis, Cyber Risk, Risk Appetite, Cyber Governance, Risk Modeling, Risk Management, Regulatory Compliance, Cybersecurity, Governance, Threat Management, Enterprise Risk Management (ERM), Continuous Monitoring, Cyber Security Strategy, Governance Risk Management and Compliance, Strategic Decision-Making, Insurance, Compliance Management, Threat Modeling, Business Risk Management, Business Communication
In summary, here are 10 of our most popular cyber threat hunting courses
- Cybersecurity Metrics, Vendors & Risks:Â Advancing Women in Tech
- AI for Cybersecurity:Â Johns Hopkins University
- Cyber Security: Essentials for Workplace:Â Macquarie University
- Introduction to the Threat Intelligence Lifecycle :Â IBM
- Assets, Threats, and Vulnerabilities:Â Google
- Cybersecurity Testing and Prevention:Â Microsoft
- Cybersecurity Awareness for Everyone:Â Kennesaw State University
- Cybersecurity Threat Vectors and Mitigation:Â Microsoft
- Homeland Security and Cybersecurity:Â University of Colorado System
- Cybersecurity Risk Management Frameworks:Â Kennesaw State University