Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
Coursera Project Network
Skills you'll gain: Job Analysis, Compensation Analysis, Company, Product, and Service Knowledge, Recruitment, Business Research, Research
- Status: Free Trial
Skills you'll gain: General Networking, Network Architecture, TCP/IP, Cybersecurity, Networking Hardware, Computer Networking, Network Security, Threat Detection, Network Routers, Cyber Attacks, Network Switches, Firewall, Security Strategy
- Status: Free Trial
Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Amazon Web Services, Patch Management, Amazon CloudWatch, Infrastructure Security, Threat Detection, Amazon S3, Vulnerability Scanning, Data Security, Cloud Security, Network Security, Threat Management, Incident Response, Data Governance, Authorization (Computing), Continuous Monitoring, Cyber Governance, Firewall, Vulnerability Assessments
- Status: Free Trial
Technical University of Munich (TUM)
Skills you'll gain: Human Factors, Manufacturing Processes, Automation, Human Machine Interfaces, Cyber Engineering, Digital Transformation, Robotic Process Automation, Maintenance, Repair, and Facility Services, Product Lifecycle Management, Artificial Intelligence, Simulation and Simulation Software
- Status: Free Trial
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, Data Security, Software Development Life Cycle
- Status: Free Trial
Skills you'll gain: OAuth, Cloud API, Application Programming Interface (API), Restful API, Security Controls, Application Security, Network Security, Data Security, JSON, Identity and Access Management, Threat Management
- Status: Free Trial
Coursera Instructor Network
Skills you'll gain: Large Language Modeling, Cybersecurity, Prompt Engineering, Cyber Attacks, Threat Modeling, Cyber Security Assessment, Risk Analysis, Vulnerability Assessments, Network Security, Security Strategy, Risk Mitigation
- Status: Preview
Technical University of Munich (TUM)
Skills you'll gain: Cybersecurity, Safety and Security, Infrastructure Security, Medical Science and Research, Threat Management, Physical Science, Environmental Monitoring, Continuous Monitoring, Spatial Analysis, Risk Analysis, Physics
- Status: NewStatus: Free Trial
EC-Council
Skills you'll gain: Cryptography, Encryption, Systems Development Life Cycle, Human Factors (Security), Security Awareness, Cybersecurity, Cyber Attacks, Cyber Security Policies, Threat Detection, ISO/IEC 27001, Security Controls, Computer Security, Network Security, Risk Management Framework, Information Systems, General Data Protection Regulation (GDPR)
- Status: Free Trial
Infosec
Skills you'll gain: Cyber Risk, Risk Management Framework, Cybersecurity, Cyber Governance, Cyber Security Strategy, Risk Management, Infrastructure Security, Cyber Security Assessment, Security Controls, Vulnerability Assessments, Stakeholder Communications, Continuous Improvement Process, Asset Management
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Threat Detection, Cyber Security Policies, Intrusion Detection and Prevention, Network Troubleshooting, Firewall, Security Management, Infrastructure Security, Network Administration, System Configuration, Technical Support and Services, Software Installation
- Status: Free Trial
Skills you'll gain: Risk Analysis, Risk Management, Incident Response, Business Continuity Planning, Security Management, Threat Modeling, Threat Management, Disaster Recovery, Vulnerability Assessments, Cyber Risk, Cyber Threat Intelligence, Continuous Monitoring, Cybersecurity, Vulnerability Management, Security Strategy, General Data Protection Regulation (GDPR)
In summary, here are 10 of our most popular cyber threat hunting courses
- Learn to Job Search with Indeed: Coursera Project Network
- Security Administration with Cisco Defense Orchestrator: LearnQuest
- Exam Prep SCS-C02: AWS Certified Security – Specialty: Whizlabs
- Digitalisation in the Aerospace Industry: Technical University of Munich (TUM)
- Application Security for Developers and DevOps Professionals: IBM
- API Security on Google Cloud's Apigee API Platform: Google Cloud
- Introduction to Prompt Injection Vulnerabilities: Coursera Instructor Network
- Space Safety: Technical University of Munich (TUM)
- Information Security Fundamentals: EC-Council
- NIST CSF: Infosec