Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free
Amazon Web Services
Skills you'll gain: Responsible AI, Data Governance, AWS Identity and Access Management (IAM), Cloud Security, Amazon Web Services, Cyber Governance, Information Systems Security, Security Controls
- Status: Free Trial
Illinois Tech
Skills you'll gain: Linux, Cloud-Native Computing, Network Security, Linux Administration, Cloud Computing, Amazon Web Services, Infrastructure as Code (IaC), Cloud Computing Architecture, Network Troubleshooting, Operating System Administration, Cloud Storage, Linux Commands, Software-Defined Networking, User Accounts, Cloud Infrastructure, Network Monitoring, Command-Line Interface, Threat Modeling, Cloud Services, Data Infrastructure
- Status: Free Trial
Skills you'll gain: Data Security, Data Migration, Data Governance, Extract, Transform, Load, Cloud Storage, Data Management, Data Integration, Data Architecture, Enterprise Architecture, Data Storage, Data Modeling, Data Quality, Personally Identifiable Information, Incident Response, Security Controls, Information Privacy, Data Infrastructure, Data Warehousing, Threat Detection, Law, Regulation, and Compliance
- Status: Free Trial
Board Infinity
Skills you'll gain: Cloud Computing, Cloud Computing Architecture, Process Optimization, Process Improvement, Manufacturing Operations, Manufacturing and Production, Internet Of Things, Innovation, Workforce Development, Cybersecurity, Manufacturing Processes, Automation, Augmented and Virtual Reality (AR/VR), Blockchain, Cloud Security, Digital Transformation, Technology Strategies, 3D Modeling, Industrial Engineering, Change Management
- Status: Free Trial
University of Colorado System
Skills you'll gain: Firewall, Network Security, Intrusion Detection and Prevention, Information Systems Security, Security Controls, Network Monitoring, Threat Detection, Linux Administration, Linux
- Status: Free Trial
University of Michigan
Skills you'll gain: Data Quality, Data Cleansing, Data Collection, Data Validation, Data Analysis, Data Processing, Threat Detection, Data Access, Sampling (Statistics)
- Status: Free
Coursera Project Network
Skills you'll gain: Threat Detection, Anomaly Detection, Network Security, General Networking, Network Monitoring, Network Troubleshooting, Real Time Data, Security Strategy, Network Analysis, Network Protocols, Data Capture
- Status: Free Trial
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Azure Active Directory, Microsoft Azure, Cloud Security, Firewall, Cyber Attacks, Cybersecurity, Malware Protection, Identity and Access Management, Network Security, Threat Management, Endpoint Security, Security Information and Event Management (SIEM), Threat Detection, Scenario Testing, Virtual Machines, Event Management
- Status: New
Skills you'll gain: Cybersecurity, Cyber Attacks, Endpoint Security, Infrastructure Security, Network Routing, Threat Detection, Computer Security, Firewall, Computer Networking, Wireless Networks, Information Technology Infrastructure Library, Vulnerability Assessments
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Generative AI, Fraud detection, Feature Engineering, Cybersecurity, Cyber Security Strategy, Threat Modeling, Deep Learning, Anomaly Detection, Artificial Intelligence, Security Testing, Machine Learning Methods, Reinforcement Learning, Machine Learning
- Status: Free Trial
Arizona State University
Skills you'll gain: Cyber Attacks, Data Security, Safety and Security, Cybersecurity, Computer Security Awareness Training, Information Systems Security, Security Strategy, Security Controls, Threat Modeling, Disaster Recovery, Data Loss Prevention, Incident Response, Vulnerability Assessments, Patch Management
- Status: Free Trial
University of California, Irvine
Skills you'll gain: Data Security, System Design and Implementation, Data Ethics, Cybersecurity, Safety and Security, Information Technology, Information Privacy, Computer Literacy, Software Development Tools, Data Sharing, Technology Strategies
In summary, here are 10 of our most popular cyber threat hunting courses
- Security, Compliance, and Governance for AI Solutions:Â Amazon Web Services
- Information Technology Fundamentals for Everyone:Â Illinois Tech
- Enterprise Data Integration, Governance and Architecture:Â SkillUp
- Advances in Manufacturing Technology:Â Board Infinity
- Secure Networked System with Firewall and IDS:Â University of Colorado System
- The Total Data Quality Framework:Â University of Michigan
- Wireshark for Security: Detect Network Anomalies:Â Coursera Project Network
- Azure Cybersecurity Solutions And Microsoft Defender :Â Microsoft
- Palo Alto Networks Cybersecurity Fundamentals:Â Packt
- Securing AI and Advanced Topics:Â Johns Hopkins University