Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Preview
University of Geneva
Skills you'll gain: Infectious Diseases, Epidemiology, Health Disparities, Social Determinants Of Health, Public Health, Emergency Response, Environmental Issue, Climate Change Adaptation, Media and Communications, Neurology, Maternal Health, Diagnostic Tests, Research
- Status: Free Trial
Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), OAuth, Data Validation, Authentications, Back-End Web Development, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Vulnerability Scanning, Cyber Attacks, Threat Modeling, Software Testing, Distributed Denial-Of-Service (DDoS) Attacks, Data Integrity, Server Side, Security Strategy
- Status: Free Trial
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Azure Active Directory, Microsoft Azure, Cloud Security, Firewall, Cyber Attacks, Cybersecurity, Malware Protection, Identity and Access Management, Network Security, Threat Management, Endpoint Security, Security Information and Event Management (SIEM), Threat Detection, Scenario Testing, Virtual Machines, Event Management
- Status: Preview
Erasmus University Rotterdam
Skills you'll gain: Journalism, Media and Communications, Public Affairs, Research, Technical Communication, Driving engagement, Scientific Methods, Persuasive Communication, Digital Communications, Threat Detection, Interpersonal Communications, Public Policies, Policy Development, Content Creation, Social Sciences, Ethical Standards And Conduct
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Generative AI, Fraud detection, Feature Engineering, Cybersecurity, Cyber Security Strategy, Threat Modeling, Deep Learning, Anomaly Detection, Artificial Intelligence, Security Testing, Machine Learning Methods, Reinforcement Learning, Machine Learning
- Status: Free
Coursera Project Network
Skills you'll gain: Linux Commands, Linux, TCP/IP, Scripting, Shell Script, Network Monitoring, Network Analysis, Network Security, Network Protocols
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Cyber Security Assessment, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Threat Modeling, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Cyber Threat Intelligence, Mobile Security, Cyber Operations, Security Testing, Vulnerability Scanning, Network Security, Operating Systems, Encryption
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Risk Management, Risk Management Framework, Threat Management, Operational Risk, Enterprise Risk Management (ERM), Business Risk Management, Cyber Risk, Risk Mitigation, Risk Analysis, Governance Risk Management and Compliance, Vulnerability Assessments, Continuous Improvement Process
- Status: NewStatus: Free Trial
Illinois Tech
Skills you'll gain: Virtualization, Cloud-Native Computing, Network Security, Cloud Computing, Amazon Web Services, Infrastructure as Code (IaC), Cloud Computing Architecture, Virtual Machines, Network Troubleshooting, Cloud Storage, Hyper-V, Software-Defined Networking, Cloud Infrastructure, VMware ESX Servers, Network Monitoring, Threat Modeling, TCP/IP, Data Centers, Data Storage, Cloud Security
- Status: New
Skills you'll gain: Cybersecurity, Cyber Attacks, Endpoint Security, Infrastructure Security, Network Routing, Threat Detection, Computer Security, Firewall, Computer Networking, Wireless Networks, Information Technology Infrastructure Library, Vulnerability Assessments
- Status: Free Trial
University of Michigan
Skills you'll gain: Climate Change Programs, Environment, Environmental Regulations, Sustainable Development, Environmental Policy, Climate Change Mitigation, Energy and Utilities, Climate Change Adaptation, Health Assessment, Public Health, Pollution Prevention
- Status: Free Trial
Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Containerization, Network Analysis
In summary, here are 10 of our most popular cyber threat hunting courses
- In the footsteps of Zika… approaching the unknown: University of Geneva
- Software Security for Web Applications: Codio
- Azure Cybersecurity Solutions And Microsoft Defender : Microsoft
- Science Communication: Communicating Trustworthy Information in the Digital World: Erasmus University Rotterdam
- Securing AI and Advanced Topics: Johns Hopkins University
- Analyze Network Traffic with TCPDump: Build a Logging Tool: Coursera Project Network
- Introduction to Ethical Hacking: Johns Hopkins University
- A General Approach to Risk Management: Kennesaw State University
- Cloud Computing: Infrastructure and Platforms: Illinois Tech
- Palo Alto Networks Cybersecurity Fundamentals: Packt