Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Containerization, Network Analysis
Skills you'll gain: Vulnerability Assessments, Risk Management, Continuous Monitoring, Operational Risk, Threat Management, Intrusion Detection and Prevention, Business Risk Management, Cyber Risk, Vulnerability Management, Security Controls, Enterprise Risk Management (ERM), Risk Mitigation, Risk Analysis, Compliance Management, Security Information and Event Management (SIEM), Technical Communication, Network Monitoring, Network Analysis
- Status: Free Trial
University of Michigan
Skills you'll gain: Data Quality, Data Cleansing, Quantitative Research, Data Validation, Data Integrity, Data Collection, Quality Assurance, Data Processing, Data Strategy, Data Management, Data Analysis, Data Access, Statistical Analysis, Sampling (Statistics), Threat Detection
- Status: Free Trial
Skills you'll gain: Cyber Governance, Security Management, Incident Management, Cyber Security Strategy, Business Continuity, Disaster Recovery, IT Management, Information Systems Security, Cybersecurity, Governance, Cyber Risk, Cyber Security Policies, Security Controls, Asset Management, Security Requirements Analysis, Information Assurance, Security Strategy, Key Performance Indicators (KPIs), Leadership and Management, Leadership
- Status: Free Trial
Skills you'll gain: Data Security, Data Migration, Data Governance, Extract, Transform, Load, Cloud Storage, Data Management, Data Integration, Data Architecture, Enterprise Architecture, Data Storage, Data Modeling, Data Quality, Personally Identifiable Information, Incident Response, Security Controls, Information Privacy, Data Infrastructure, Data Warehousing, Threat Detection, Law, Regulation, and Compliance
- Status: Free Trial
Skills you'll gain: Network Security, Cryptography, Firewall, Cybersecurity, Intrusion Detection and Prevention, Virtual Private Networks (VPN), Cloud Security, Cyber Attacks, Public Key Infrastructure, Encryption, Threat Modeling, Network Architecture, Dynamic Host Configuration Protocol (DHCP), Human Factors (Security), Security Awareness, Virtual Local Area Network (VLAN), Network Switches
- Status: Free Trial
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, C and C++, Verification And Validation, Vulnerability Management, Linux, Security Controls, Vulnerability Assessments, Threat Modeling, Data Validation, Debugging, Cryptography, C (Programming Language), Identity and Access Management, Encryption, File Management, OS Process Management
- Status: Free Trial
Skills you'll gain: Threat Management, Incident Management, Remote Access Systems, Incident Response, Security Management, Data Security, Vulnerability Assessments, Threat Detection, Computer Security Incident Management, Cybersecurity, Security Controls, Security Requirements Analysis, Continuous Monitoring, Security Software, Vulnerability Management, Computer Security Awareness Training, Security Strategy, Telecommuting, Infrastructure Security, Cyber Security Policies
- Status: Free Trial
Skills you'll gain: Threat Modeling, IT Security Architecture, Secure Coding, Application Security, Security Testing, Security Strategy, Solution Architecture, Security Requirements Analysis, Software Development Methodologies, Software Development Life Cycle, Systems Architecture, Penetration Testing, Business Risk Management, Compliance Management
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Intrusion Detection and Prevention, Anomaly Detection, Cyber Security Strategy, Threat Detection, Network Analysis, Network Security, Network Monitoring, NIST 800-53, Cloud Security
- Status: Free Trial
University of Colorado System
Skills you'll gain: Firewall, Network Security, Intrusion Detection and Prevention, Information Systems Security, Security Controls, Network Monitoring, Threat Detection, Linux Administration, Linux
- Status: NewStatus: Free Trial
Skills you'll gain: Network Monitoring, Network Troubleshooting, Network Security, Incident Response, Anomaly Detection, Network Analysis, Cyber Security Assessment, Network Protocols, Threat Detection, Technical Communication, Distributed Denial-Of-Service (DDoS) Attacks, Computer Security, Cybersecurity, Vulnerability Assessments
In summary, here are 10 of our most popular cyber threat hunting courses
- Cloud Security Risks: Identify and Protect Against Threats:Â Google Cloud
- Risk Identification, Monitoring, and Analysis:Â ISC2
- Total Data Quality:Â University of Michigan
- Cybersecurity Leadership and Management:Â Infosec
- Enterprise Data Integration, Governance and Architecture:Â SkillUp
- Fundamentals of Network Security and Cryptography:Â Packt
- Identifying Security Vulnerabilities in C/C++Programming:Â University of California, Davis
- Identifying and Managing Security Gaps for Remote Teams:Â LearnQuest
- Designing Robust Information System Security Architectures:Â LearnQuest
- Advanced Network Analysis and Incident Response:Â Johns Hopkins University