Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authorization (Computing), Cyber Risk, Authentications, Cloud Computing, Threat Management, Security Controls, Application Security, Secure Coding, System Monitoring, Cryptography, Security Testing, Data Security, Identity and Access Management
- Status: Free Trial
University of Michigan
Skills you'll gain: Data Quality, Data Cleansing, Data Collection, Data Validation, Data Analysis, Data Processing, Threat Detection, Data Access, Sampling (Statistics)
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Generative AI, Fraud detection, Feature Engineering, Cybersecurity, Cyber Security Strategy, Threat Modeling, Deep Learning, Anomaly Detection, Artificial Intelligence, Security Testing, Machine Learning Methods, Reinforcement Learning, Machine Learning
Skills you'll gain: Vulnerability Scanning, Penetration Testing, MITRE ATT&CK Framework, Metasploit, Vulnerability Assessments, Security Testing, Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Virtual Machines, Technical Documentation, Microsoft Windows, Windows PowerShell, Linux Commands, Command-Line Interface, Software Installation
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Risk Management, Risk Management Framework, Threat Management, Operational Risk, Enterprise Risk Management (ERM), Business Risk Management, Cyber Risk, Risk Mitigation, Risk Analysis, Governance Risk Management and Compliance, Vulnerability Assessments, Continuous Improvement Process
- Status: Free Trial
Skills you'll gain: Security Testing, General Networking, Computer Networking, Problem Solving
- Status: Free Trial
Microsoft
Skills you'll gain: Data Security, Cloud Security, Azure Active Directory, Microsoft Azure, Data Storage, Microsoft SQL Servers, Data Encryption Standard, Authorization (Computing), Authentications, Database Management, Data Governance, Key Management, Role-Based Access Control (RBAC), Threat Modeling, Identity and Access Management, Firewall
- Status: Free Trial
Skills you'll gain: Splunk, Data Modeling, Role-Based Access Control (RBAC), System Monitoring, Incident Response, User Accounts, Security Information and Event Management (SIEM), Machine Learning, Event Monitoring, Systems Administration, Performance Tuning, Data Visualization, Threat Detection, Anomaly Detection, Continuous Monitoring, Correlation Analysis, Data Analysis, Authentications, Data Collection, Configuration Management
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Endpoint Detection and Response, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Anomaly Detection, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Network Analysis
- Status: Preview
Starweaver
Skills you'll gain: Threat Modeling, Cyber Threat Intelligence, Vulnerability Management, Cybersecurity, Threat Detection, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Cyber Attacks, Cyber Operations, Patch Management, Continuous Monitoring, Configuration Management
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Information Systems Security, Software Installation, Virtual Machines
- Status: NewStatus: Free Trial
Skills you'll gain: Linux Administration, Bash (Scripting Language), Network Monitoring, Cyber Security Assessment, Exploit development, Intrusion Detection and Prevention, System Configuration, Virtual Machines
In summary, here are 10 of our most popular cyber threat hunting courses
- Cloud Top Ten Risks:Â University of Minnesota
- The Total Data Quality Framework:Â University of Michigan
- Securing AI and Advanced Topics:Â Johns Hopkins University
- Pentesting Fundamentals for Beginners:Â Packt
- A General Approach to Risk Management:Â Kennesaw State University
- CEH (v12) Practice Projects and Exam Simulators:Â LearnKartS
- Secure Your Data at Rest:Â Microsoft
- Splunk Administration and Advanced Topics:Â EDUCBA
- Introduction to Intrusion Detection Systems (IDS):Â Johns Hopkins University
- Deception As a Defense:Â Starweaver