Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: NewStatus: Free Trial
Whizlabs
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Identity and Access Management, Cloud Security, Network Security, Threat Detection, Amazon S3, Infrastructure Security, Data Security, Security Management, Vulnerability Management, Vulnerability Assessments, Application Security, Key Management, User Provisioning, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Authorization (Computing), Encryption
- Status: Preview
SAE Institute México
Skills you'll gain: Cyber Attacks, Cyber Security Policies, Cybersecurity, Incident Response, Mobile Security, Computer Security Awareness Training, Personally Identifiable Information, Threat Detection, Data Security, Law, Regulation, and Compliance, Security Controls, Firewall, Malware Protection
Coursera Project Network
Skills you'll gain: Competitive Analysis, Business Strategy, Market Analysis, Case Studies, Corporate Strategy, Market Dynamics, Market Opportunities, Strategic Planning, New Business Development, Supplier Management, Company, Product, and Service Knowledge, Consumer Behaviour, Entrepreneurship, Leadership
- Status: Free Trial
Google Cloud
Skills you'll gain: Email Security, Data Loss Prevention, Google Workspace, Gmail, User Provisioning, Mobile Security, Authentications, Threat Management, User Accounts, Cloud Security, Malware Protection, Personally Identifiable Information, Data Security, Cloud Services, Systems Administration, Multi-Factor Authentication, Identity and Access Management, Security Management, Document Management, Data Management
- Status: Free
DeepLearning.AI
Skills you'll gain: LLM Application, Large Language Modeling, Security Testing, Application Security, Continuous Monitoring, Responsible AI, Threat Detection, System Monitoring, Data Security
Skills you'll gain: Security Testing, Penetration Testing, Open Web Application Security Project (OWASP), Cyber Security Assessment, Vulnerability Scanning, Application Security, Exploitation techniques, Vulnerability Assessments, Data Security, Web Applications, SQL
- Status: Free Trial
Google Cloud
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Network Monitoring, Firewall, Google Cloud Platform, Cloud Security, Intrusion Detection and Prevention, Identity and Access Management, Proxy Servers, Threat Detection
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Large Language Modeling, Network Security, Responsible AI, Cybersecurity, Infrastructure Security, Information Systems Security, Threat Modeling, Firewall, Governance, Network Protocols, Internet Of Things, Artificial Intelligence
Skills you'll gain: Exploit development, Test Tools, Cyber Security Assessment, Vulnerability Scanning, Vulnerability Assessments, Web Development Tools, Application Security, Web Servers, Network Protocols, Web Applications, Proxy Servers, Automation
Skills you'll gain: Risk Management, Cyber Risk, Threat Management, Security Management, Vulnerability Management, Business Risk Management, Enterprise Risk Management (ERM), IT Management, Risk Mitigation, Cybersecurity, Cyber Security Strategy, Vulnerability Assessments, Compliance Management, Information Technology
Skills you'll gain: Penetration Testing, Exploitation techniques, Cybersecurity, Vulnerability Assessments, Vulnerability Scanning, Linux, Operating System Administration, Command-Line Interface, Linux Commands, Cryptography, File Management, Virtual Environment, Microsoft Windows, Scripting
- Status: Free Trial
LearnQuest
Skills you'll gain: Blockchain, Interoperability, Network Architecture, Solution Architecture, Information Technology Architecture, Enterprise Architecture, Cryptography, Identity and Access Management, Emerging Technologies, Encryption, Threat Modeling, Systems Integration, Information Privacy, Scalability, Security Testing, Requirements Analysis, Prototyping
In summary, here are 10 of our most popular cyber threat hunting courses
- AWS: Security and Key Management:Â Whizlabs
- Ciberseguridad para PYMES: SAE Institute México
- Using Porter’s Five Forces Model for Competitive Analysis : Coursera Project Network
- Google Workspace Administration 日本語版: Google Cloud
- Quality and Safety for LLM Applications:Â DeepLearning.AI
- Web Hacker's Toolbox - Tools Used by Successful Hackers:Â Packt
- Networking in Google Cloud: Network Security:Â Google Cloud
- Artificial Intelligence Industrial Control Systems Security:Â Johns Hopkins University
- Burp Suite Unfiltered - Go from a Beginner to Advanced:Â Packt
- Risk Management for Cybersecurity and IT Managers:Â Packt