Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Encryption, Cybersecurity, Hardening, Infrastructure Security, Computer Security, Threat Modeling, Network Security, Public Key Infrastructure, Authentications, Data Integrity
- Status: Free Trial
Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Security Testing, Threat Modeling, Application Security, Vulnerability Assessments, Extensible Markup Language (XML)
Skills you'll gain: Exploit development, Test Tools, Cyber Security Assessment, Vulnerability Scanning, Vulnerability Assessments, Web Development Tools, Application Security, Web Servers, Network Protocols, Web Applications, Proxy Servers, Automation
Skills you'll gain: Penetration Testing, Exploitation techniques, Cybersecurity, Vulnerability Assessments, Vulnerability Scanning, Linux, Operating System Administration, Command-Line Interface, Linux Commands, Cryptography, File Management, Virtual Environment, Microsoft Windows, Scripting
- Status: Free Trial
LearnQuest
Skills you'll gain: Blockchain, Interoperability, Network Architecture, Solution Architecture, Information Technology Architecture, Enterprise Architecture, Cryptography, Identity and Access Management, Emerging Technologies, Encryption, Threat Modeling, Systems Integration, Information Privacy, Scalability, Security Testing, Requirements Analysis, Prototyping
- Status: Free Trial
Skills you'll gain: Disaster Recovery, Regulation and Legal Compliance, Risk Management, Compliance Management, Regulatory Compliance, Governance Risk Management and Compliance, Risk Analysis, Cloud Security, Business Continuity, Cyber Risk, Security Management, Vendor Management, Incident Response, Data Security, Business Analysis, Personally Identifiable Information
Skills you'll gain: Disaster Recovery, Business Continuity, Contingency Planning, Threat Management, Incident Management, Incident Response, Risk Analysis, Key Performance Indicators (KPIs), Vulnerability Assessments, Business Risk Management, Crisis Management, Business Analysis, IT Infrastructure, Test Planning, Product Testing, Operational Risk, Business Process, Performance Metric, Cloud Computing, Information Technology Architecture
- Status: Preview
Skills you'll gain: Application Security, Threat Modeling, Secure Coding, Security Testing, Software Development Life Cycle, Security Controls, Risk Management Framework, Security Requirements Analysis, Software Development, Authorization (Computing), Data Security, Vulnerability Assessments, Identity and Access Management, Verification And Validation, Cryptography, Software Architecture, Software Design
Coursera Project Network
Skills you'll gain: Competitive Analysis, Business Strategy, Market Analysis, Case Studies, Corporate Strategy, Market Dynamics, Market Opportunities, Strategic Planning, New Business Development, Supplier Management, Company, Product, and Service Knowledge, Consumer Behaviour, Entrepreneurship, Leadership
- Status: Free Trial
Skills you'll gain: Email Security, Incident Response, Computer Security Incident Management, Malware Protection, Cybersecurity, Network Security, Intrusion Detection and Prevention, Event Monitoring, Cyber Security Strategy, Threat Detection, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Wireless Networks
Coursera Project Network
Skills you'll gain: OSI Models, TCP/IP, Network Monitoring, Network Protocols, Network Troubleshooting, Network Security, Network Administration, Network Analysis, Cyber Security Assessment, Linux
- Status: Free
DeepLearning.AI
Skills you'll gain: LLM Application, Large Language Modeling, Security Testing, Application Security, Continuous Monitoring, Responsible AI, Threat Detection, System Monitoring, Data Security
In summary, here are 10 of our most popular cyber threat hunting courses
- Security Architecture and Engineering:Â Packt
- Previous OWASP Risks:Â Infosec
- Burp Suite Unfiltered - Go from a Beginner to Advanced:Â Packt
- The Complete Pentesting and Privilege Escalation Course:Â Packt
- Advanced Blockchain Architectures:Â LearnQuest
- Governance, Risk, and Compliance:Â Packt
- Business Continuity and Disaster Recovery:Â Packt
- Certified Secure Software Lifecycle Professional (CSSLP):Â Infosec
- Using Porter’s Five Forces Model for Competitive Analysis : Coursera Project Network
- Handling Security Incidents Across Domains:Â Packt