Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
Skills you'll gain: Threat Management, Cybersecurity, Risk Management, Incident Response, Vulnerability Management, Security Information and Event Management (SIEM), Security Controls, Information Systems Security, Enterprise Security, Risk Analysis, Threat Detection, Information Assurance, Open Web Application Security Project (OWASP), Auditing, Compliance Auditing
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Risk Management Framework, Continuous Monitoring, Cyber Security Assessment, Security Controls, Information Privacy
- Status: NewStatus: Free Trial
Advancing Women in Tech
Skills you'll gain: ISO/IEC 27001, Budget Management, Vendor Management, Leadership Development, Supplier Management, Cyber Security Assessment, Cyber Security Strategy, Risk Management, Performance Measurement, Business Metrics, Operational Efficiency
- Status: Free Trial
Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Cryptography
- Status: Free Trial
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cybersecurity, Cyber Security Strategy, Data Encryption Standard, Cyber Risk, Mobile Security, Enterprise Security, Computer Security, Cyber Security Policies, Network Architecture, Security Controls
- Status: Free Trial
Microsoft
Skills you'll gain: Vulnerability Management, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Security Testing, Network Security, Threat Management, System Testing, Firewall, Cybersecurity, Cloud Security, Microsoft Azure, Virtual Private Networks (VPN), Windows PowerShell, Command-Line Interface
- Status: Free Trial
Skills you'll gain: Incident Response, Computer Security Incident Management, Cybersecurity, Cyber Threat Intelligence, Security Management, Security Awareness, Data Ethics, Data Security, Personally Identifiable Information, Technical Communication, Artificial Intelligence
- Status: Preview
Coursera Instructor Network
Skills you'll gain: Cyber Threat Intelligence, Cybersecurity, Penetration Testing, Threat Detection, Security Information and Event Management (SIEM), Incident Response, Generative AI, Data Ethics, Security Testing, Vulnerability Assessments, Prompt Engineering
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Human Factors (Security), Security Awareness, Computer Security Awareness Training, Cyber Governance, Cyber Security Strategy, Cyber Security Policies, Cyber Attacks, Cyber Risk, Data Ethics, Usability, Cyber Security Assessment, Security Strategy, Cybersecurity, Cyber Threat Intelligence, Security Management, Cyber Threat Hunting, Data Security, Network Security, Cloud Security, Mobile Security
- Status: Preview
Edureka
Skills you'll gain: Cybersecurity, Secure Coding, Cyber Security Strategy, Threat Detection, Network Security, IT Security Architecture, Generative AI, Endpoint Security, Continuous Monitoring, Incident Response, Artificial Intelligence, IT Automation, Data Analysis
- Status: Free Trial
Skills you'll gain: Cyber Threat Intelligence, Security Information and Event Management (SIEM), Threat Modeling, Generative AI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Prompt Engineering, Natural Language Processing, Anomaly Detection, Vulnerability Management, Artificial Intelligence
- Status: Preview
University of London
Skills you'll gain: Key Management, Security Management, Cryptography, Information Systems Security, Cyber Security Policies, Cybersecurity, Encryption, Cyber Risk, Threat Management, Computer Security, Information Assurance, Data Integrity, Incident Response
In summary, here are 10 of our most popular cyber threat hunting courses
- Play It Safe: Manage Security Risks:Â Google
- The GRC Approach to Managing Cybersecurity:Â Kennesaw State University
- Cybersecurity Metrics, Vendors & Risks:Â Advancing Women in Tech
- Assets, Threats, and Vulnerabilities:Â Google
- Introduction to Cyber Security:Â New York University
- Cybersecurity Testing and Prevention:Â Microsoft
- Put It to Work: Prepare for Cybersecurity Jobs:Â Google
- GenAI for Cybersecurity Analysts:Â Coursera Instructor Network
- Cyber Security: Essentials for Workplace:Â Macquarie University
- Gen AI in Cybersecurity:Â Edureka