Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: New
Skills you'll gain: Open Web Application Security Project (OWASP), API Design, Application Programming Interface (API), Application Security, Secure Coding, Security Testing, Threat Modeling, DevSecOps, OAuth, Cloud API, Restful API, Security Controls, Vulnerability Assessments, Authorization (Computing), Security Engineering, Cryptography, Authentications, Server Side, Encryption, Incident Response
- Status: NewStatus: Free Trial
Skills you'll gain: Network Security, Endpoint Security, Hardening, Virtual Private Networks (VPN), Firewall, Cloud Security, Cybersecurity, Infrastructure Security, Role-Based Access Control (RBAC), Cloud Computing, Authorization (Computing), Identity and Access Management, Email Security, Network Infrastructure, Network Protocols, Authentications, System Configuration
SAE Institute México
Skills you'll gain: Cyber Attacks, Cyber Security Policies, Cybersecurity, Incident Response, Mobile Security, Computer Security Awareness Training, Personally Identifiable Information, Threat Detection, Data Security, Law, Regulation, and Compliance, Security Controls, Firewall, Malware Protection
Skills you'll gain: Incident Response, Computer Security Incident Management, Cybersecurity, Google Cloud Platform, Malware Protection, Threat Detection, Security Information and Event Management (SIEM)
Skills you'll gain: Google Cloud Platform, Intrusion Detection and Prevention, Network Monitoring, Virtual Machines, Security Information and Event Management (SIEM), Cloud Infrastructure, General Networking, Threat Detection, Network Infrastructure, Load Balancing, System Configuration
- Status: New
Coursera Instructor Network
Skills you'll gain: Prompt Engineering, Risk Modeling, Risk Analysis, Continuous Monitoring, Generative AI, Project Risk Management, Risk Management Framework, Risk Management, Operational Risk, Data-Driven Decision-Making, Business Risk Management, Data Integration, Anomaly Detection, Artificial Intelligence, Threat Detection, Automation
Coursera Project Network
Skills you'll gain: Competitive Analysis, Business Strategy, Strategic Thinking, Market Analysis, Market Dynamics, Market Opportunities, New Business Development, Supplier Management, Company, Product, and Service Knowledge, Consumer Behaviour
Google Cloud
Skills you'll gain: Cloud Security, Google Cloud Platform, Cyber Security Policies, Cloud Management, Security Management, Vulnerability Assessments
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Threat Management, Threat Detection, Cyber Security Policies, Intrusion Detection and Prevention, Network Troubleshooting, Firewall, Security Management, Infrastructure Security, Network Administration, System Configuration, Software Installation, System Implementation
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Security Assessment, Cybersecurity, Security Management, Cyber Attacks, Security Strategy, Threat Management, Malware Protection, Data Security, Vulnerability Assessments, Cyber Risk, Threat Detection, Vulnerability Management, Computer Security Awareness Training, Distributed Denial-Of-Service (DDoS) Attacks, Email Security
- Status: NewStatus: Free Trial
Skills you'll gain: Email Security, Cloud Security, Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Incident Management, Vulnerability Management, Risk Management Framework, Malware Protection, Security Management, Threat Management, Application Security, Cloud Computing, Cybersecurity, Cyber Attacks, Network Security, Disaster Recovery, Cyber Threat Intelligence, Vulnerability Assessments, Threat Detection
Skills you'll gain: PostgreSQL, Data Maintenance, Database Administration, Database Architecture and Administration, SQL, Secure Coding, Database Management, Relational Databases, Query Languages, Security Controls, Data Access, Data Security, Role-Based Access Control (RBAC), Threat Detection
In summary, here are 10 of our most popular cyber threat hunting courses
- A Detailed Guide to the OWASP Top 10:Â Packt
- Advanced Network Security and Endpoint Strategies:Â Packt
- Ciberseguridad para PYMES: SAE Institute México
- Responding to Post-Intrusion Ransomware with Cortex XSOAR:Â Google Cloud
- Google Cloud Packet Mirroring with OpenSource IDS:Â Google Cloud
- GenAI for Risk Managers: Advanced Risk Analysis Techniques:Â Coursera Instructor Network
- Using Porter’s Five Forces Model for Competitive Analysis : Coursera Project Network
- Securing Google Cloud with CFT Scorecard:Â Google Cloud
- Check Point Jump Start: Quantum Management:Â Check Point Software Technologies Ltd.
- Cybersecurity Specialist Capstone:Â IBM