Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: NewStatus: Free Trial
SkillUp EdTech
Skills you'll gain: Network Monitoring, Network Troubleshooting, Network Security, Incident Response, Anomaly Detection, Network Analysis, Cyber Security Assessment, Network Protocols, Threat Detection, Technical Communication, Distributed Denial-Of-Service (DDoS) Attacks, Computer Security, Cybersecurity, Vulnerability Assessments
- Status: New
Skills you'll gain: Non-Verbal Communication, Human Factors (Security), Investigation, Data Collection, Cyber Threat Intelligence, Security Awareness, Persuasive Communication, Vulnerability, Social Sciences, Cybersecurity, Rapport Building, Email Security
- Status: Free Trial
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cybersecurity, Cyber Security Strategy, Data Encryption Standard, Cyber Risk, Mobile Security, Enterprise Security, Computer Security, Cyber Security Policies, Network Architecture, Security Controls
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Security Awareness, Mobile Security, Cyber Attacks, Cyber Security Strategy, Cyber Risk, Cybersecurity, Cyber Governance, Cyber Security Assessment, Cyber Security Policies, Cyber Threat Intelligence, Data Security, Malware Protection, Security Strategy, Human Factors (Security), Security Management, Authentications, Cyber Threat Hunting, Email Security, Identity and Access Management, Cloud Security
- Status: Preview
West Virginia University
Skills you'll gain: Auditing, Loss Prevention, Internal Controls, Financial Controls, Threat Detection, Anomaly Detection, Financial Auditing, Cybersecurity, Financial Data, Cyber Operations, Investigation, Criminal Investigation and Forensics, Analytics, Specialized Accounting, Cyber Attacks, Security Awareness, Big Data, Accounting, Business Ethics, Compliance Reporting
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Network Security, Incident Response, Network Administration, Vulnerability Management, Cybersecurity, Contingency Planning, Cyber Governance, Cyber Attacks, Disaster Recovery, Cyber Security Policies, Security Management, Firewall, Computer Security Incident Management, Network Monitoring, General Networking, Cyber Security Strategy, Crisis Management, Vulnerability Assessments, Cyber Security Assessment, Risk Management
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: DevSecOps, Secure Coding, DevOps, IT Security Architecture, Cloud-Native Computing, Azure DevOps, Software Architecture, Security Engineering, Hardening, Software Design, Kubernetes, Microsoft Azure, Cybersecurity, Web Applications, Infrastructure as Code (IaC), Containerization, API Design, Software Engineering, Role-Based Access Control (RBAC), Git (Version Control System)
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Risk Management Framework, Continuous Monitoring, Cyber Security Assessment, Security Controls, Information Privacy
- Status: NewStatus: Free Trial
Whizlabs
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Identity and Access Management, Cloud Security, Network Security, Threat Detection, Amazon S3, Infrastructure Security, Data Security, Security Management, Vulnerability Management, Vulnerability Assessments, Application Security, Key Management, User Provisioning, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Authorization (Computing), Encryption
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Authentications, Identity and Access Management, Single Sign-On (SSO), Security Assertion Markup Language (SAML), Multi-Factor Authentication, User Provisioning, OAuth, Threat Modeling, Authorization (Computing), IT Security Architecture, Threat Management, Zero Trust Network Access, Cybersecurity, Systems Architecture, Role-Based Access Control (RBAC), Vulnerability Assessments, Cryptography, Threat Detection, Remote Access Systems, Risk Management
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Cyber Threat Intelligence, Security Testing, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Information Systems Security, Threat Modeling, Security Engineering, DevSecOps, Data Security, Cyber Governance, Artificial Intelligence, Artificial Intelligence and Machine Learning (AI/ML), Risk Management, Encryption, Machine Learning, Application Programming Interface (API), Regulation and Legal Compliance, Governance, Applied Machine Learning
- Status: Free Trial
Skills you'll gain: IT Service Management, Information Technology Infrastructure Library, Cyber Risk, Data Ethics, Cyber Governance, NIST 800-53, Information Technology, Cybersecurity, ISO/IEC 27001, Security Management, Control Objectives for Information and Related Technology (COBIT), Artificial Intelligence, Risk Management Framework, Open Web Application Security Project (OWASP), Risk Management, Payment Card Industry (PCI) Data Security Standards, General Data Protection Regulation (GDPR)
In summary, here are 10 of our most popular cyber threat hunting courses
- Network Traffic Analysis with Wireshark:Â SkillUp EdTech
- Social Engineering Expert:Â Packt
- Introduction to Cyber Security:Â New York University
- Cyber Security Essentials:Â Macquarie University
- Forensic Accounting and Fraud Examination:Â West Virginia University
- Managing Cybersecurity:Â Kennesaw State University
- DevSecOps:Â Macquarie University
- The GRC Approach to Managing Cybersecurity:Â Kennesaw State University
- AWS: Security and Key Management:Â Whizlabs
- Identity Access Management (IAM) and Secure Authentication:Â Macquarie University