Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: NewStatus: Preview
Skills you'll gain: Event Monitoring, OSI Models, Network Monitoring, Network Protocols, Cyber Threat Intelligence, Network Analysis, Network Troubleshooting, TCP/IP, Distributed Denial-Of-Service (DDoS) Attacks, Threat Detection, General Networking, Network Security, Incident Response, Command-Line Interface
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Scanning, Cybersecurity, Vulnerability Assessments, Network Security, Network Analysis, SQL
- Status: Free Trial
Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Network Security, Cryptography, Exploit development, Information Systems Security, Threat Detection, Intrusion Detection and Prevention, Cloud Security
- Status: NewStatus: Free Trial
LearnKartS
Skills you'll gain: Incident Response, Vulnerability Management, Computer Security Incident Management, Cyber Operations, Hardening, Cybersecurity, Security Controls, Vulnerability Assessments, Threat Detection, Identity and Access Management, Intrusion Detection and Prevention, IT Security Architecture, Information Systems Security, Vulnerability Scanning, Threat Management, Application Security, Mobile Security, Network Security, Authorization (Computing), Continuous Monitoring
- Status: NewStatus: Free Trial
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, LangChain, Threat Detection, Responsible AI, Large Language Modeling, Continuous Monitoring, Information Systems Security, Generative AI, Vulnerability Assessments, Incident Response, LangGraph, Prompt Engineering, Security Strategy, Artificial Intelligence
- Status: Free Trial
University of California, Irvine
Skills you'll gain: Threat Modeling, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Business Risk Management, Risk Management Framework, Risk Mitigation, Vulnerability Assessments, Asset Management, Disaster Recovery, Security Controls
- Status: Free Trial
New York University
Skills you'll gain: Infrastructure Security, Cyber Security Strategy, Mobile Security, Enterprise Security, Cyber Risk, Cyber Security Policies, Cybersecurity, Cloud Security, NIST 800-53, Hybrid Cloud Computing, Security Controls, Risk Management Framework, Blockchain, Internet Of Things, Cryptography, Data Integrity
- Status: NewStatus: Free Trial
Skills you'll gain: Cryptography, Encryption, Cloud Security, Cyber Security Assessment, Cloud Computing, Advanced Encryption Standard (AES), Data Security, Public Key Infrastructure
- Status: Free Trial
Skills you'll gain: MITRE ATT&CK Framework, Cybersecurity, Cyber Threat Intelligence, Cyber Operations, IT Automation, Scripting, Python Programming
- Status: Preview
Stanford University
Skills you'll gain: Physics, Timelines, Verification And Validation, Scientific Methods, Research, Mechanics, Mathematical Modeling, Systems Of Measurement
- Status: Free Trial
Palo Alto Networks
Skills you'll gain: Network Security, Cloud Security, Cybersecurity, Cloud Infrastructure, Firewall, Network Infrastructure, Docker (Software), Software As A Service, Virtual Private Networks (VPN), Hybrid Cloud Computing, Containerization, Threat Detection, Data Centers, Threat Management, OSI Models, Enterprise Security, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Vulnerability Scanning, Incident Response
- Status: Free Trial
LearnQuest
Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Intrusion Detection and Prevention, Cyber Threat Intelligence, Continuous Monitoring, Threat Detection, Security Strategy, Cloud Security, Disaster Recovery, Threat Management, Firewall, Network Security, Cybersecurity, Security Information and Event Management (SIEM), Network Monitoring, Security Controls, Information Systems Security, Infrastructure Security, Cloud Management
In summary, here are 10 of our most popular cyber threat hunting courses
- Network Traffic Analysis for Incident Response:Â Infosec
- Practical Cybersecurity Fundamentals: Unit 3:Â Pearson
- Certified Ethical Hacker (CEH) v.12:Â Packt
- Cybersecurity Operations and Controls:Â LearnKartS
- Certified Ethical Hacker (CEH): Unit 8:Â Pearson
- Introduction to Risk Management:Â University of California, Irvine
- Enterprise and Infrastructure Security:Â New York University
- Certified Ethical Hacker (CEH): Unit 7:Â Pearson
- Introduction to Python for Cybersecurity :Â Infosec
- Understanding Einstein: The Special Theory of Relativity:Â Stanford University