Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Preview
The University of Hong Kong
Skills you'll gain: Infectious Diseases, Epidemiology, Public Health and Disease Prevention, Public Health, Healthcare Ethics, Community Health, Emergency Response, Research, Immunology, Microbiology, Risk Analysis, Media and Communications
- Status: Free Trial
Skills you'll gain: Splunk, Dashboard, Data Transformation, Data Manipulation, Data Analysis, Statistical Analysis, Query Languages, Data Visualization Software, Ad Hoc Reporting, Real Time Data, Continuous Monitoring
- Status: Free Trial
Skills you'll gain: Cybersecurity, Cyber Operations, MITRE ATT&CK Framework, Exploitation techniques, Persistence, Intrusion Detection and Prevention, Scripting, Python Programming, Microsoft Windows
- Status: Free
Coursera Project Network
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Cyber Security Assessment, Network Security, Network Monitoring, Operating Systems
- Status: Free Trial
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Cyber Threat Intelligence, Security Information and Event Management (SIEM), Threat Detection, Vulnerability Assessments, Cyber Threat Hunting, Event Monitoring, Technical Communication, Cyber Security Policies, Vulnerability Management, Continuous Monitoring, Threat Management, Security Controls, Communication Strategies, Root Cause Analysis
- Status: Free Trial
Skills you'll gain: Database Management, Databases, Relational Databases, Database Architecture and Administration, Data Security, User Accounts, Secure Coding, SQL, Application Security, Vulnerability Scanning, NoSQL, Role-Based Access Control (RBAC), Encryption, Data Manipulation
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Incident Response, Contingency Planning, Disaster Recovery, Computer Security Incident Management, Security Management, Crisis Management, Cybersecurity, Business Continuity, Cyber Attacks, Risk Analysis, Business Risk Management, Data Management
- Status: Free Trial
Skills you'll gain: Intrusion Detection and Prevention, Continuous Monitoring, Threat Management, Firewall, Incident Response, Network Security, Threat Detection, Network Monitoring, Information Systems Security, Infrastructure Security, Cybersecurity
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, TCP/IP, Internet Of Things, Network Security, Threat Detection, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Docker (Software)
Skills you'll gain: Threat Detection, Vulnerability Management, Cyber Threat Hunting, Vulnerability Assessments, Cloud Security, Multi-Cloud, Intrusion Detection and Prevention, Threat Management, Google Cloud Platform, Enterprise Security, Risk Management Framework
- Status: Free
Infosec
Skills you'll gain: Cybersecurity, Cyber Attacks, Incident Response, Security Management, Network Security, Security Information and Event Management (SIEM), Security Controls, Identity and Access Management, Cryptography, Threat Detection, Data Security, Computer Security, Encryption, Personally Identifiable Information, Data Governance, Firewall, Vulnerability Assessments, User Accounts, Authorization (Computing), Risk Management
- Status: Free Trial
Skills you'll gain: Risk Management Framework, Incident Response, Cyber Security Policies, Secure Coding, Cybersecurity, Computer Security Incident Management, Cyber Security Assessment, Threat Modeling, Application Security, ISO/IEC 27001, Cyber Governance, Data Security, Malware Protection, Penetration Testing, Security Controls, Threat Detection
In summary, here are 10 of our most popular cyber threat hunting courses
- Epidemics:Â The University of Hong Kong
- Splunk Query Language and Data Analysis:Â EDUCBA
- Execution, persistence, privilege escalation and evasion:Â Infosec
- Vulnerability Scanning with Nmap: Network Scanning:Â Coursera Project Network
- Cybersecurity Incident Response and Communication:Â Packt
- Database Essentials and Vulnerabilities:Â IBM
- Managing Cybersecurity Incidents and Disasters:Â Kennesaw State University
- Next-Generation Firewalls and Intrusion Prevention:Â LearnQuest
- Cybersecurity Foundations: Threats Networks, and IoT Protection:Â Johns Hopkins University
- Getting Started with Security Command Center Enterprise:Â Google Cloud