Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: NewStatus: Free Trial
Skills you'll gain: Linux Administration, Bash (Scripting Language), Network Monitoring, Cyber Security Assessment, Exploit development, Intrusion Detection and Prevention, System Configuration, Virtual Machines
- Status: Preview
Starweaver
Skills you'll gain: Threat Modeling, Cyber Threat Intelligence, Vulnerability Management, Cybersecurity, Threat Detection, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Cyber Attacks, Cyber Operations, Patch Management, Continuous Monitoring, Configuration Management
- Status: Free Trial
Microsoft
Skills you'll gain: Role-Based Access Control (RBAC), Azure Active Directory, Microsoft Azure, Cyber Governance, System Monitoring, Identity and Access Management, Cloud Security, Enterprise Security, Data Security, Authorization (Computing), Multi-Factor Authentication, Security Management, User Accounts, Authentications
- Status: New
Skills you'll gain: Cybersecurity, Cyber Attacks, Endpoint Security, Infrastructure Security, Network Routing, Threat Detection, Computer Security, Firewall, Computer Networking, Wireless Networks, Information Technology Infrastructure Library, Vulnerability Assessments
- Status: Free Trial
Infosec
Skills you'll gain: Risk Management Framework, Federal Information Security Management Act, NIST 800-53, Systems Development Life Cycle, Cyber Risk, Security Management, Continuous Monitoring, Cyber Security Policies, Security Controls, Authorization (Computing), Information Privacy, Information Systems
- Status: Free Trial
Google
Skills you'll gain: Threat Modeling, Security Controls, Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Vulnerability Management, Cybersecurity, Hardening, Network Security, Stakeholder Communications, Vulnerability Assessments, Relational Databases, Security Information and Event Management (SIEM), TCP/IP, Data Security, Cloud Security, Network Architecture, Linux, Debugging, Information Systems Security Assessment Framework (ISSAF)
- Status: Preview
United Cities and Local Governments of Africa
Skills you'll gain: Climate Change Adaptation, Climate Change Programs, Climate Change Mitigation, Environmental Policy, Environmental Issue, Social Determinants Of Health, Community Development, Environmental Resource Management, Sustainable Development, Decision Support Systems, Governance, Vulnerability
- Status: Preview
Coursera Instructor Network
Skills you'll gain: General Data Protection Regulation (GDPR), Personally Identifiable Information, Information Privacy, Data Governance, Data Security, Cybersecurity, Data Management, Data Ethics, Cyber Governance, Security Controls, Cyber Risk, Data Access, Encryption, Risk Management Framework
- Status: Free Trial
Skills you'll gain: Linux Commands, Metasploit, Open Web Application Security Project (OWASP), Linux, Penetration Testing, Vulnerability Scanning, Command-Line Interface, Exploitation techniques, Scripting, Vulnerability Assessments, Scripting Languages, General Networking, Python Programming, Web Applications, Cybersecurity, Firewall, Network Security, Cyber Operations, Data Ethics, Wireless Networks
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Crisis Management, Systems Thinking, Leadership, Strategic Communication, Threat Management, Climate Change Adaptation, Resilience, Change Management, Threat Detection, Infrastructure Security, Business Continuity, Disaster Recovery, Organizational Change, Engineering Management, Emergency Response, Contingency Planning, Business Ethics, Communication, Risk Management, Sustainable Development
- Status: Free Trial
Vanderbilt University
Skills you'll gain: Responsible AI, Generative AI, Data Ethics, Business Ethics, AI Personalization, Information Privacy, Threat Modeling, Personally Identifiable Information, Threat Detection, Security Controls, Cybersecurity, Law, Regulation, and Compliance, Prompt Engineering, Public Affairs, Artificial Intelligence
- Status: Free Trial
University of California, Irvine
Skills you'll gain: Data Security, System Design and Implementation, Data Ethics, Cybersecurity, Safety and Security, Information Technology, Information Privacy, Computer Literacy, Software Development Tools, Data Sharing, Technology Strategies
In summary, here are 10 of our most popular cyber threat hunting courses
- Ethical Hacking with Kali Linux: IBM
- Deception As a Defense: Starweaver
- Identity Protection and Governance : Microsoft
- Palo Alto Networks Cybersecurity Fundamentals: Packt
- NIST DoD RMF: Infosec
- Google サイバーセキュリティ: Google
- Planning for Climate Change in African Cities: United Cities and Local Governments of Africa
- Introduction to Data Protection and Privacy: Coursera Instructor Network
- The Complete Ethical Hacking Bootcamp: Beginner To Advanced: Packt
- Resilience Engineering and Leadership in Crisis: University of Colorado Boulder