Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: NewStatus: Preview
Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Threat Detection, Zero Trust Network Access, Cyber Threat Hunting, MITRE ATT&CK Framework, Cyber Threat Intelligence, Intrusion Detection and Prevention, IT Security Architecture, Threat Management, Cybersecurity, Security Controls, Continuous Monitoring, Anomaly Detection, System Monitoring, Identity and Access Management, Virtual Machines
- Status: Preview
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: DevSecOps, Secure Coding, DevOps, Hardening, Cloud-Native Computing, Software Architecture, Security Engineering, Azure DevOps, Software Design, Microsoft Azure, Kubernetes, Web Applications, Cloud Platforms, Cybersecurity, Infrastructure as Code (IaC), Containerization, API Design, Software Engineering, Role-Based Access Control (RBAC), Git (Version Control System)
- Status: New
Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Threat Management, Incident Response, Cybersecurity, Google Gemini, Computer Security Incident Management, Vulnerability Management, Continuous Monitoring, Infrastructure Security, Generative AI Agents
- Status: Free Trial
Skills you'll gain: Pre-Clinical Development, Drug Interaction, Clinical Trials, Pharmacology, Drug Development, Pharmaceuticals, Patient Safety, Clinical Research, Competitive Intelligence, Safety Standards, Laboratory Testing, Biochemical Assays, Medication Administration, Pharmacotherapy, Pharmaceutical Terminology, Safety Assurance, Biotechnology, Biochemistry, Laboratory Research, Chemistry
- Status: New
Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Cyber Threat Hunting, Threat Management, Incident Response, Cybersecurity, Google Gemini, Intrusion Detection and Prevention, Continuous Monitoring, Vulnerability Management, Computer Security Incident Management, Infrastructure Security, Risk Management Framework, Cloud Security, AI Product Strategy, Data Integration, Interactive Data Visualization
- Status: Free Trial
University at Buffalo
Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Incident Response, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Cyber Security Assessment, Threat Detection, Information Assurance, Network Security, Risk Management Framework, Cloud Security, Authentications
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Cryptography, Encryption, Network Security, Public Key Infrastructure, Data Security, Key Management, Blockchain, Cybersecurity, Data Encryption Standard, Security Engineering, Virtual Private Networks (VPN), Intellectual Property, Data Integrity, Authentications, Security Management, Hardware Architecture
- Status: Free Trial
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Threat Detection, Threat Management, Amazon Web Services, Incident Response, Continuous Monitoring, Cloud Security, Identity and Access Management, Amazon Elastic Compute Cloud, Network Security, Event Monitoring
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Responsible AI, Cyber Threat Intelligence, Cyber Attacks, Cybersecurity, Cyber Security Assessment, Security Controls, Security Engineering, Threat Modeling, DevSecOps, Artificial Intelligence, Cyber Governance, Data Security, Artificial Intelligence and Machine Learning (AI/ML), Encryption, Risk Management, Machine Learning, Application Programming Interface (API), Regulation and Legal Compliance, Applied Machine Learning, Governance
Skills you'll gain: Secure Coding, Application Security, Open Web Application Security Project (OWASP), Security Engineering, Cybersecurity, Security Requirements Analysis, Security Testing, Vulnerability Assessments, Code Review, Software Design, Encryption, Vulnerability Management, Data Security, Cryptography, Continuous Monitoring, Authentications, Development Testing, System Monitoring, Authorization (Computing)
- Status: Preview
Coursera Instructor Network
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Data Security, Personally Identifiable Information, Malware Protection, Threat Management, Mitigation, Incident Management, Identity and Access Management
In summary, here are 10 of our most popular cyber threat hunting courses
- Mastering Endpoint Security & Threat Defense : Starweaver
- Cyber Security Technologies: Illinois Tech
- Cyber Security: DevSecOps: Macquarie University
- Google Threat Intelligence - Português Brasileiro: Google Cloud
- Drug Hunting: The Science of Making New Medicines: Novartis
- Google Threat Intelligence - Bahasa Indonesia: Google Cloud
- Cyber Security in Manufacturing : University at Buffalo
- Cyber Security: Applied Cryptography: Macquarie University
- AWS: Threat Detection, Logging and Monitoring: Whizlabs
- Cyber Security: Security of AI: Macquarie University