• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Online Degrees
  • Careers
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Cyber Threat Hunting
    Skip to search results

    Filter by

    Subject
    Required
     *

    Language
    Required
     *

    The language used throughout the course, in both instruction and assessments.

    Learning Product
    Required
     *

    Build job-relevant skills in under 2 hours with hands-on tutorials.
    Learn from top instructors with graded assignments, videos, and discussion forums.
    Learn a new tool or skill in an interactive, hands-on environment.
    Get in-depth knowledge of a subject by completing a series of courses and projects.
    Earn career credentials from industry leaders that demonstrate your expertise.
    Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

    Level
    Required
     *

    Duration
    Required
     *

    Skills
    Required
     *

    Subtitles
    Required
     *

    Educator
    Required
     *

    Results for "cyber threat hunting"

    • Status: Free Trial
      Free Trial
      U

      University of California, Davis

      Secure Coding Practices

      Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Exploit development, Authentications, Encryption, Penetration Testing, Vulnerability Assessments, Data Security, Application Security, Security Controls, Vulnerability Management, Security Testing, Software Design, C and C++, Verification And Validation, Java, Programming Principles, Cybersecurity

      4.5
      Rating, 4.5 out of 5 stars
      ·
      598 reviews

      Intermediate · Specialization · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      P

      Packt

      Certified Ethical Hacker (CEH) v.12

      Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Network Security, Cryptography, Exploit development, Information Systems Security, Threat Detection, Intrusion Detection and Prevention, Cloud Security

      4.7
      Rating, 4.7 out of 5 stars
      ·
      21 reviews

      Beginner · Specialization · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      K

      Kennesaw State University

      Cybersecurity and Mobility

      Skills you'll gain: Cyber Security Strategy, Cybersecurity, Mobile Security, Cyber Threat Intelligence, Network Security, Internet Of Things, Cyber Governance, Data Security, Wireless Networks, Emerging Technologies, Business Technologies, Enterprise Application Management

      4.5
      Rating, 4.5 out of 5 stars
      ·
      634 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: New
      New
      Status: Preview
      Preview
      S

      SkillUp

      Data Privacy and Protection

      Skills you'll gain: Personally Identifiable Information, Cybersecurity, General Data Protection Regulation (GDPR), Information Privacy, Data Security, Threat Detection, Data Loss Prevention, Incident Response, Data Governance, Law, Regulation, and Compliance, Data Management, Data Storage, Data Integrity, Data Ethics, Regulation and Legal Compliance

      Beginner · Course · 1 - 4 Weeks

    • Status: New
      New
      Status: Free Trial
      Free Trial
      W

      Whizlabs

      Design Security Ops, Identity, and Compliance capabilities

      Skills you'll gain: User Provisioning, Azure Active Directory, Cloud Security, Security Information and Event Management (SIEM), Identity and Access Management, Role-Based Access Control (RBAC), Security Controls, Multi-Factor Authentication, Authorization (Computing), Authentications, Continuous Monitoring, Threat Detection, Incident Response, General Data Protection Regulation (GDPR), Automation

      Intermediate · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      U

      University of California, Davis

      Identifying Security Vulnerabilities

      Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Exploit development, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Security Controls, Authentications, Security Testing, Vulnerability Management, Personally Identifiable Information

      4.7
      Rating, 4.7 out of 5 stars
      ·
      176 reviews

      Intermediate · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      U

      University of Colorado System

      Cybersecurity Policy for Aviation and Internet Infrastructures

      Skills you'll gain: Infrastructure Security, Cyber Risk, Cyber Security Policies, Cyber Security Assessment, Cybersecurity, Cyber Security Strategy, Risk Management Framework, Technology Roadmaps, Network Infrastructure, Transportation Operations, Infrastructure Architecture, Mobile Security

      4.7
      Rating, 4.7 out of 5 stars
      ·
      257 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: Preview
      Preview
      E

      EIT Digital

      Cybersecurity Awareness and Innovation

      Skills you'll gain: Email Security, Cybersecurity, Security Awareness, Cyber Attacks, Identity and Access Management, Threat Detection, Data Security, Secure Coding, Human Factors (Security), Fraud detection, Entrepreneurship

      4.6
      Rating, 4.6 out of 5 stars
      ·
      766 reviews

      Beginner · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      J

      Johns Hopkins University

      Patient Safety

      Skills you'll gain: Patient Safety, Design Thinking, Change Management, Institutional Review Board (IRB), Leadership, Conflict Management, Performance Measurement, Systems Thinking, Solution Design, Health Systems, Data Analysis, Corrective and Preventive Action (CAPA), Risk Analysis, Value-Based Care, Continuous Quality Improvement (CQI), Quality Improvement, Risk Management, Data Analysis Software, Project Planning, Patient-centered Care

      4.8
      Rating, 4.8 out of 5 stars
      ·
      1.8K reviews

      Beginner · Specialization · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      P

      Packt

      CompTIA Security+ SY0-701 Full Training Guide

      Skills you'll gain: Infrastructure as Code (IaC), Endpoint Security, Vulnerability Management, Cryptography, Cybersecurity, Risk Management Framework, Cloud Computing Architecture, Network Security, Incident Response, Cloud Security, Threat Modeling, Encryption, Cyber Security Policies, Identity and Access Management, Secure Coding, Computer Security Incident Management, Cyber Security Assessment, Cyber Threat Intelligence, Vulnerability Assessments, Information Systems Security

      4.3
      Rating, 4.3 out of 5 stars
      ·
      13 reviews

      Intermediate · Specialization · 3 - 6 Months

    • Status: Preview
      Preview
      S

      Starweaver

      Introduction to Automotive Cybersecurity & Vehicle Networks

      Skills you'll gain: Threat Modeling, Cyber Governance, Cybersecurity, Cyber Security Policies, Cryptography, Network Security, Cyber Risk, Cyber Attacks, Cyber Security Strategy, Threat Detection, Vulnerability Assessments, Incident Response

      3.5
      Rating, 3.5 out of 5 stars
      ·
      14 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: Preview
      Preview
      G

      Google

      Office of the CISO Institute: Cybersecurity Essentials

      Skills you'll gain: Cybersecurity, Business Continuity, Threat Detection, Endpoint Security, Disaster Recovery, Cyber Security Policies, Incident Response, Vulnerability Assessments, Network Security, Application Security, Governance Risk Management and Compliance, Cloud Security, Risk Management

      4.5
      Rating, 4.5 out of 5 stars
      ·
      64 reviews

      Beginner · Course · 1 - 3 Months

    1…232425…60

    In summary, here are 10 of our most popular cyber threat hunting courses

    • Secure Coding Practices: University of California, Davis
    • Certified Ethical Hacker (CEH) v.12: Packt
    • Cybersecurity and Mobility: Kennesaw State University
    • Data Privacy and Protection: SkillUp
    • Design Security Ops, Identity, and Compliance capabilities: Whizlabs
    • Identifying Security Vulnerabilities: University of California, Davis
    • Cybersecurity Policy for Aviation and Internet Infrastructures: University of Colorado System
    • Cybersecurity Awareness and Innovation: EIT Digital
    • Patient Safety: Johns Hopkins University
    • CompTIA Security+ SY0-701 Full Training Guide: Packt

    Other topics to explore

    Arts and Humanities
    338 courses
    Business
    1095 courses
    Computer Science
    668 courses
    Data Science
    425 courses
    Information Technology
    145 courses
    Health
    471 courses
    Math and Logic
    70 courses
    Personal Development
    137 courses
    Physical Science and Engineering
    413 courses
    Social Sciences
    401 courses
    Language Learning
    150 courses

    Coursera Footer

    Skills

    • Artificial Intelligence (AI)
    • Cybersecurity
    • Data Analytics
    • Digital Marketing
    • English Speaking
    • Generative AI (GenAI)
    • Generative AI
    • Microsoft Excel
    • Microsoft Power BI
    • Project Management
    • Python

    Certificates & Programs

    • Google Cybersecurity Certificate
    • Google Data Analytics Certificate
    • Google IT Support Certificate
    • Google Project Management Certificate
    • Google UX Design Certificate
    • IBM Data Analyst Certificate
    • IBM Data Science Certificate
    • Machine Learning Certificate
    • Microsoft Power BI Data Analyst Certificate
    • UI / UX Design Certificate

    Industries & Careers

    • Business
    • Computer Science
    • Data Science
    • Education & Teaching
    • Engineering
    • Finance
    • Healthcare
    • Human Resources (HR)
    • Information Technology (IT)
    • Marketing

    Career Resources

    • Career Aptitude Test
    • Examples of Strengths and Weaknesses for Job Interviews
    • High-Income Skills to Learn
    • How Does Cryptocurrency Work?
    • How to Highlight Duplicates in Google Sheets
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Preparing for the PMP Certification
    • Signs You Will Get the Job After an Interview
    • What Is Artificial Intelligence?

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • ECTS Credit Recommendations

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Manage Cookie Preferences
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok