Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
Skills you'll gain: Computer Security Incident Management, Incident Response, Incident Management, Vulnerability Management, Risk Management Framework, Security Management, Threat Management, Risk Management, Disaster Recovery, Vulnerability Assessments, Information Systems Security, Information Assurance, Cyber Security Policies, Security Controls
- Status: Preview
Technical University of Munich (TUM)
Skills you'll gain: Cybersecurity, Safety and Security, Infrastructure Security, Medical Science and Research, Threat Management, Physical Science, Environmental Monitoring, Continuous Monitoring, Spatial Analysis, Risk Analysis, Physics
- Status: Free Trial
University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authentications, Key Management, Data Security, Cloud Applications, Cloud Services, Application Security, Authorization (Computing), Cyber Risk, Secure Coding, Cloud Storage, Personally Identifiable Information, DevSecOps, General Data Protection Regulation (GDPR), Network Security, Information Privacy, Cloud Computing, Cybersecurity, Cryptography
- Status: Free
Coursera Project Network
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Cyber Security Assessment, Network Security, Network Monitoring, Operating Systems
- Status: Free Trial
Duke University
Skills you'll gain: Blockchain, Cyber Risk, FinTech, Operational Risk, Scalability, Regulatory Compliance, Legal Risk, Exploit development, Financial Regulations, Risk Analysis, Vulnerability Assessments, Secure Coding, Governance, Environmental Social And Corporate Governance (ESG)
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Threat Modeling, Cybersecurity, Cloud Security, Mobile Security, Vulnerability Assessments, Network Security, Application Security, Threat Detection, Security Testing, Cyber Attacks, MITRE ATT&CK Framework, Exploit development, Encryption, Vulnerability Scanning, Web Applications, Infrastructure Security, Wireless Networks, Internet Of Things
- Status: Free Trial
University of Colorado System
Skills you'll gain: Risk Management Framework, Infrastructure Security, Cyber Security Policies, Security Management, NIST 800-53, Cybersecurity, Cyber Security Strategy, Security Strategy, Cyber Risk, System Monitoring
Coursera Project Network
Skills you'll gain: Job Analysis, Compensation Analysis, Company, Product, and Service Knowledge, Recruitment, Business Research, Research
- Status: Free Trial
Skills you'll gain: Network Analysis, Network Security, Cyber Operations, Intrusion Detection and Prevention, MITRE ATT&CK Framework, Cybersecurity, Threat Detection, Network Monitoring, Penetration Testing, Anomaly Detection, Scripting, Network Protocols, Authentications, Vulnerability Assessments, Python Programming, Data Access, System Monitoring, Automation
- Status: Preview
Campus BBVA
Skills you'll gain: Incident Response, Security Management, Cybersecurity, Cyber Attacks, Cyber Risk, Security Awareness, Data Security, Email Security, Mobile Security, Business Process, Authentications, Fraud detection, Identity and Access Management, Multi-Factor Authentication, Encryption
- Status: Free Trial
Skills you'll gain: Splunk, Dashboard, Data Transformation, Data Manipulation, Data Analysis, Statistical Analysis, Query Languages, Data Visualization Software, Ad Hoc Reporting, Real Time Data, Continuous Monitoring
- Status: Free Trial
Skills you'll gain: OAuth, Cloud API, Application Programming Interface (API), Restful API, Security Controls, Application Security, Network Security, Data Security, JSON, Identity and Access Management, Threat Management
In summary, here are 10 of our most popular cyber threat hunting courses
- Foundations of Information Security and Incident Handling:Â Packt
- Space Safety:Â Technical University of Munich (TUM)
- Cybersecurity in the Cloud:Â University of Minnesota
- Vulnerability Scanning with Nmap: Network Scanning:Â Coursera Project Network
- Decentralized Finance (DeFi) Opportunities and Risks:Â Duke University
- Ethical Hacking Essentials: Hands-On Edition:Â EC-Council
- Cybersecurity Policy for Water and Electricity Infrastructures:Â University of Colorado System
- Learn to Job Search with Indeed:Â Coursera Project Network
- Advanced Python Scripting for Cybersecurity:Â Infosec
- Cybersecurity for Managers:Â Campus BBVA