Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
University of Michigan
Skills you'll gain: Data Quality, Data Cleansing, Quantitative Research, Data Validation, Data Integrity, Data Collection, Quality Assurance, Data Processing, Data Strategy, Data Management, Data Analysis, Data Access, Statistical Analysis, Sampling (Statistics), Threat Detection
- Status: NewStatus: Free Trial
LearnKartS
Skills you'll gain: Data Sharing, Authentications
- Status: Free Trial
Skills you'll gain: Problem Solving
- Status: Free Trial
Google
Skills you'll gain: Threat Modeling, Security Controls, Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Vulnerability Management, Cybersecurity, Hardening, Network Security, Stakeholder Communications, Vulnerability Assessments, Relational Databases, Security Information and Event Management (SIEM), TCP/IP, Data Security, Cloud Security, Network Architecture, Linux, Debugging, Information Systems Security Assessment Framework (ISSAF)
- Status: Free Trial
Google Cloud
Skills you'll gain: Cloud Infrastructure, Prompt Engineering, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Identity and Access Management, Cloud Development, Infrastructure As A Service (IaaS), Kubernetes, Cloud Security, Cloud Applications, Generative AI, Data Loss Prevention, Cloud Services, Public Cloud, Cloud Computing Architecture, Threat Management, Encryption, OAuth, Security Controls, Cloud Computing
- Status: Free Trial
University of London
Skills you'll gain: Network Security, OSI Models, TCP/IP, Threat Modeling, Network Protocols, Computer Networking, Cybersecurity, Application Security, Network Architecture, Cryptographic Protocols, Vulnerability Assessments, Network Infrastructure, Network Routing
- Status: Free Trial
University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authorization (Computing), Cyber Risk, Authentications, Cloud Computing, Threat Management, Security Controls, Application Security, Secure Coding, System Monitoring, Cryptography, Security Testing, Data Security, Identity and Access Management
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Crisis Management, Systems Thinking, Leadership, Strategic Communication, Threat Management, Climate Change Adaptation, Resilience, Change Management, Threat Detection, Infrastructure Security, Business Continuity, Disaster Recovery, Organizational Change, Engineering Management, Emergency Response, Contingency Planning, Business Ethics, Communication, Risk Management, Sustainable Development
- Status: Free Trial
Vanderbilt University
Skills you'll gain: Responsible AI, Generative AI, Data Ethics, Business Ethics, AI Personalization, Information Privacy, Threat Modeling, Personally Identifiable Information, Threat Detection, Security Controls, Cybersecurity, Law, Regulation, and Compliance, Prompt Engineering, Public Affairs, Artificial Intelligence
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Risk Management, Risk Management Framework, Threat Management, Operational Risk, Enterprise Risk Management (ERM), Business Risk Management, Cyber Risk, Risk Mitigation, Risk Analysis, Governance Risk Management and Compliance, Vulnerability Assessments, Continuous Improvement Process
- Status: Free Trial
Skills you'll gain: Security Controls, NIST 800-53, Authorization (Computing), Risk Management Framework, Change Control, Cyber Risk, Security Management, Vulnerability Assessments, Vulnerability Management, Configuration Management, Threat Management, System Monitoring, Security Requirements Analysis, System Implementation, Security Strategy, Cyber Security Assessment, Risk Mitigation, Document Management, Systems Development Life Cycle
- Status: Free Trial
Infosec
Skills you'll gain: Security Controls, Security Requirements Analysis, Continuous Monitoring, Cyber Security Policies, Information Assurance, Information Systems Security, Personally Identifiable Information, Data Security, Document Management
In summary, here are 10 of our most popular cyber threat hunting courses
- Total Data Quality: University of Michigan
- Information Security Awareness: LearnKartS
- CEH (v12) Practice Projects and Exam Simulators: LearnKartS
- Google サイバーセキュリティ: Google
- Security in Google Cloud en Français: Google Cloud
- Introduction to Network Security: University of London
- Cloud Top Ten Risks: University of Minnesota
- Resilience Engineering and Leadership in Crisis: University of Colorado Boulder
- Generative AI Cybersecurity & Privacy for Leaders: A Primer: Vanderbilt University
- A General Approach to Risk Management: Kennesaw State University