Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cybersecurity, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Encryption, Technical Writing, Test Tools, Human Factors (Security)
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, Threat Detection, TCP/IP, Network Analysis, Network Protocols, Cybersecurity, Application Security, Vulnerability Scanning, Wireless Networks, Splunk, Information Privacy
- Status: Preview
Skills you'll gain: Multi-Cloud, Cloud Computing Architecture, Cloud Computing, Cloud Services, Terraform, Kubernetes, Cloud Infrastructure, Application Deployment, Cloud Platforms, Cloud-Native Computing, Containerization, Hybrid Cloud Computing, Microsoft Azure, Infrastructure as Code (IaC), Amazon Web Services, Threat Modeling
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Large Language Modeling, Email Security, Exploitation techniques, Border Gateway Protocol, Malware Protection, Mobile Security, Cybersecurity, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, TCP/IP, Threat Detection, Network Analysis, Internet Of Things, Network Protocols, Responsible AI, Network Routing, Infrastructure Security, Application Security, Information Systems Security
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Crisis Management, Threat Management, Threat Detection, Infrastructure Security, Resilience, Disaster Recovery, Emergency Response, Business Ethics, Risk Management, Organizational Change, Systems Thinking, Hazard Analysis, Safety and Security, Risk Analysis, Industrial and Organizational Psychology, Complex Problem Solving, Ethical Standards And Conduct, Decision Making, Leadership, Case Studies
- Status: Free Trial
University of Colorado System
Skills you'll gain: Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Information Systems Security, Cybersecurity, Encryption, Proxy Servers, Information Privacy, Servers, Web Servers, Cloud Hosting
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols, Authentications
- Status: Free Trial
Infosec
Skills you'll gain: Network Analysis, Network Security, Intrusion Detection and Prevention, Cybersecurity, Threat Detection, Network Monitoring, Anomaly Detection, Network Protocols
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cost Benefit Analysis, Risk Management Framework, Risk Management, Risk Analysis, Cyber Risk, ISO/IEC 27001, Enterprise Risk Management (ERM), NIST 800-53, Business Risk Management, Risk Mitigation, Governance Risk Management and Compliance, Cybersecurity, Security Controls
- Status: Free Trial
Fortinet, Inc.
Skills you'll gain: Firewall, Network Security, Virtual Private Networks (VPN), Network Administration, Intrusion Detection and Prevention, Network Infrastructure, Enterprise Security, Network Architecture, Security Controls, System Configuration, Performance Tuning, Cybersecurity, Malware Protection, Threat Detection
- Status: Free Trial
LearnQuest
Skills you'll gain: Continuous Monitoring, Cloud Security, Disaster Recovery, Network Security, Security Strategy, Security Controls, Cloud Computing, Hybrid Cloud Computing, Infrastructure Security, Cybersecurity, Vulnerability Assessments, Threat Detection, Cloud Management, Encryption, Security Information and Event Management (SIEM), Identity and Access Management, Incident Response
Packt
Skills you'll gain: Identity and Access Management, Application Security, Secure Coding, Security Testing, Information Systems Security, Cyber Security Assessment, Security Engineering, Security Controls, Risk Management Framework, Cybersecurity, Authentications, Threat Modeling, Network Security, Risk Management, Infrastructure Security, Data Security, Continuous Monitoring, Software Development Life Cycle, Authorization (Computing), Cryptography
In summary, here are 10 of our most popular cyber threat hunting courses
- Introduction to Penetration Testing and Ethical Hacking:Â Johns Hopkins University
- Advanced Network Security and Analysis:Â Johns Hopkins University
- Foundation to Multi-Cloud:Â EDUCBA
- Information Assurance Analysis:Â Johns Hopkins University
- Resilience & Leadership: Concepts, Definitions, & Frameworks:Â University of Colorado Boulder
- Security and Privacy in TOR Network:Â University of Colorado System
- Advanced Cybersecurity Techniques:Â Johns Hopkins University
- Defensive Python:Â Infosec
- Dominant Risk Management Standards and Frameworks:Â Kennesaw State University
- Enterprise Firewall Administrator:Â Fortinet, Inc.