Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Preview
Universiteit Leiden
Skills you'll gain: Risk Management Framework, Safety and Security, Threat Management, Case Studies, Public Safety and National Security, Cybersecurity, Incident Management, International Relations, Policy Analysis, Systems Thinking, Governance
- Status: NewStatus: Free Trial
Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Management, Vulnerability Assessments, Cybersecurity, Network Security, Network Monitoring, Bash (Scripting Language), Network Troubleshooting, Anomaly Detection, Cyber Attacks, Computer Security, Network Analysis
- Status: Free Trial
Infosec
Skills you'll gain: Cyber Threat Hunting, Threat Detection, Exploit development, System Monitoring, Cybersecurity, Cyber Operations, Continuous Monitoring, Network Security, Network Monitoring, Python Programming, Scripting, Scripting Languages
- Status: Free Trial
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Security Controls, Key Management, Threat Modeling, Authorization (Computing), Encryption, Data Integrity, Authentications, Vulnerability Assessments
- Status: NewStatus: Free Trial
Skills you'll gain: Application Security, Cloud Applications, Cloud Security, Identity and Access Management, Secure Coding, Security Awareness, Threat Modeling, Security Testing, Data Security, Software Development, Verification And Validation, Software Quality Assurance, Threat Management, Single Sign-On (SSO), Authentications, Multi-Factor Authentication
- Status: NewStatus: Free Trial
LearnKartS
Skills you'll gain: Incident Response, Vulnerability Management, Computer Security Incident Management, Cyber Operations, Hardening, Cybersecurity, Security Controls, Vulnerability Assessments, Threat Detection, Identity and Access Management, Intrusion Detection and Prevention, IT Security Architecture, Information Systems Security, Vulnerability Scanning, Threat Management, Application Security, Mobile Security, Network Security, Authorization (Computing), Continuous Monitoring
- Status: NewStatus: Free Trial
Skills you'll gain: Vulnerability Scanning, Microsoft Azure, Vulnerability Assessments, Cloud Security, Continuous Monitoring, Key Management, Security Controls, Security Information and Event Management (SIEM), Incident Response, Security Management, Hybrid Cloud Computing, Role-Based Access Control (RBAC), Multi-Cloud, Incident Management, Threat Detection, Automation
- Status: NewStatus: Free Trial
Skills you'll gain: Microsoft Azure, User Provisioning, Cloud Security, Azure Active Directory, Data Governance, DevSecOps, Data Management, Security Information and Event Management (SIEM), Identity and Access Management, Microsoft 365, Endpoint Security, Data Security, Zero Trust Network Access, Role-Based Access Control (RBAC), Multi-Factor Authentication, Authorization (Computing), Hybrid Cloud Computing, Microsoft Copilot, Encryption, Authentications
- Status: Free Trial
Palo Alto Networks
Skills you'll gain: Network Security, Cloud Security, Cybersecurity, Cloud Platforms, Cloud Services, Threat Modeling, Cloud Infrastructure, Security Management, Firewall, Encryption, Network Infrastructure, Software As A Service, Security Strategy, Cloud Applications, Payment Card Industry (PCI) Data Security Standards, Threat Detection, Public Cloud, Public Key Infrastructure, Incident Response, Security Controls
- Status: NewStatus: Free
University of Cape Town
Skills you'll gain: Environmental Issue, Climate Change Mitigation, Natural Resource Management, Environmental Science, Biology, Climate Change Adaptation, Life Sciences, Anthropology, Ancient History
- Status: NewStatus: Preview
Jordan University of Science and Technology
Skills you'll gain: Immunology, Public Health and Disease Prevention, Laboratory Testing, Diagnostic Tests, Public Health, Pathology, Infectious Diseases, Physiology, General Medicine, Internal Medicine, Hematology, Microbiology, Medical Terminology, Cell Biology, Oncology, Molecular Biology
- Status: NewStatus: Free Trial
Skills you'll gain: Incident Response, Computer Security Incident Management, Vulnerability Management, Security Information and Event Management (SIEM), Cyber Operations, Event Monitoring, Cyber Threat Hunting, Intrusion Detection and Prevention, Cyber Threat Intelligence, Enterprise Security, Threat Detection, Data Loss Prevention, Security Controls, Network Security, Network Monitoring
In summary, here are 10 of our most popular cyber threat hunting courses
- Security & Safety Challenges in a Globalized World:Â Universiteit Leiden
- IBM Ethical Hacking with Open Source Tools:Â IBM
- Python for Active Defense:Â Infosec
- Design and Analyze Secure Networked Systems:Â University of Colorado System
- Certified Cloud Security Professional (CCSP): Unit 4:Â Pearson
- Cybersecurity Operations and Controls:Â LearnKartS
- Configuring and Managing Security Operations in Azure:Â Packt
- Exam Prep SC-100: Microsoft Cybersecurity Architect Expert:Â Whizlabs
- Palo Alto Networks Cybersecurity:Â Palo Alto Networks
- Life on Earth: Diversification and Extinctions:Â University of Cape Town