Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: NewStatus: Free Trial
Skills you'll gain: Cloud Standards
- Status: Free Trial
Google
Skills you'll gain: Vulnerability Management, Threat Modeling, Incident Response, Intrusion Detection and Prevention, Business Risk Management, Network Security, Vulnerability Assessments, Operating Systems, Threat Detection, Risk Management, Security Information and Event Management (SIEM), Computer Security Incident Management, Event Monitoring, Network Architecture, Security Controls, Cyber Risk, Linux, Cybersecurity, Debugging, SQL
- Status: NewStatus: Preview
Birla Institute of Technology & Science, Pilani
Skills you'll gain: Operating Systems, OS Process Management, System Programming, File Systems, Unix Commands, Command-Line Interface, System Monitoring, System Design and Implementation, Performance Tuning, Package and Software Management, File Management, Algorithms, Cloud Platforms, Security Controls, User Accounts, Debugging
- Status: NewStatus: Free Trial
Skills you'll gain: MITRE ATT&CK Framework, Kubernetes, Incident Response, Threat Detection, Intrusion Detection and Prevention, DevSecOps, Continuous Monitoring, Security Engineering, Security Controls, Infrastructure Security, Event Monitoring, System Monitoring, Containerization, Anomaly Detection, Docker (Software)
- Status: Free Trial
EIT Digital
Skills you'll gain: Embedded Systems, Embedded Software, Internet Of Things, Operating Systems, Real-Time Operating Systems, Wireless Networks, System Programming, Hardware Architecture, Simulations, C (Programming Language), Network Protocols, Application Programming Interface (API)
- Status: Free Trial
Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Network Security, Cryptography, Exploit development, Information Systems Security, Threat Detection, Intrusion Detection and Prevention, Cloud Security
- Status: NewStatus: Free Trial
Fractal Analytics
Skills you'll gain: Data Governance, Metadata Management, Data Ethics, Data Management, Data Architecture, Interoperability, Data Strategy, Data Store, Responsible AI, Generative AI Agents, Threat Modeling, Data Storage, Data Pipelines, Data Processing, Data Security, Zero Trust Network Access, Large Language Modeling, Agentic systems, Machine Learning
- Status: Preview
University of London
Skills you'll gain: Law, Regulation, and Compliance, Business Ethics, Social Justice, Environmental Social And Corporate Governance (ESG), Legal Proceedings, International Relations, Legal Research, Political Sciences, Governance, Corporate Sustainability
- Status: NewStatus: Free Trial
Skills you'll gain: User Provisioning, Azure Active Directory, Cloud Security, Security Information and Event Management (SIEM), Identity and Access Management, Role-Based Access Control (RBAC), Security Controls, Multi-Factor Authentication, Authorization (Computing), Authentications, Continuous Monitoring, Threat Detection, Incident Response, General Data Protection Regulation (GDPR), Automation
- Status: NewStatus: Free Trial
Skills you'll gain: Security Management, Security Strategy, Configuration Management, Security Controls, Information Systems Security, Computer Security Awareness Training, Enterprise Security, Change Control, Safety and Security, Cyber Security Policies, Data Ethics
- Status: NewStatus: Free Trial
Skills you'll gain: Data Integrity, Data Management, Personally Identifiable Information, Cloud Storage, Data Encryption Standard, Security Controls, Authorization (Computing)
- Status: Preview
Skills you'll gain: Verbal Communication Skills, Oral Expression, Presentations, Interviewing Skills, Public Speaking, English Language, Cultural Diversity, Non-Verbal Communication, Intercultural Competence, Vocabulary, Business Communication, Grammar
In summary, here are 10 of our most popular cyber threat hunting courses
- Certified Cloud Security Professional (CCSP): Unit 6:Â Pearson
- Ciberseguridad de Google:Â Google
- Operating Systems:Â Birla Institute of Technology & Science, Pilani
- Certified Kubernetes Security Specialist (CKS): Unit 7:Â Pearson
- Embedded Hardware and Operating Systems:Â EIT Digital
- Certified Ethical Hacker (CEH) v.12:Â Packt
- Advanced Data Techniques for Enterprise AI Systems:Â Fractal Analytics
- Citizenship and the Rule of Law:Â University of London
- Design Security Ops, Identity, and Compliance capabilities:Â Whizlabs
- (SSCP) Systems Security Certified Practitioner: Unit 1:Â Pearson