Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Exploitation techniques, Border Gateway Protocol, Malware Protection, Cybersecurity, TCP/IP, Internet Of Things, Network Security, Threat Detection, Network Routing, Network Analysis, Cyber Risk, Network Protocols, Docker (Software)
- Status: Free Trial
Skills you'll gain: Threat Modeling, Cyber Operations, Threat Detection, Exploit development, Cybersecurity, Scripting, IT Automation, Command-Line Interface, Python Programming, Encryption, Network Analysis
Skills you'll gain: Threat Detection, Vulnerability Management, Cyber Threat Hunting, Vulnerability Assessments, Cloud Security, Multi-Cloud, Intrusion Detection and Prevention, Threat Management, Google Cloud Platform, Enterprise Security, Risk Management Framework
- Status: Free
Infosec
Skills you'll gain: Cybersecurity, Cyber Attacks, Incident Response, Security Management, Network Security, Security Information and Event Management (SIEM), Security Controls, Identity and Access Management, Cryptography, Threat Detection, Data Security, Computer Security, Encryption, Personally Identifiable Information, Data Governance, Firewall, Vulnerability Assessments, User Accounts, Authorization (Computing), Risk Management
- Status: Free Trial
University of Colorado System
Skills you'll gain: Risk Management Framework, Infrastructure Security, Cyber Security Policies, Security Management, NIST 800-53, Cybersecurity, Cyber Security Strategy, Security Strategy, Cyber Risk, System Monitoring
- Status: Free Trial
Imperial College London
Skills you'll gain: Immunology, Infectious Diseases, Physiology, Microbiology, Molecular, Cellular, and Microbiology, Public Health and Disease Prevention, Environment, Biology, Research
- Status: Free Trial
University of London
Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Vulnerability Assessments, Hardware Architecture, Application Security, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, Authentications, Network Monitoring, TCP/IP, Network Analysis
- Status: Free Trial
Skills you'll gain: Risk Management Framework, Incident Response, Cyber Security Policies, Secure Coding, Cybersecurity, Computer Security Incident Management, Cyber Security Assessment, Threat Modeling, Application Security, ISO/IEC 27001, Cyber Governance, Data Security, Malware Protection, Penetration Testing, Security Controls, Threat Detection
- Status: Free Trial
Skills you'll gain: Open Shortest Path First (OSPF), Virtual Local Area Network (VLAN), OSI Models, Wide Area Networks, Network Troubleshooting, TCP/IP, Wireless Networks, Cloud Computing, Network Routing, Routing Protocols, Network Security, Network Monitoring, Event Monitoring, Threat Detection, Threat Management, Network Performance Management, Network Switches, Network Planning And Design, Network Administration, Network Protocols
- Status: NewStatus: Free Trial
Illinois Tech
Skills you'll gain: Infrastructure As A Service (IaaS), Operating System Administration, Cloud Security, Cloud Infrastructure, Identity and Access Management, AWS Identity and Access Management (IAM), Cloud Management, Cloud Computing, Incident Response, Disaster Recovery, Microsoft Windows, DevOps, Cloud-Native Computing, Operating Systems, Amazon Web Services, System Configuration, Firewall, Cloud Computing Architecture, Linux Administration, Risk Management
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Threat Modeling, Cybersecurity, Cloud Security, Mobile Security, Vulnerability Assessments, Network Security, Application Security, Threat Detection, Security Testing, Cyber Attacks, MITRE ATT&CK Framework, Exploit development, Encryption, Vulnerability Scanning, Web Applications, Infrastructure Security, Wireless Networks, Internet Of Things
- Status: Preview
Board Infinity
Skills you'll gain: Vulnerability Assessments, Cyber Security Assessment, Network Monitoring, Penetration Testing, Virtual Private Networks (VPN), Command-Line Interface, Linux Commands, Network Troubleshooting, Cybersecurity, Linux, Software Installation, Intrusion Detection and Prevention, Network Security, Network Analysis
In summary, here are 10 of our most popular cyber threat hunting courses
- Cybersecurity Foundations: Threats Networks, and IoT Protection:Â Johns Hopkins University
- Python for Command-and-control, Exfiltration and Impact:Â Infosec
- Getting Started with Security Command Center Enterprise:Â Google Cloud
- CompTIA Security+ 701:Â Infosec
- Cybersecurity Policy for Water and Electricity Infrastructures:Â University of Colorado System
- Immunology: Innate Immune System:Â Imperial College London
- Introduction to Computer Security:Â University of London
- Incident Response, Risk Management, and Compliance:Â Packt
- Cisco CCNA 200-301: The Complete Guide to Getting Certified:Â Packt
- Security: A Comprehensive Approach:Â Illinois Tech