Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: New
Knowledge Accelerators
Skills you'll gain: Security Awareness, Computer Security Awareness Training, Cybersecurity, Cyber Attacks, Threat Detection, Email Security, Malware Protection, Human Factors (Security)
Skills you'll gain: Incident Response, Incident Management, Data Centers, DevSecOps, System Monitoring, Threat Detection, Infrastructure Security, Microsoft Servers, Security Management, Payment Card Industry (PCI) Data Security Standards, Information Systems Security, Windows Servers, IT Infrastructure, Security Information and Event Management (SIEM), Disaster Recovery, IT Automation, Virtual Machines, Configuration Management
- Status: Free Trial
Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Containerization
- Status: Free Trial
University of Colorado System
Skills you'll gain: Application Security, Vulnerability Assessments, Software Design, Threat Modeling, Vulnerability Management, Security Engineering, Secure Coding, Software Design Patterns, Software Architecture, Software Visualization, Cryptography, Blockchain, Public Key Cryptography Standards (PKCS)
Erasmus University Rotterdam
Skills you'll gain: Journalism, Media and Communications, Public Affairs, Research, Technical Communication, Scientific Methods, Persuasive Communication, Digital Communications, Threat Detection, Policy Analysis, Public Policies, Policy Development, Content Creation, Social Sciences, Ethical Standards And Conduct
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cybersecurity, Computer Security Awareness Training, Cyber Attacks, Cyber Risk, Personally Identifiable Information, Threat Detection, Information Privacy, Authentications, General Data Protection Regulation (GDPR), Human Factors (Security), NIST 800-53
- Status: Free Trial
University of Michigan
Skills you'll gain: Data Quality, Quantitative Research, Data Validation, Data Integrity, Data Collection, Data Cleansing, Quality Assurance, Data Processing, Data Analysis, Data Access, Statistical Analysis, Sampling (Statistics), Threat Detection, Statistical Methods
- Status: Free
Infosec
Skills you'll gain: Cybersecurity, Cyber Attacks, Incident Response, Security Management, Network Security, Security Information and Event Management (SIEM), Security Controls, Identity and Access Management, Cryptography, Threat Detection, Data Security, Encryption, Personally Identifiable Information, Data Governance, Vulnerability Assessments, General Networking, Authorization (Computing), Authentications
Skills you'll gain: Threat Detection, Threat Management, Cloud Security, Google Cloud Platform, Vulnerability Management, Vulnerability Assessments, Security Information and Event Management (SIEM), Public Cloud
- Status: Free Trial
Infosec
Skills you'll gain: Penetration Testing, Linux Commands, Command-Line Interface, Cyber Security Assessment, Linux, Cybersecurity, Operating Systems, Vulnerability Assessments, Windows PowerShell, Microsoft Windows, Computer Systems, Mac OS
- Status: Free Trial
Infosec
Skills you'll gain: Security Controls, Security Requirements Analysis, Continuous Monitoring, Cyber Security Policies, Information Assurance, Information Systems Security, Personally Identifiable Information, Data Security, Document Management
- Status: Free
Princeton University
Skills you'll gain: Risk Analysis, Network Analysis, Systems Thinking, World History, International Relations, Financial Systems, Public Health, Governance, Epidemiology, Complex Problem Solving, Economics, Supply Chain
In summary, here are 10 of our most popular cyber threat hunting courses
- Cybersecurity Awareness Essentials for Employees:Â Knowledge Accelerators
- Data Center Security Management with Microsoft System Center:Â EDUCBA
- Cloud Security Risks: Identify and Protect Against Threats:Â Google Cloud
- Software Design Threats and Mitigations:Â University of Colorado System
- Science Communication: Communicating Trustworthy Information in the Digital World:Â Erasmus University Rotterdam
- What Is Cybersecurity?:Â Kennesaw State University
- Total Data Quality:Â University of Michigan
- CompTIA Security+ 701:Â Infosec
- Detect and Investigate Threats with Security Command Center:Â Google Cloud
- Operating System Foundations:Â Infosec