Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: New
Skills you'll gain: MITRE ATT&CK Framework, Generative AI, Cyber Threat Intelligence, Cyber Security Strategy, Cybersecurity, Threat Modeling, Computer Security, Cyber Attacks, Threat Detection, Artificial Intelligence, Anomaly Detection, Data Ethics, Information Privacy, Innovation
- Status: NewStatus: Free Trial
Skills you'll gain: AWS Identity and Access Management (IAM), Data Governance, Identity and Access Management, Data Ethics, Amazon Web Services, Data Management, Generative AI, Cloud Security, Cyber Governance, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, MLOps (Machine Learning Operations), Data Security, Information Privacy
- Status: New
Macquarie University
Skills you'll gain: DevSecOps, Application Security, Secure Coding, DevOps, IT Security Architecture, Cloud-Native Computing, Azure DevOps, Software Architecture, MLOps (Machine Learning Operations), Security Engineering, Hardening, Continuous Delivery, Security Testing, Threat Modeling, Cloud Security, CI/CD, Kubernetes, Microsoft Azure, Web Applications, Infrastructure as Code (IaC)
Stanford University
Skills you'll gain: Physics, Timelines, Verification And Validation, Scientific Methods, Research, Mechanics, Mathematical Modeling, Systems Of Measurement
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Cybersecurity, Cyber Attacks, Application Security, Network Security, Security Awareness, Malware Protection, Vulnerability Assessments, Secure Coding, Web Applications, Javascript
- Status: New
Macquarie University
Skills you'll gain: Authentications, Identity and Access Management, Single Sign-On (SSO), Security Assertion Markup Language (SAML), Multi-Factor Authentication, User Provisioning, OAuth, Threat Modeling, Authorization (Computing), IT Security Architecture, Zero Trust Network Access, Systems Architecture, Role-Based Access Control (RBAC), Vulnerability Assessments, Cryptography
- Status: New
Macquarie University
Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Security, Cybersecurity, Threat Modeling, General Data Protection Regulation (GDPR), Data Integrity, Data Governance, Data Ethics, Vulnerability Assessments, Encryption, Data Sharing, Data Encryption Standard, Risk Modeling, Statistical Methods
- Status: New
Macquarie University
Skills you'll gain: Cryptography, Encryption, Network Security, Advanced Encryption Standard (AES), Cybersecurity, Data Security, Public Key Infrastructure, Data Encryption Standard, Blockchain, Information Privacy, Virtual Private Networks (VPN), Wireless Networks, Authentications, Emerging Technologies
- Status: New
Macquarie University
Skills you'll gain: Mobile Security, Threat Detection, Android (Operating System), Application Security, Apple iOS, Data Security, File Systems, Authentications, Incident Response, Vulnerability Assessments, Data Integrity, Debugging, Encryption
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Email Security, Threat Detection, Threat Modeling, Jupyter, Authentications, Intrusion Detection and Prevention, Machine Learning Algorithms, Artificial Intelligence, Multi-Factor Authentication, Artificial Intelligence and Machine Learning (AI/ML), Computer Vision, Natural Language Processing, Machine Learning, Deep Learning
- Status: New
Macquarie University
Skills you'll gain: Mobile Security, File Systems, Data Security, Cybersecurity, Data Ethics, Data Integrity, Data Storage Technologies, Data Validation, File Management, Encryption, Verification And Validation, Internet Of Things, Mac OS, Microsoft Windows, Network Monitoring
University of California, Santa Cruz
Skills you'll gain: Systems Design, Model Based Systems Engineering, Mathematical Modeling, Simulations, Control Systems, Embedded Systems, Systems Analysis, Computational Logic, Digital Communications, Differential Equations, Estimation
In summary, here are 10 of our most popular cyber threat hunting courses
- Generative AI and its Impact on Cybersecurity:Â Packt
- Responsible AI with AWS Security and Governance:Â LearnKartS
- DevSecOps:Â Macquarie University
- Understanding Einstein: The Special Theory of Relativity:Â Stanford University
- Web Security, Social Engineering & External Attacks:Â Packt
- Identity Access Management (IAM) and Secure Authentication:Â Macquarie University
- Data Security & Information Privacy:Â Macquarie University
- Applied Cryptography & Information Security:Â Macquarie University
- Mobile Security:Â Macquarie University
- Introduction to AI for Cybersecurity:Â Johns Hopkins University