Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Email Security, Personally Identifiable Information, Firewall, Threat Detection, Network Security, Cybersecurity, Security Awareness, Cloud Storage, Information Privacy, Cloud Computing, General Networking, Encryption
- Status: Free Trial
Imperial College London
Skills you'll gain: Infectious Diseases, Microbiology, Molecular, Cellular, and Microbiology, Public Health and Disease Prevention, Environment, Biology, Research, Oncology
- Status: Free Trial
University at Buffalo
Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Continuous Monitoring, Incident Response, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Cyber Security Strategy, Information Systems Security Assessment Framework (ISSAF), Cyber Security Assessment, Network Security, Risk Management Framework, Cloud Security, Authentications
- Status: Free Trial
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Threat Modeling, Cloud Security, Load Balancing, Security Engineering, User Accounts, Authorization (Computing), Identity and Access Management, Network Security, Threat Detection, Firewall, Cybersecurity, Geographic Information Systems
EIT Digital
Skills you'll gain: Email Security, Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Identity and Access Management, Threat Management, Threat Detection, Data Security, User Accounts, Entrepreneurship
- Status: Free Trial
University of Colorado System
Skills you'll gain: Contingency Planning, Disaster Recovery, Business Continuity Planning, Security Management, Cyber Security Policies, Enterprise Security, Compliance Auditing, Systems Administration, Governance, Security Controls, Patch Management, Auditing, Continuous Monitoring, Information Systems Security, Unix, Procedure Development, Incident Response, Change Management
Infosec
Skills you'll gain: Blockchain, Network Security, Application Security, Threat Modeling, Cybersecurity, Cryptography, Secure Coding, Encryption, Vulnerability Assessments, Scalability, Distributed Computing, Data Integrity, Algorithms
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Threat Detection, Endpoint Detection and Response, Computer Security Incident Management, Cyber Threat Intelligence, Distributed Denial-Of-Service (DDoS) Attacks, Anomaly Detection, Cybersecurity, Cyber Security Strategy, Threat Management, Continuous Monitoring, System Monitoring, Network Analysis, Virtual Machines, Network Security, Event Monitoring, Network Monitoring, Applied Machine Learning, NIST 800-53
- Status: Free Trial
Skills you'll gain: Cloud Security, Data Management, Cloud Computing Architecture, Records Management, Security Management, Cloud Computing, Cyber Security Policies, Microsoft Azure, Data Security, Disaster Recovery, Data Governance, Information Assurance, Security Controls, Information Privacy, General Data Protection Regulation (GDPR)
- Status: Free Trial
University of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Open Web Application Security Project (OWASP), Encryption, Application Security, Penetration Testing, Vulnerability Assessments, Data Security, Security Controls, Authentications, Vulnerability Management, Web Applications, Javascript
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Risk Analysis, Risk Management, Threat Management, Cyber Risk, Security Management, IT Management, Governance, Cybersecurity, Cyber Security Strategy, Asset Management, Cyber Security Assessment, Project Documentation, Presentations
Skills you'll gain: Incident Response, Disaster Recovery, Computer Security Incident Management, Business Continuity, Cybersecurity, Investigation, Event Monitoring, Threat Detection, Risk Management, Communication Strategies
In summary, here are 10 of our most popular cyber threat hunting courses
- Cybersecurity: Protecting your Information at Home:Â Kennesaw State University
- Immunology: Innate Immune System:Â Imperial College London
- Cyber Security in Manufacturing :Â University at Buffalo
- Advanced System Security Design:Â University of Colorado System
- Cybersecurity Awareness and Innovation:Â EIT Digital
- Planning, Auditing and Maintaining Enterprise Systems:Â University of Colorado System
- Blockchain Security:Â Infosec
- Intrusion Detection:Â Johns Hopkins University
- Cybersecurity Management and Compliance:Â Microsoft
- Identifying Security Vulnerabilities:Â University of California, Davis