• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Online Degrees
  • Careers
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Cyber Threat Hunting
    Skip to search results

    Filter by

    Subject
    Required
     *

    Language
    Required
     *

    The language used throughout the course, in both instruction and assessments.

    Learning Product
    Required
     *

    Level
    Required
     *

    Duration
    Required
     *

    Skills
    Required
     *

    Subtitles
    Required
     *

    Educator
    Required
     *

    Results for "cyber threat hunting"

    • I

      ISC2

      Incident Response and Recovery

      Skills you'll gain: Incident Response, Disaster Recovery, Computer Security Incident Management, Business Continuity, Cybersecurity, Investigation, Event Monitoring, Threat Detection, Risk Management, Communication Strategies

      4.6
      Rating, 4.6 out of 5 stars
      ·
      38 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: New
      New
      Status: Free Trial
      Free Trial
      P

      Packt

      System Hacking, Malware Threats, and Network Attacks

      Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Cybersecurity, Threat Modeling, Malware Protection, Penetration Testing, Threat Detection, Cyber Attacks, Network Security, Intrusion Detection and Prevention, Information Systems Security, Security Awareness, Network Protocols, Authentications

      Intermediate · Course · 1 - 3 Months

    • I

      Illinois Tech

      Cyber Security Technologies

      Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Encryption, Bash (Scripting Language), Security Strategy

      Build toward a degree

      5
      Rating, 5 out of 5 stars
      ·
      7 reviews

      Intermediate · Course · 1 - 3 Months

    • I

      ISC2

      Security Concepts and Practices

      Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Configuration Management, Data Ethics, Data Integrity, Identity and Access Management

      4.7
      Rating, 4.7 out of 5 stars
      ·
      81 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      A

      Arizona State University

      Digital Intelligence for Everyone

      Skills you'll gain: Cyber Attacks, Data Security, Safety and Security, Cybersecurity, Computer Security Awareness Training, Information Systems Security, Content Creation, Media and Communications, Storytelling, Productivity, Digital Communications, Creativity, Web Content, Interpersonal Communications, Digital Design, Personal Development, Self-Awareness, De-escalation Techniques, Stress Management, Health Technology

      4.6
      Rating, 4.6 out of 5 stars
      ·
      87 reviews

      Beginner · Specialization · 3 - 6 Months

    • Status: Free Trial
      Free Trial
      G

      Google Cloud

      Strategies for Cloud Security Risk Management

      Skills you'll gain: Cloud Security, Risk Management Framework, Data Security, DevSecOps, Personally Identifiable Information, Cloud Management, Security Management, ISO/IEC 27001, Cloud Computing, Information Privacy, NIST 800-53, General Data Protection Regulation (GDPR), Infrastructure as Code (IaC), Security Controls, Cybersecurity, Identity and Access Management, Platform As A Service (PaaS), Threat Detection

      4.5
      Rating, 4.5 out of 5 stars
      ·
      55 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      K

      Kennesaw State University

      Managing Cybersecurity Incidents and Disasters

      Skills you'll gain: Incident Response, Contingency Planning, Disaster Recovery, Computer Security Incident Management, Security Management, Crisis Management, Cybersecurity, Business Continuity, Cyber Attacks, Risk Analysis, Business Risk Management, Data Management

      4.8
      Rating, 4.8 out of 5 stars
      ·
      247 reviews

      Beginner · Course · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      U

      University of Colorado System

      Design and Analyze Secure Networked Systems

      Skills you'll gain: Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Security Controls, Key Management, Threat Modeling, Authorization (Computing), Encryption, Data Integrity, Authentications, Vulnerability Assessments

      3.9
      Rating, 3.9 out of 5 stars
      ·
      228 reviews

      Intermediate · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      G

      Google Cloud

      Detect, Respond, and Recover from Cloud Cybersecurity Attacks

      Skills you'll gain: Intrusion Detection and Prevention, Computer Security Incident Management, Cyber Threat Hunting, Cyber Attacks, Cybersecurity, Cyber Operations, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Security Information and Event Management (SIEM), Threat Detection, Cloud Security, Security Controls, Threat Management, System Monitoring, IT Automation, Record Keeping, Problem Management

      3.9
      Rating, 3.9 out of 5 stars
      ·
      32 reviews

      Beginner · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      U

      University of California, Irvine

      Introduction to Risk Management

      Skills you'll gain: Threat Modeling, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Risk Management Framework, Risk Mitigation, Vulnerability Assessments, Asset Management, Cyber Security Assessment, Security Controls

      4.7
      Rating, 4.7 out of 5 stars
      ·
      136 reviews

      Mixed · Course · 1 - 4 Weeks

    • Status: Free Trial
      Free Trial
      C

      Codio

      Tools for Security Specialists

      Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Risk Management, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Network Security, Authorization (Computing), Threat Management, Security Strategy, Enterprise Risk Management (ERM), Business Risk Management, Cyber Security Policies

      4.8
      Rating, 4.8 out of 5 stars
      ·
      50 reviews

      Beginner · Specialization · 1 - 3 Months

    • Status: Free Trial
      Free Trial
      L

      LearnQuest

      Identifying and Managing Security Gaps for Remote Teams

      Skills you'll gain: Threat Management, Incident Management, Remote Access Systems, Incident Response, Security Management, Data Security, Vulnerability Assessments, Threat Detection, Computer Security Incident Management, Cybersecurity, Security Controls, Continuous Monitoring, Cyber Security Assessment, Security Software, Vulnerability Management, Computer Security Awareness Training, Security Strategy, Telecommuting, Infrastructure Security, Cyber Security Policies

      5
      Rating, 5 out of 5 stars
      ·
      6 reviews

      Beginner · Specialization · 1 - 3 Months

    1…161718…52

    In summary, here are 10 of our most popular cyber threat hunting courses

    • Incident Response and Recovery: ISC2
    • System Hacking, Malware Threats, and Network Attacks: Packt
    • Cyber Security Technologies: Illinois Tech
    • Security Concepts and Practices: ISC2
    • Digital Intelligence for Everyone: Arizona State University
    • Strategies for Cloud Security Risk Management: Google Cloud
    • Managing Cybersecurity Incidents and Disasters: Kennesaw State University
    • Design and Analyze Secure Networked Systems: University of Colorado System
    • Detect, Respond, and Recover from Cloud Cybersecurity Attacks: Google Cloud
    • Introduction to Risk Management: University of California, Irvine

    Other topics to explore

    Arts and Humanities
    338 courses
    Business
    1095 courses
    Computer Science
    668 courses
    Data Science
    425 courses
    Information Technology
    145 courses
    Health
    471 courses
    Math and Logic
    70 courses
    Personal Development
    137 courses
    Physical Science and Engineering
    413 courses
    Social Sciences
    401 courses
    Language Learning
    150 courses

    Coursera Footer

    Technical Skills

    • ChatGPT
    • Coding
    • Computer Science
    • Cybersecurity
    • DevOps
    • Ethical Hacking
    • Generative AI
    • Java Programming
    • Python
    • Web Development

    Analytical Skills

    • Artificial Intelligence
    • Big Data
    • Business Analysis
    • Data Analytics
    • Data Science
    • Financial Modeling
    • Machine Learning
    • Microsoft Excel
    • Microsoft Power BI
    • SQL

    Business Skills

    • Accounting
    • Digital Marketing
    • E-commerce
    • Finance
    • Google
    • Graphic Design
    • IBM
    • Marketing
    • Project Management
    • Social Media Marketing

    Career Resources

    • Essential IT Certifications
    • High-Income Skills to Learn
    • How to Get a PMP Certification
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Popular Data Analytics Certifications
    • What Does a Data Analyst Do?
    • Career Development Resources
    • Career Aptitude Test
    • Share your Coursera Learning Story

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • ECTS Credit Recommendations

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Manage Cookie Preferences
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok