Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
Skills you'll gain: Incident Response, Disaster Recovery, Computer Security Incident Management, Business Continuity, Cybersecurity, Investigation, Event Monitoring, Threat Detection, Risk Management, Communication Strategies
- Status: NewStatus: Free Trial
Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Cybersecurity, Threat Modeling, Malware Protection, Penetration Testing, Threat Detection, Cyber Attacks, Network Security, Intrusion Detection and Prevention, Information Systems Security, Security Awareness, Network Protocols, Authentications
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Encryption, Bash (Scripting Language), Security Strategy
Skills you'll gain: Security Controls, Security Awareness, Change Control, Cybersecurity, Security Management, Data Security, Safety and Security, Cyber Security Policies, Configuration Management, Data Ethics, Data Integrity, Identity and Access Management
- Status: Free Trial
Arizona State University
Skills you'll gain: Cyber Attacks, Data Security, Safety and Security, Cybersecurity, Computer Security Awareness Training, Information Systems Security, Content Creation, Media and Communications, Storytelling, Productivity, Digital Communications, Creativity, Web Content, Interpersonal Communications, Digital Design, Personal Development, Self-Awareness, De-escalation Techniques, Stress Management, Health Technology
- Status: Free Trial
Google Cloud
Skills you'll gain: Cloud Security, Risk Management Framework, Data Security, DevSecOps, Personally Identifiable Information, Cloud Management, Security Management, ISO/IEC 27001, Cloud Computing, Information Privacy, NIST 800-53, General Data Protection Regulation (GDPR), Infrastructure as Code (IaC), Security Controls, Cybersecurity, Identity and Access Management, Platform As A Service (PaaS), Threat Detection
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Incident Response, Contingency Planning, Disaster Recovery, Computer Security Incident Management, Security Management, Crisis Management, Cybersecurity, Business Continuity, Cyber Attacks, Risk Analysis, Business Risk Management, Data Management
- Status: Free Trial
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Security Controls, Key Management, Threat Modeling, Authorization (Computing), Encryption, Data Integrity, Authentications, Vulnerability Assessments
- Status: Free Trial
Skills you'll gain: Intrusion Detection and Prevention, Computer Security Incident Management, Cyber Threat Hunting, Cyber Attacks, Cybersecurity, Cyber Operations, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Security Information and Event Management (SIEM), Threat Detection, Cloud Security, Security Controls, Threat Management, System Monitoring, IT Automation, Record Keeping, Problem Management
- Status: Free Trial
University of California, Irvine
Skills you'll gain: Threat Modeling, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Risk Management Framework, Risk Mitigation, Vulnerability Assessments, Asset Management, Cyber Security Assessment, Security Controls
- Status: Free Trial
Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Risk Management, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Network Security, Authorization (Computing), Threat Management, Security Strategy, Enterprise Risk Management (ERM), Business Risk Management, Cyber Security Policies
- Status: Free Trial
Skills you'll gain: Threat Management, Incident Management, Remote Access Systems, Incident Response, Security Management, Data Security, Vulnerability Assessments, Threat Detection, Computer Security Incident Management, Cybersecurity, Security Controls, Continuous Monitoring, Cyber Security Assessment, Security Software, Vulnerability Management, Computer Security Awareness Training, Security Strategy, Telecommuting, Infrastructure Security, Cyber Security Policies
In summary, here are 10 of our most popular cyber threat hunting courses
- Incident Response and Recovery:Â ISC2
- System Hacking, Malware Threats, and Network Attacks:Â Packt
- Cyber Security Technologies:Â Illinois Tech
- Security Concepts and Practices:Â ISC2
- Digital Intelligence for Everyone:Â Arizona State University
- Strategies for Cloud Security Risk Management:Â Google Cloud
- Managing Cybersecurity Incidents and Disasters:Â Kennesaw State University
- Design and Analyze Secure Networked Systems:Â University of Colorado System
- Detect, Respond, and Recover from Cloud Cybersecurity Attacks:Â Google Cloud
- Introduction to Risk Management:Â University of California, Irvine