Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
Imperial College London
Skills you'll gain: Infectious Diseases, Epidemiology, Microbiology, Biology, Public Health, Molecular Biology
- Status: New
Knowledge Accelerators
Skills you'll gain: Security Awareness, Computer Security Awareness Training, Cybersecurity, Cyber Attacks, Threat Detection, Email Security, Malware Protection, Human Factors (Security)
- Status: Free Trial
Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Multi-Factor Authentication, Data Governance, Personally Identifiable Information, Authorization (Computing), Infrastructure Security, Role-Based Access Control (RBAC), Containerization
Erasmus University Rotterdam
Skills you'll gain: Journalism, Media and Communications, Public Affairs, Research, Technical Communication, Scientific Methods, Persuasive Communication, Digital Communications, Threat Detection, Policy Analysis, Public Policies, Policy Development, Content Creation, Social Sciences, Ethical Standards And Conduct
- Status: Free Trial
University of Colorado System
Skills you'll gain: Application Security, Vulnerability Assessments, Software Design, Threat Modeling, Vulnerability Management, Security Engineering, Secure Coding, Software Design Patterns, Software Architecture, Software Visualization, Cryptography, Blockchain, Public Key Cryptography Standards (PKCS)
- Status: Free
Infosec
Skills you'll gain: Cybersecurity, Cyber Attacks, Incident Response, Information Systems Security, Threat Modeling, Application Security, Security Management, Computer Security Incident Management, Network Security, IT Security Architecture, Security Information and Event Management (SIEM), Cyber Threat Intelligence, Security Controls, Identity and Access Management, Cryptography, Threat Detection, Data Security, Encryption, Security Strategy, Personally Identifiable Information
Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Cyber Threat Hunting, Computer Security Incident Management, Security Information and Event Management (SIEM), Threat Detection, Incident Management
- Status: Free Trial
University of Michigan
Skills you'll gain: Data Quality, Quantitative Research, Data Validation, Data Integrity, Data Collection, Data Cleansing, Quality Assurance, Data Processing, Data Analysis, Data Access, Statistical Analysis, Sampling (Statistics), Threat Detection, Statistical Methods
Skills you'll gain: Threat Detection, Threat Management, Cloud Security, Google Cloud Platform, Vulnerability Management, Vulnerability Assessments, Security Information and Event Management (SIEM), Public Cloud
- Status: Free Trial
Infosec
Skills you'll gain: Penetration Testing, Linux Commands, Command-Line Interface, Cyber Security Assessment, Linux, Cybersecurity, Operating Systems, Vulnerability Assessments, Windows PowerShell, Microsoft Windows, Computer Systems, Mac OS
- Status: Free Trial
Infosec
Skills you'll gain: Security Controls, Security Requirements Analysis, Continuous Monitoring, Cyber Security Policies, Information Assurance, Information Systems Security, Personally Identifiable Information, Data Security, Document Management
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cybersecurity, Computer Security Awareness Training, Cyber Attacks, Cyber Risk, Personally Identifiable Information, Threat Detection, Information Privacy, Authentications, General Data Protection Regulation (GDPR), Human Factors (Security), NIST 800-53
In summary, here are 10 of our most popular cyber threat hunting courses
- Immunology: Immune System and Infectious Diseases: Imperial College London
- Cybersecurity Awareness Essentials for Employees: Knowledge Accelerators
- Cloud Security Risks: Identify and Protect Against Threats: Google Cloud
- Science Communication: Communicating Trustworthy Information in the Digital World: Erasmus University Rotterdam
- Software Design Threats and Mitigations: University of Colorado System
- CompTIA Security+ 701: Infosec
- Managing Threat Intelligence with Cortex XSOAR: Google Cloud
- Total Data Quality: University of Michigan
- Detect and Investigate Threats with Security Command Center: Google Cloud
- Operating System Foundations: Infosec