Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
University of Maryland, College Park
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Cyber Governance, Cyber Risk, Cyber Security Assessment, Security Strategy, Cyber Security Policies, Security Management, Security Awareness, Threat Modeling, Information Privacy, Infrastructure Security, Risk Management, Vulnerability Assessments
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Security Strategy, Cybersecurity, Mobile Security, Cyber Threat Intelligence, Network Security, Internet Of Things, Data Security, Emerging Technologies, Technology Strategies, Business, Enterprise Application Management
Coursera Project Network
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Cyber Security Assessment, Vulnerability Management, Security Testing, Network Security, Threat Detection, Operating Systems, Technical Services
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Human Factors (Security), Threat Management, Security Awareness, Cybersecurity, Cyber Risk, Compliance Training, Employee Training, Behavior Management, Insurance
University of London
Skills you'll gain: Law, Regulation, and Compliance, Court Systems, Business Ethics, Social Justice, Environmental Social And Corporate Governance (ESG), Legal Proceedings, Case Law, International Relations, Legal Research, Political Sciences, Governance
University of Maryland, College Park
Skills you'll gain: Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Application Specific Integrated Circuits, Cryptography, Encryption, Emerging Technologies, Authentications, System Design and Implementation, Computational Logic
- Status: Free Trial
Skills you'll gain: Identity and Access Management, Cloud Security, DevSecOps, Cloud Computing, Google Cloud Platform, Network Security, Cloud Infrastructure, Data Security, Cloud Computing Architecture, IT Automation, General Networking, Computer Networking, Cybersecurity, Infrastructure Security, Security Controls, Infrastructure as Code (IaC)
- Status: Free Trial
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Computer Security Incident Management, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Malware Protection, Endpoint Security, Network Security, Firewall
- Status: Free Trial
University of Minnesota
Skills you'll gain: Software Design Patterns, Software Design, Engineering Software, Software Quality Assurance, Software Engineering, Program Development, Application Security, Object Oriented Design, Software Architecture, Software Quality (SQA/SQC), Development Testing, Threat Modeling, Maintainability, Development Environment, Code Review, Application Deployment, Test Tools, Continuous Deployment, Quality Assurance, Continuous Delivery
- Status: Free Trial
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Security Awareness, Cyber Attacks, Network Security, Vulnerability Assessments, Cloud Services, Data Security, Human Factors (Security)
Kennesaw State University
Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Cyber Operations, Cryptography, Cyber Risk, Authorization (Computing), Encryption, Secure Coding, Systems Development Life Cycle, Security Controls, Cyber Governance, Cyber Security Policies, Infrastructure Security, Security Awareness, Safety and Security, Identity and Access Management, Incident Management
Duke University
Skills you'll gain: Child Development, Advocacy, Research, Research Methodologies, Social Sciences, Data Collection, Anthropology, Nutrition and Diet, Environmental Issue, Community Development, Biology, Conflict Management
In summary, here are 10 of our most popular cyber threat hunting courses
- A Strategic Approach to Cybersecurity:Â University of Maryland, College Park
- Cybersecurity and Mobility:Â Kennesaw State University
- Vulnerability Scanning with Nmap: Network Scanning:Â Coursera Project Network
- Cybersecurity and the X-Factor:Â Kennesaw State University
- Citizenship and the Rule of Law:Â University of London
- Hardware Security:Â University of Maryland, College Park
- Introduction to Security Principles in Cloud Computing:Â Google Cloud
- Detecting and Mitigating Cyber Threats and Attacks:Â University of Colorado System
- Engineering Practices for Building Quality Software:Â University of Minnesota
- Cyber Threats and Attack Vectors:Â University of Colorado System