Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Microsoft Intune (Mobile Device Management Software), Mobile Security, Application Deployment, Endpoint Security, Threat Management, Apple iOS, System Configuration, iOS Development, Threat Detection, Cyber Security Policies, Network Security, Event Monitoring
- Status: Free Trial
Board Infinity
Skills you'll gain: Incident Response, Risk Management Framework, Cyber Risk, Risk Management, Security Management, Enterprise Risk Management (ERM), Business Risk Management, Cyber Threat Intelligence, Governance Risk Management and Compliance, Continuous Monitoring, Cyber Security Strategy, Security Information and Event Management (SIEM), Threat Detection, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Key Performance Indicators (KPIs)
- Status: NewStatus: Preview
Coursera Instructor Network
Skills you'll gain: Anomaly Detection, Data Visualization, Data Presentation, Generative AI, Risk Management, Business Risk Management, ChatGPT, Data Synthesis, Compliance Management, Compliance Auditing, Regulatory Compliance, Threat Detection, Prompt Engineering, Data Pipelines, Applied Machine Learning, Automation, Predictive Analytics, Artificial Intelligence
Coursera Project Network
Skills you'll gain: Competitive Analysis, Business Strategy, Strategic Thinking, Market Analysis, Market Dynamics, Market Opportunities, Strategic Planning, New Business Development, Supplier Management, Company, Product, and Service Knowledge, Consumer Behaviour, Entrepreneurship, Leadership
Skills you'll gain: Vulnerability Assessments, Cyber Security Assessment, Network Security, Penetration Testing, Network Administration, Software Installation, System Configuration, Cyber Security Policies, Web Applications, Authentications, Microsoft Windows, Integration Testing, Linux
- Status: Free Trial
University of Michigan
Skills you'll gain: Debugging, Unit Testing, Integrated Development Environments, Development Testing, Technical Communication, Python Programming, File Management
- Status: Free Trial
Skills you'll gain: Hardware Architecture, Security Engineering, Internet Of Things, Encryption, Information Systems Security, Vulnerability Assessments, Cybersecurity, Threat Modeling, Data Security, Security Requirements Analysis, Vulnerability Management, Information Privacy
Skills you'll gain: Incident Response, Email Security, Computer Security Incident Management, Cyber Operations, Threat Detection, Security Information and Event Management (SIEM), IT Automation, Google Cloud Platform
- Status: NewStatus: Free Trial
Skills you'll gain: Ansible, Puppet (Configuration Management Tool), Software-Defined Networking, Network Administration, Security Awareness, Threat Modeling, Chef (Configuration Management Tool), Information Systems Security, Virtual Private Networks (VPN), JSON, Authentications, Computer Networking, Network Architecture, Authorization (Computing), Automation, Configuration Management, Application Programming Interface (API)
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Authentications, Identity and Access Management, Single Sign-On (SSO), Security Assertion Markup Language (SAML), Multi-Factor Authentication, User Provisioning, OAuth, Threat Modeling, Authorization (Computing), IT Security Architecture, Threat Management, Zero Trust Network Access, Cybersecurity, Systems Architecture, Role-Based Access Control (RBAC), Vulnerability Assessments, Cryptography, Threat Detection, Remote Access Systems, Risk Management
Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), TCP/IP, Network Protocols, Vulnerability Assessments, Cyber Security Assessment, Windows PowerShell, Active Directory, Network Security, Network Analysis, Microsoft Windows, Wireless Networks, Scripting, Virtual Environment
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Threat Detection, Network Analysis, TCP/IP, Network Protocols, Cybersecurity, Application Security, Wireless Networks, Splunk, Information Privacy
In summary, here are 10 of our most popular cyber threat hunting courses
- Check Point Jump Start: Harmony Mobile:Â Check Point Software Technologies Ltd.
- Advanced Cybersecurity Risk Management:Â Board Infinity
- GenAI for Fraud Analysts: Improving Detection Efficiency:Â Coursera Instructor Network
- Using Porter’s Five Forces Model for Competitive Analysis : Coursera Project Network
- Nessus Scanner - Network Scanning from Beginner to Advanced:Â Packt
- Debugging: Hunting and Squashing Bugs:Â University of Michigan
- Implementing Security in IoT and Edge Devices:Â LearnQuest
- Automating Response to Phishing with Cortex XSOAR:Â Google Cloud
- Security Fundamentals & Network Automation:Â Packt
- Identity Access Management (IAM) and Secure Authentication:Â Macquarie University