Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
Skills you'll gain: IT Security Architecture, Security Management, Threat Management, Information Systems Security, Application Security, Vulnerability Assessments, Security Strategy, Cybersecurity, Risk Management Framework, Information Assurance, Security Controls, Data Security, Cyber Security Strategy, Network Security, Cyber Risk, Authorization (Computing), Identity and Access Management, Zero Trust Network Access, Data Integrity
- Status: Free Trial
Skills you'll gain: Incident Management, Incident Response, Security Management, Computer Security Incident Management, Telecommuting, Continuous Monitoring, Cyber Security Policies, Security Strategy, Cybersecurity, Security Controls, Cyber Security Assessment, Security Awareness, Employee Engagement
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Mobile Security, Application Deployment, Threat Management, Malware Protection, Endpoint Security, Threat Detection, Cyber Security Policies, System Configuration, Systems Integration, Solution Architecture
- Status: Free Trial
Skills you'll gain: Vulnerability Management, Infrastructure as Code (IaC), Endpoint Security, Cloud Security, Vulnerability Assessments, Network Security, Cloud Computing Architecture, Threat Detection, Zero Trust Network Access, Infrastructure Security, Cybersecurity, Security Strategy, Disaster Recovery, Mobile Security, Wireless Networks
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Cloud Security, DevSecOps, Serverless Computing, Cloud Applications, Threat Management, Containerization, Security Controls, Application Deployment, Application Programming Interface (API)
Coursera Project Network
Skills you'll gain: Competitive Analysis, Customer Analysis, Market Analysis, Business Strategy, Market Share, Market Dynamics, Strategic Planning, Supplier Management, New Business Development, Leadership, Entrepreneurship
- Status: Free Trial
Board Infinity
Skills you'll gain: Risk Management Framework, Incident Response, Risk Management, Security Management, Cyber Risk, Computer Security Incident Management, Operational Risk, Cyber Threat Intelligence, Governance Risk Management and Compliance, Cybersecurity, Control Objectives for Information and Related Technology (COBIT), Security Information and Event Management (SIEM), ISO/IEC 27001, Performance Metric, Threat Detection, Security Controls, Cloud Security, Key Performance Indicators (KPIs)
- Status: Free Trial
Skills you'll gain: Amazon Elastic Compute Cloud, Amazon DynamoDB, AWS Identity and Access Management (IAM), Amazon Web Services, Firewall, Amazon CloudWatch, Cyber Security Policies, Scalability, Continuous Deployment, Infrastructure As A Service (IaaS), Cloud Security, Security Controls, Network Troubleshooting, Network Security, Virtual Private Networks (VPN), Disaster Recovery
Skills you'll gain: Network Security, Vulnerability Assessments, Cyber Security Assessment, Cybersecurity, Software Installation, System Configuration, Microsoft Windows, Web Applications, Linux, Configuration Management
- Status: Free Trial
University of Michigan
Skills you'll gain: Debugging, Unit Testing, Test Case, Integrated Development Environments, Computer Programming, Development Testing, Data Import/Export, File Management
- Status: Free Trial
Skills you'll gain: Encryption, Internet Of Things, Application Security, Hardware Architecture, Security Engineering, Security Strategy, Endpoint Security, Information Systems Security, Data Security, Network Security, Threat Modeling, Cybersecurity, Vulnerability Assessments, Security Requirements Analysis, Vulnerability Management, Information Privacy, General Data Protection Regulation (GDPR), Authentications, Authorization (Computing)
Skills you'll gain: Incident Response, Email Security, Computer Security Incident Management, Cyber Operations, Threat Detection, Security Information and Event Management (SIEM), IT Automation, Google Cloud Platform
In summary, here are 10 of our most popular cyber threat hunting courses
- Fundamentals of Information System Security Architecture:Â LearnQuest
- Incident Management and Continuous Improvement:Â LearnQuest
- Check Point Jump Start: Harmony Mobile:Â Check Point Software Technologies Ltd.
- Cloud Security, Resiliency, and Vulnerability Management:Â Packt
- Check Point Jump Start - CloudGuard Workload Protection:Â Check Point Software Technologies Ltd.
- Using Porter’s Five Forces Model for Competitive Analysis : Coursera Project Network
- Advanced Cybersecurity Risk Management:Â Board Infinity
- AWS: Resilient Solutions and Security Controls:Â Whizlabs
- Nessus Scanner - Network Scanning from Beginner to Advanced:Â Packt
- Debugging: Hunting and Squashing Bugs:Â University of Michigan