Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: New
Skills you'll gain: Firewall, Network Security, Intrusion Detection and Prevention, Cloud Security, Infrastructure Security, Security Controls, Threat Detection, Performance Tuning
- Status: NewStatus: Free Trial
Whizlabs
Skills you'll gain: Data Security, Network Security, Security Testing, Cybersecurity, Infrastructure Security, Identity and Access Management, Cloud Security, Security Controls, Threat Detection, Firewall, OSI Models, Encryption, Single Sign-On (SSO), Computer Networking, Incident Response, Public Key Infrastructure
West Virginia University
Skills you'll gain: Auditing, Loss Prevention, Internal Controls, Financial Controls, Threat Detection, Anomaly Detection, Financial Auditing, Cybersecurity, Financial Data, Cyber Operations, Investigation, Criminal Investigation and Forensics, Analytics, Specialized Accounting, Cyber Attacks, Security Awareness, Big Data, Accounting, Business Ethics, Compliance Reporting
- Status: Free Trial
Palo Alto Networks
Skills you'll gain: Cybersecurity, Zero Trust Network Access, Cyber Threat Intelligence, Malware Protection, Network Security, Firewall, Threat Detection, Cloud Security, Endpoint Security, Security Controls, Enterprise Security, Software As A Service, Cloud Computing
- Status: NewStatus: Free Trial
Skills you'll gain: Ansible, Puppet (Configuration Management Tool), Software-Defined Networking, Network Security, Network Administration, Security Awareness, Threat Modeling, Chef (Configuration Management Tool), Information Systems Security, Virtual Private Networks (VPN), JSON, Authentications, Computer Networking, Network Architecture, Authorization (Computing), Automation, Configuration Management, Application Programming Interface (API)
- Status: New
Skills you'll gain: MITRE ATT&CK Framework, Generative AI, Cyber Threat Intelligence, Cyber Security Strategy, Cybersecurity, Threat Modeling, Computer Security, Cyber Attacks, Threat Detection, Artificial Intelligence, Anomaly Detection, Data Ethics, Information Privacy, Innovation
- Status: NewStatus: Free Trial
Skills you'll gain: AWS Identity and Access Management (IAM), Data Governance, Identity and Access Management, Data Ethics, Amazon Web Services, Data Management, Generative AI, Cloud Security, Cyber Governance, Artificial Intelligence and Machine Learning (AI/ML), Artificial Intelligence, MLOps (Machine Learning Operations), Data Security, Information Privacy
- Status: New
Macquarie University
Skills you'll gain: DevSecOps, Application Security, Secure Coding, DevOps, IT Security Architecture, Cloud-Native Computing, Azure DevOps, Software Architecture, MLOps (Machine Learning Operations), Security Engineering, Hardening, Continuous Delivery, Security Testing, Threat Modeling, Cloud Security, CI/CD, Kubernetes, Microsoft Azure, Web Applications, Infrastructure as Code (IaC)
- Status: New
Macquarie University
Skills you'll gain: Authentications, Identity and Access Management, Single Sign-On (SSO), Security Assertion Markup Language (SAML), Multi-Factor Authentication, User Provisioning, OAuth, Threat Modeling, Authorization (Computing), IT Security Architecture, Zero Trust Network Access, Systems Architecture, Role-Based Access Control (RBAC), Vulnerability Assessments, Cryptography
Stanford University
Skills you'll gain: Physics, Timelines, Verification And Validation, Scientific Methods, Research, Mechanics, Mathematical Modeling, Systems Of Measurement
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Cybersecurity, Cyber Attacks, Application Security, Network Security, Security Awareness, Malware Protection, Vulnerability Assessments, Secure Coding, Web Applications, Javascript
- Status: New
Macquarie University
Skills you'll gain: Cryptography, Encryption, Network Security, Advanced Encryption Standard (AES), Cybersecurity, Data Security, Public Key Infrastructure, Data Encryption Standard, Blockchain, Information Privacy, Virtual Private Networks (VPN), Wireless Networks, Authentications, Emerging Technologies
In summary, here are 10 of our most popular cyber threat hunting courses
- Secure VPC Networks with Cloud Next Generation Firewall:Â Google Cloud
- Protection of Information Assets:Â Whizlabs
- Forensic Accounting and Fraud Examination:Â West Virginia University
- Palo Alto Networks Cybersecurity Foundation:Â Palo Alto Networks
- Security Fundamentals & Network Automation:Â Packt
- Generative AI and its Impact on Cybersecurity:Â Packt
- Responsible AI with AWS Security and Governance:Â LearnKartS
- DevSecOps:Â Macquarie University
- Identity Access Management (IAM) and Secure Authentication:Â Macquarie University
- Understanding Einstein: The Special Theory of Relativity:Â Stanford University