Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Cryptography
- Status: NewStatus: Free Trial
Skills you'll gain: Data Security, Personally Identifiable Information, Information Assurance, Security Management, Data Governance, Data Loss Prevention, Data Management, Threat Management, Threat Detection, Encryption, Identity and Access Management
- Status: NewStatus: Free Trial
Skills you'll gain: IT Security Architecture, Threat Modeling, Application Security, Cloud Computing Architecture, Cloud Computing, Security Engineering, Cloud Security, Systems Architecture, Information Systems Security, Threat Management, Software As A Service, Infrastructure As A Service (IaaS), Computer Security, Threat Detection, Platform As A Service (PaaS), Cyber Security Assessment, Role-Based Access Control (RBAC), Data Integrity
- Status: Free TrialStatus: AI skills
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, System Testing, Cloud Security, Vulnerability Scanning, Threat Management, Cloud Computing, Business Software, Authentications, Active Directory, Data Management, Computer Security Incident Management
- Status: NewStatus: Free Trial
Skills you'll gain: Application Security, Risk Management Framework, Secure Coding, Threat Modeling, Software Testing, Software Development Life Cycle, Web Applications, Vulnerability Scanning, Software Development Methodologies, Application Programming Interface (API), Databases, Agile Methodology
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Risk Management, Cyber Governance, Cost Benefit Analysis, Security Management, Risk Management Framework, Vulnerability Management, Cyber Attacks, Cybersecurity, Threat Management, Operational Risk, Risk Analysis, Enterprise Risk Management (ERM), Business Risk Management, Risk Mitigation, Vulnerability Assessments, ISO/IEC 27001, Threat Detection, Cyber Security Strategy, Security Awareness, Cyber Risk
- Status: NewStatus: Free Trial
Skills you'll gain: Security Testing, Continuous Monitoring, Cyber Security Assessment, Penetration Testing, Vulnerability Assessments, Intrusion Detection and Prevention, Vulnerability Scanning, Security Controls, System Monitoring, Threat Detection, Threat Modeling, Security Software
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Security Awareness, Mobile Security, Cyber Attacks, Cyber Security Strategy, Cyber Risk, Cybersecurity, Cyber Governance, Cyber Security Assessment, Cyber Security Policies, Cyber Threat Intelligence, Data Security, Malware Protection, Security Strategy, Human Factors (Security), Security Management, Authentications, Cyber Threat Hunting, Email Security, Identity and Access Management, Cloud Security
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Incident Response, Incident Management, Computer Security Incident Management, Cyber Security Strategy, Security Management, Cyber Attacks, Intrusion Detection and Prevention, Cyber Risk, Cyber Security Policies, Disaster Recovery, Threat Detection, Crisis Management, Cybersecurity, Cyber Security Assessment, Threat Management, Business Continuity, Safety and Security, Strategic Communication, Security Software, Regulation and Legal Compliance
- Status: New
Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Threat Management, Threat Modeling, Endpoint Detection and Response, MITRE ATT&CK Framework, Incident Response, Cybersecurity, Security Information and Event Management (SIEM)
- Status: New
Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Cyber Threat Hunting, Threat Detection, Endpoint Detection and Response, Cybersecurity, Security Information and Event Management (SIEM), Incident Response, Continuous Monitoring, Artificial Intelligence
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Email Security, System Design and Implementation, Network Security, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Jupyter, Authentications, Deep Learning, Machine Learning Software
In summary, here are 10 of our most popular cyber threat hunting courses
- Assets, Threats, and Vulnerabilities:Â Google
- CISSP Domain 2: Asset Security:Â Infosec
- CISSP Domain 3: Security Architecture and Engineering:Â Infosec
- Microsoft Cybersecurity Analyst:Â Microsoft
- CISSP Domain 8: Software development security:Â Infosec
- Cybersecurity Risk Management Frameworks:Â Kennesaw State University
- CISSP Domain 6: Security Assessment and Testing:Â Infosec
- Cyber Security Essentials:Â Macquarie University
- Cyber Response and Recovery:Â Macquarie University
- Google Threat Intelligence - Español: Google Cloud