Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
University of Colorado Boulder
Skills you'll gain: Policy Analysis, Policy Development, Public Policies, Cyber Governance, Network Infrastructure, Telecommunications, Socioeconomics, Digital Communications, Regulation and Legal Compliance, Diversity Equity and Inclusion Initiatives, Economics, Technical Writing
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Mobile Security, Application Deployment, Threat Management, Malware Protection, Endpoint Security, Threat Detection, Cyber Security Policies, System Configuration, Systems Integration, Solution Architecture
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Cloud Security, DevSecOps, Serverless Computing, Cloud Applications, Threat Management, Containerization, Security Controls, Application Deployment, Application Programming Interface (API)
- Status: New
University of Colorado Boulder
Skills you'll gain: Unix, Penetration Testing, Unix Commands, Cyber Operations, Application Security, Cyber Security Assessment, Computer Security, Vulnerability Assessments, Microsoft Windows, Vulnerability Scanning, Linux, Shell Script, Command-Line Interface, Remote Access Systems, Debugging, OS Process Management
- Status: Free Trial
Board Infinity
Skills you'll gain: Risk Management Framework, Incident Response, Risk Management, Security Management, Cyber Risk, Computer Security Incident Management, Operational Risk, Cyber Threat Intelligence, Governance Risk Management and Compliance, Cybersecurity, Control Objectives for Information and Related Technology (COBIT), Security Information and Event Management (SIEM), ISO/IEC 27001, Performance Metric, Threat Detection, Security Controls, Cloud Security, Key Performance Indicators (KPIs)
- Status: Free Trial
Skills you'll gain: Vulnerability Management, Infrastructure as Code (IaC), Endpoint Security, Cloud Security, Vulnerability Assessments, Network Security, Cloud Computing Architecture, Threat Detection, Zero Trust Network Access, Infrastructure Security, Cybersecurity, Security Strategy, Disaster Recovery, Mobile Security, Wireless Networks
- Status: Free Trial
University of Michigan
Skills you'll gain: Debugging, Unit Testing, Test Case, Integrated Development Environments, Computer Programming, Development Testing, Data Import/Export, File Management
- Status: Preview
University of Copenhagen
Skills you'll gain: Political Sciences, Environmental Policy, Environmental Issue, International Relations, Policy Analysis, Lobbying, Public Affairs, Social Justice, Community Organizing, Diplomacy, Governance, Environmental Laws, Advocacy
- Status: Free Trial
Skills you'll gain: Amazon Elastic Compute Cloud, Amazon DynamoDB, AWS Identity and Access Management (IAM), Amazon Web Services, Firewall, Amazon CloudWatch, Cyber Security Policies, Scalability, Continuous Deployment, Infrastructure As A Service (IaaS), Cloud Security, Security Controls, Network Troubleshooting, Network Security, Virtual Private Networks (VPN), Disaster Recovery
Skills you'll gain: Network Security, Vulnerability Assessments, Cyber Security Assessment, Cybersecurity, Software Installation, System Configuration, Microsoft Windows, Web Applications, Linux, Configuration Management
Skills you'll gain: Incident Response, Email Security, Computer Security Incident Management, Cyber Operations, Threat Detection, Security Information and Event Management (SIEM), IT Automation, Google Cloud Platform
- Status: Free Trial
Skills you'll gain: Encryption, Internet Of Things, Application Security, Hardware Architecture, Security Engineering, Security Strategy, Endpoint Security, Information Systems Security, Data Security, Network Security, Threat Modeling, Cybersecurity, Vulnerability Assessments, Security Requirements Analysis, Vulnerability Management, Information Privacy, General Data Protection Regulation (GDPR), Authentications, Authorization (Computing)
In summary, here are 10 of our most popular cyber threat hunting courses
- When to Regulate? The Digital Divide and Net Neutrality:Â University of Colorado Boulder
- Check Point Jump Start: Harmony Mobile:Â Check Point Software Technologies Ltd.
- Check Point Jump Start - CloudGuard Workload Protection:Â Check Point Software Technologies Ltd.
- Security & Ethical Hacking: Attacking Unix and Windows :Â University of Colorado Boulder
- Advanced Cybersecurity Risk Management:Â Board Infinity
- Cloud Security, Resiliency, and Vulnerability Management:Â Packt
- Debugging: Hunting and Squashing Bugs:Â University of Michigan
- Making Democracy Fit for Climate:Â University of Copenhagen
- AWS: Resilient Solutions and Security Controls:Â Whizlabs
- Nessus Scanner - Network Scanning from Beginner to Advanced:Â Packt