Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Email Security, Threat Detection, Threat Modeling, Jupyter, Authentications, Intrusion Detection and Prevention, Machine Learning Algorithms, Artificial Intelligence, Multi-Factor Authentication, Artificial Intelligence and Machine Learning (AI/ML), Computer Vision, Natural Language Processing, Machine Learning, Deep Learning
- Status: Preview
Skills you'll gain: Cybersecurity, Business Continuity, Threat Detection, Endpoint Security, Cyber Security Policies, Incident Response, Cyber Governance, Vulnerability Assessments, Network Security, Application Security, Cloud Security, Risk Management, Encryption, Authentications
- Status: Free Trial
University of Colorado System
Skills you'll gain: TCP/IP, Local Area Networks, Routing Protocols, Network Routing, Digital Communications, OSI Models, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Network Planning And Design, Network Security, Network Architecture, Network Performance Management, Computer Networking, Network Infrastructure, Wireless Networks, Telecommunications, Software-Defined Networking, Algorithms, System Programming, Data Integrity
- Status: Preview
Yale University
Skills you'll gain: Political Sciences, Policy Analysis, Social Justice, Social Sciences, European History, Law, Regulation, and Compliance, Governance, Ethical Standards And Conduct, Socioeconomics, Economics
- Status: Preview
West Virginia University
Skills you'll gain: Auditing, Loss Prevention, Internal Controls, Financial Controls, Threat Detection, Anomaly Detection, Financial Auditing, Cybersecurity, Financial Data, Cyber Operations, Investigation, Criminal Investigation and Forensics, Analytics, Specialized Accounting, Cyber Attacks, Security Awareness, Big Data, Accounting, Business Ethics, Compliance Reporting
- Status: Preview
Stanford University
Skills you'll gain: Physics, Timelines, Verification And Validation, Scientific Methods, Research, Mechanics, Mathematical Modeling, Systems Of Measurement
- Status: Free Trial
Palo Alto Networks
Skills you'll gain: Cybersecurity, Zero Trust Network Access, Cyber Threat Intelligence, Malware Protection, Network Security, Firewall, Threat Detection, Cloud Security, Endpoint Security, Security Controls, Enterprise Security, Software As A Service, Cloud Computing, Cryptography
- Status: Free Trial
New York University
Skills you'll gain: Network Security, Firewall, Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Network Architecture, Intrusion Detection and Prevention, TCP/IP, Cybersecurity, Threat Detection, Cyber Attacks, Enterprise Security, Infrastructure Security, Network Protocols, Proxy Servers
- Status: Preview
The Pennsylvania State University
Skills you'll gain: Infectious Diseases, Epidemiology, Public Health and Disease Prevention, Microbiology, Public Health, Social Sciences, Community Health, Biology, Emerging Technologies, Mathematical Modeling, Molecular Biology
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Vulnerability Management, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Management, Vulnerability Assessments, Cyber Security Strategy, Network Security, Threat Management, Threat Detection, Security Controls, Cyber Governance, Firewall, Virtual Private Networks (VPN), Intrusion Detection and Prevention, Continuous Improvement Process
- Status: Preview
University of California, Santa Cruz
Skills you'll gain: Systems Design, Model Based Systems Engineering, Mathematical Modeling, Simulations, Control Systems, Embedded Systems, Systems Analysis, Computational Logic, Digital Communications, Differential Equations, Estimation
University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Security Engineering, Usability Testing, Threat Modeling, Human Factors, Information Privacy, Cybersecurity, Personally Identifiable Information, User Interface (UI) Design, Multi-Factor Authentication, User Centered Design, Design
In summary, here are 10 of our most popular cyber threat hunting courses
- Introduction to AI for Cybersecurity:Â Johns Hopkins University
- Office of the CISO Institute: Cybersecurity Essentials:Â Google
- Computer Communications:Â University of Colorado System
- Moral Foundations of Politics :Â Yale University
- Forensic Accounting and Fraud Examination:Â West Virginia University
- Understanding Einstein: The Special Theory of Relativity:Â Stanford University
- Palo Alto Networks Cybersecurity Foundation:Â Palo Alto Networks
- Real-Time Cyber Threat Detection and Mitigation:Â New York University
- Epidemics - the Dynamics of Infectious Diseases:Â The Pennsylvania State University
- The Foundations of Cybersecurity:Â Kennesaw State University