Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Cyber Security Policies, Public Safety and National Security, Cyber Risk, Infrastructure Security, Cyber Attacks, Cyber Threat Intelligence, Risk Management Framework, Threat Modeling, Cyber Security Assessment, Cyber Governance, Security Management, Continuous Monitoring, Vulnerability Assessments, Incident Response, Security Strategy, Mobile Security, Threat Management, Legal Risk
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: DevSecOps, Infrastructure as Code (IaC), Azure DevOps, Secure Coding, DevOps, Security Engineering, Infrastructure Security, Kubernetes, Cybersecurity, API Design, Software Design, Containerization, Machine Learning, Software Architecture, Role-Based Access Control (RBAC), Software Engineering, Git (Version Control System)
- Status: Free Trial
Skills you'll gain: Cybersecurity, Incident Response, Malware Protection, Identity and Access Management, Cyber Attacks, Cyber Threat Intelligence, Network Security, Multi-Factor Authentication, Computer Security Incident Management, Security Controls, Security Awareness, Threat Management, Authentications, Threat Detection, Authorization (Computing), Distributed Denial-Of-Service (DDoS) Attacks, Human Factors (Security)
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Cyber Attacks, Cyber Threat Intelligence, Security Awareness, Cyber Risk, Cyber Security Assessment, Threat Management, Cyber Threat Hunting, Cybersecurity, Cyber Security Strategy, Malware Protection, Cyber Security Policies, Mobile Security, Cyber Governance, Computer Security, Multi-Factor Authentication, Data Security, Email Security, Security Management, Security Strategy, Cloud Security
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Cyber Security Strategy, Intrusion Detection and Prevention, Security Management, Threat Detection, Disaster Recovery, Cyber Attacks, Cyber Threat Intelligence, Crisis Management, Cybersecurity, Cyber Security Policies, Cyber Risk, Cyber Security Assessment, Threat Management, Safety and Security, Security Software, Strategic Communication, Regulation and Legal Compliance
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Security, Threat Detection, Cyber Risk, Cybersecurity, General Data Protection Regulation (GDPR), Threat Modeling, Information Assurance, Data Ethics, Risk Management, Data Governance, Data Encryption Standard, Data Access, Vulnerability, Security Software, Security Management, Compliance Management, Security Strategy, NIST 800-53
- Status: Free Trial
Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Regulatory Compliance, Data Ethics, Compliance Management, Cyber Risk, Cyber Security Policies, NIST 800-53, Cybersecurity, Regulatory Requirements, Cyber Security Strategy, IT Automation, ISO/IEC 27001, General Data Protection Regulation (GDPR), Compliance Auditing, Artificial Intelligence, Payment Card Industry (PCI) Data Security Standards, Risk Management, Open Web Application Security Project (OWASP)
- Status: Preview
Stanford University
Skills you'll gain: Physics, Spatial Analysis, Systems Of Measurement, Physical Science, General Science and Research, Mechanics, Mathematical Modeling
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Governance, Internet Of Things, Security Management, Cyber Threat Intelligence, Risk Management, Incident Response, Business Planning, Governance, Human Factors (Security), Security Controls, Organizational Strategy, Business Risk Management, Cybersecurity, IT Management, Threat Management, Threat Detection, Mobile Security, Wireless Networks, Emerging Technologies, Infrastructure Security
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Security Management, Governance Risk Management and Compliance, Cyber Security Strategy, Cyber Risk, Risk Management, Compliance Management, Regulation and Legal Compliance, Risk Modeling, Risk Analysis, Risk Mitigation, Performance Measurement, Contingency Planning
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Incident Response, Cybersecurity, Network Security, Contingency Planning, Vulnerability Management, Cyber Security Policies, Cyber Governance, Computer Security Incident Management, Security Management, Governance Risk Management and Compliance, Crisis Management, Disaster Recovery, Business Continuity, Cyber Security Strategy, Cyber Risk, Firewall, Network Protocols, Vulnerability Assessments, Risk Management, TCP/IP
- Status: Free TrialStatus: AI skills
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Azure Active Directory, Penetration Testing, Vulnerability Management, Network Security, Threat Management, Authentications, Cyber Security Strategy, Cybersecurity, Cloud Computing, Cryptography, Security Management, Generative AI, Records Management, Compliance Management, Cyber Threat Intelligence, Cloud Security, Active Directory, Computer Security Incident Management
In summary, here are 10 of our most popular cyber threat hunting courses
- Homeland Security and Cybersecurity:Â University of Colorado System
- DevSecOps:Â Macquarie University
- Introduction to Cybersecurity Tools & Cyberattacks:Â IBM
- Cyber Security Essentials:Â Macquarie University
- Cyber Response and Recovery:Â Macquarie University
- Data Security & Information Privacy:Â Macquarie University
- Cybersecurity Compliance Framework, Standards & Regulations:Â IBM
- Understanding Einstein: The Special Theory of Relativity:Â Stanford University
- Cybersecurity: Developing a Program for Your Business:Â Kennesaw State University
- The GRC Approach to Managing Cybersecurity:Â Kennesaw State University