Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
University of California, Davis
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Secure Coding, Cryptography, Authentications, Encryption, Penetration Testing, Vulnerability Assessments, Application Security, Data Security, Security Controls, Software Design, C and C++, Vulnerability Management, Authorization (Computing), Java, Linux, Programming Principles, Debugging, Cybersecurity
- Status: Preview
Universiteit Leiden
Skills you'll gain: Risk Management, Risk Analysis, Safety and Security, Environmental Issue, Cyber Security Strategy, Decision Making, Public Health
- Status: Free Trial
Skills you'll gain: Azure Active Directory, Data Security, Multi-Factor Authentication, Microsoft Azure, Role-Based Access Control (RBAC), Cloud Security, Active Directory, Threat Modeling, Security Strategy, Data Storage, Application Security, Database Architecture and Administration, Virtual Machines, Infrastructure Security, Kubernetes, Continuous Monitoring, Web Applications, Cyber Governance, System Monitoring, Network Security
- Status: Free Trial
EIT Digital
Skills you'll gain: Embedded Systems, Embedded Software, Internet Of Things, Operating Systems, Real-Time Operating Systems, Wireless Networks, System Programming, Hardware Architecture, Simulations, C (Programming Language), Network Protocols
- Status: Free Trial
Skills you'll gain: Identity and Access Management, Business Continuity, Network Security, Cryptography, AWS Identity and Access Management (IAM), Encryption, User Provisioning, Security Management, Penetration Testing, Vulnerability Scanning, ISO/IEC 27001, Threat Management, Network Performance Management, Information Systems Security, Network Architecture, DevSecOps, Cyber Operations, Data Management, Software Development Methodologies, Cybersecurity
- Status: Free Trial
LearnKartS
Skills you'll gain: Cloud Security, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Penetration Testing, Cloud Computing, Mobile Security, Cloud Services, Cloud Infrastructure, Virtualization, Encryption, Cryptography, Vulnerability Assessments, SQL
- Status: Free Trial
New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
- Status: Free Trial
Infosec
Skills you'll gain: Cyber Risk, Risk Management Framework, Cybersecurity, Cyber Governance, Cyber Security Strategy, Risk Management, Infrastructure Security, Cyber Security Assessment, Security Controls, Vulnerability Assessments, Stakeholder Communications, Continuous Improvement Process, Asset Management
- Status: Free Trial
University of Colorado System
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Risk Management, Enterprise Security, Vulnerability Assessments, Encryption, Network Security, Data Security, Security Awareness, Authentications
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Medical Privacy, Health Information Management, Security Awareness, Cloud Security, Personally Identifiable Information, Encryption, Health Care, Health Care Procedure and Regulation, Data Security, Cyber Attacks, Cryptography, Health Policy, Information Privacy, Regulatory Compliance, Cloud Computing, Patient Safety
University of Maryland, College Park
Skills you'll gain: Hardware Design, Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Application Specific Integrated Circuits, Cryptography, Encryption, Emerging Technologies, Authentications, System Design and Implementation, Computational Logic
- Status: Free Trial
University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authentications, Key Management, Data Security, Cloud Applications, Cloud Services, Application Security, Authorization (Computing), Cyber Risk, Secure Coding, Cloud Storage, Personally Identifiable Information, DevSecOps, General Data Protection Regulation (GDPR), Network Security, Cloud Computing, Cybersecurity, Threat Management, Cryptography
In summary, here are 10 of our most popular cyber threat hunting courses
- Secure Coding Practices:Â University of California, Davis
- Risk in Modern Society :Â Universiteit Leiden
- Microsoft Azure Security Engineer Associate (AZ-500):Â Microsoft
- Embedded Hardware and Operating Systems:Â EIT Digital
- CISSP Certified Information Systems Security Professional:Â Packt
- Advanced Cybersecurity:Â LearnKartS
- Cyber Attack Countermeasures:Â New York University
- NIST CSF:Â Infosec
- Introduction to Cybersecurity for Business:Â University of Colorado System
- Healthcare Data Security, Privacy, and Compliance:Â Johns Hopkins University