Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Preview
Coursera Instructor Network
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Data Security, Personally Identifiable Information, Malware Protection, Threat Management, Email Security, Mitigation
- Status: Free Trial
University of Colorado System
Skills you'll gain: TCP/IP, Local Area Networks, Routing Protocols, Network Routing, Digital Communications, OSI Models, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Network Planning And Design, Network Security, Network Architecture, Network Performance Management, Computer Networking, Network Infrastructure, Wireless Networks, Telecommunications, Software-Defined Networking, Algorithms, System Programming, Data Integrity
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Information Privacy, Personally Identifiable Information, Data Security, Cybersecurity, Threat Modeling, General Data Protection Regulation (GDPR), Data Integrity, Data Governance, Data Ethics, Cyber Risk, Vulnerability Assessments, Vulnerability, Security Management, Security Software, Data Encryption Standard, Risk Management, Security Strategy, Compliance Management, Data Access, NIST 800-53
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Criminal Investigation and Forensics, Investigation, Mobile Security, File Systems, Data Security, Cybersecurity, Data Ethics, Data Integrity, File Management, Computer Security Incident Management, Incident Response, Disaster Recovery, Malware Protection, Data Storage, Network Analysis, Regulation and Legal Compliance, Mac OS
- Status: Free Trial
Palo Alto Networks
Skills you'll gain: Cybersecurity, Zero Trust Network Access, Cyber Threat Intelligence, Malware Protection, Network Security, Firewall, Threat Detection, Cloud Security, Endpoint Security, Security Controls, Enterprise Security, Software As A Service, Cloud Computing, Cryptography
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Mobile Security, Investigation, Criminal Investigation and Forensics, Mobile Development, Android (Operating System), Application Security, Apple iOS, Legal Proceedings, Computer Security, Malware Protection, File Systems, Cybersecurity, Secure Coding, Computer Security Incident Management, Cloud Security, Analysis, Disaster Recovery, Security Strategy, Debugging, Encryption
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Cryptography, Encryption, Network Security, Advanced Encryption Standard (AES), Cybersecurity, Data Security, Public Key Infrastructure, Data Encryption Standard, Blockchain, Security Engineering, Virtual Private Networks (VPN), Intellectual Property, Security Management, Wireless Networks, Authentications, Emerging Technologies, Hardware Architecture
- Status: Preview
West Virginia University
Skills you'll gain: Auditing, Loss Prevention, Internal Controls, Financial Controls, Threat Detection, Anomaly Detection, Financial Auditing, Cybersecurity, Financial Data, Cyber Operations, Investigation, Criminal Investigation and Forensics, Analytics, Specialized Accounting, Cyber Attacks, Security Awareness, Big Data, Accounting, Business Ethics, Compliance Reporting
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Vulnerability Management, Cybersecurity, Cyber Attacks, Cyber Security Policies, Security Management, Vulnerability Assessments, Cyber Security Strategy, Network Security, Threat Management, Threat Detection, Security Controls, Cyber Governance, Firewall, Virtual Private Networks (VPN), Intrusion Detection and Prevention, Continuous Improvement Process
- Status: Preview
University of California, Santa Cruz
Skills you'll gain: Systems Design, Model Based Systems Engineering, Mathematical Modeling, Simulations, Control Systems, Embedded Systems, Systems Analysis, Computational Logic, Digital Communications, Differential Equations, Estimation
University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Security Engineering, Usability Testing, Threat Modeling, Human Factors, Information Privacy, Cybersecurity, Personally Identifiable Information, User Interface (UI) Design, Multi-Factor Authentication, User Centered Design, Design
- Status: Preview
The Pennsylvania State University
Skills you'll gain: Infectious Diseases, Epidemiology, Public Health and Disease Prevention, Microbiology, Public Health, Social Sciences, Community Health, Biology, Emerging Technologies, Mathematical Modeling, Molecular Biology
In summary, here are 10 of our most popular cyber threat hunting courses
- Introduction to Cybersecurity Fundamentals:Â Coursera Instructor Network
- Computer Communications:Â University of Colorado System
- Data Security & Information Privacy:Â Macquarie University
- Digital Forensics:Â Macquarie University
- Palo Alto Networks Cybersecurity Foundation:Â Palo Alto Networks
- Mobile Security:Â Macquarie University
- Applied Cryptography & Information Security:Â Macquarie University
- Forensic Accounting and Fraud Examination:Â West Virginia University
- The Foundations of Cybersecurity:Â Kennesaw State University
- Cyber-Physical Systems: Modeling and Simulation:Â University of California, Santa Cruz