Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
Google Cloud
Skills you'll gain: Cloud Security, Google Cloud Platform, Cyber Security Policies, Cloud Management, Security Management, Vulnerability Assessments
- Status: Free Trial
University of California San Diego
Skills you'll gain: Energy and Utilities, Social Justice, Mitigation, Socioeconomics, International Relations, Electric Power Systems, Social Sciences, Cultural Responsiveness, Pollution Prevention, Consumer Behaviour, Environmental Policy, Community Development, Advocacy, Natural Resource Management, Environment, Health Disparities, Transportation Operations, Environmental Engineering, Economics, Corporate Sustainability
- Status: New
Skills you'll gain: Generative AI, Cloud Computing Architecture, Systems Architecture, Cloud-Native Computing, Scalability, Solution Architecture, Large Language Modeling, Cloud Platforms, Artificial Intelligence and Machine Learning (AI/ML), Security Engineering, Threat Modeling, System Monitoring, Containerization, MLOps (Machine Learning Operations), Simulations, Disaster Recovery
Skills you'll gain: Cryptography, Authentications, Application Security, .NET Framework, Threat Modeling, Data Security, Authorization (Computing), Vulnerability Management, Security Controls, Application Development, Data Validation, File Management, SQL
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Anomaly Detection, Threat Detection, Cyber Security Policies, Security Information and Event Management (SIEM), Cyber Threat Hunting, Cybersecurity, Network Security, Cyber Risk, Network Analysis, Cloud Security, NIST 800-53, Graph Theory
- Status: NewStatus: Free Trial
Whizlabs
Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Cloud Security, Amazon S3, Key Management, Threat Detection, Network Security, Data Security, Vulnerability Assessments, Encryption, Amazon Elastic Compute Cloud, Authentications, Public Key Infrastructure
- Status: Preview
Skills you'll gain: PostgreSQL, SQL, Databases, Database Management, Secure Coding, Relational Databases, User Provisioning, Data Security, Role-Based Access Control (RBAC), Data Integrity, Threat Detection, Encryption
- Status: Preview
University of Colorado Boulder
Skills you'll gain: Teaching, Differentiated Instruction, Diversity Training, Diversity Awareness, Cultural Diversity, Pedagogy, Cultural Responsiveness, Advocacy, Diversity Equity and Inclusion Initiatives, Student Engagement, Parent Communication, Social Justice, Curriculum Planning, Empathy, Community Outreach, Rapport Building, Relationship Building
- Status: New
University of Maryland, College Park
Skills you'll gain: Cyber Risk, Risk Management, Cybersecurity, Cyber Attacks, Threat Modeling, Cyber Security Assessment, Risk Analysis, Technical Communication, Stakeholder Communications, Communication Strategies
- Status: Preview
University of Colorado Boulder
Skills you'll gain: Internet Of Things, Real-Time Operating Systems, Wireless Networks, General Networking, Cybersecurity, Cryptography, Infrastructure Security, Network Security, Network Protocols, Threat Modeling, Software-Defined Networking, Emerging Technologies, Encryption, Cloud Platforms, Digital Transformation
- Status: Preview
Erasmus University Rotterdam
Skills you'll gain: Cyber Governance, Legal Research, Law, Regulation, and Compliance, Data Governance, Data Ethics, Court Systems, Governance, Political Sciences, Regulation and Legal Compliance, Information Privacy, E-Commerce, Public Administration, Market Dynamics, Artificial Intelligence, Decision Making
- Status: New
Skills you'll gain: Authentications, Data Security, Key Management, Software Installation, Cloud Security, Encryption, Application Security, Authorization (Computing), Role-Based Access Control (RBAC), Identity and Access Management, YAML, Cyber Security Policies, Data Architecture, System Configuration, Multi-Factor Authentication, Systems Architecture, Application Programming Interface (API), JSON, Command-Line Interface
In summary, here are 10 of our most popular cyber threat hunting courses
- Securing Google Cloud with CFT Scorecard: Google Cloud
- Bending the Curve: Climate Change Solutions: University of California San Diego
- Architecting AI Solutions – Scalable GenAI Systems: Packt
- Writing Secure Code in ASP.NET: Packt
- Advanced Network Analysis and Incident Response: Johns Hopkins University
- AWS: Security and Key Management: Whizlabs
- SQL for Security Specialist: Codio
- Teaching for Justice and Inclusivity In Challenging Times: University of Colorado Boulder
- Cybersecurity Risk Management Across Critical Systems: University of Maryland, College Park
- 산업용 IoT 시장 및 보안: University of Colorado Boulder