Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: NewStatus: Free Trial
Skills you'll gain: Data Integrity, Data Management, Cloud Storage, Data Loss Prevention, Data Encryption Standard, Key Management, Identity and Access Management
- Status: NewStatus: Free Trial
Skills you'll gain: Application Security, Software Development Life Cycle, Software Development Methodologies, Application Programming Interface (API), Risk Management Framework, Secure Coding, Web Applications, Threat Modeling, Software Testing, Agile Methodology, Vulnerability Assessments, Database Systems
- Status: NewStatus: Free Trial
Skills you'll gain: Computer Security Incident Management, Threat Modeling, Security Management, Risk Management, Business Continuity, Governance, Disaster Recovery, Contingency Planning, Governance Risk Management and Compliance, Continuous Monitoring, Program Management, Security Controls, Ethical Standards And Conduct, Enterprise Security, Cybersecurity, Cloud Computing, IT Management, Information Assurance, Test Planning, Malware Protection
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Generative AI, Threat Detection, Anomaly Detection, Malware Protection, Feature Engineering, Cybersecurity, Authentications, Network Security, Artificial Intelligence, Jupyter, Data Processing, Threat Modeling, Network Analysis, Email Security, Applied Machine Learning, Natural Language Processing, Deep Learning, Machine Learning, Computer Vision, Security Testing
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cybersecurity, Vulnerability Management, Cyber Security Policies, Cyber Security Strategy, Network Security, Security Awareness, Vulnerability Assessments, Threat Management, Threat Detection, Security Controls, Intrusion Detection and Prevention, Firewall, Authorization (Computing), Virtual Private Networks (VPN)
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Risk Management Framework, Risk Management, Risk Appetite, Security Management, Cyber Governance, Threat Management, Cybersecurity, Cyber Attacks, Vulnerability Assessments, ISO/IEC 27001, Vulnerability Management, Enterprise Risk Management (ERM), Operational Risk, Risk Analysis, Business Risk Management, Cyber Risk, Governance Risk Management and Compliance, Risk Mitigation, Cyber Threat Intelligence, Cost Benefit Analysis
- Status: Free Trial
Skills you'll gain: NIST 800-53, Risk Management Framework, Cyber Risk, Cybersecurity, Cyber Security Policies, Systems Development Life Cycle, Security Management, Cyber Security Strategy, Threat Management, Cyber Security Assessment, Cyber Governance, Continuous Monitoring, Security Controls, Authorization (Computing), Vulnerability Assessments, Security Requirements Analysis, Technical Communication, Information Privacy, Information Systems Security, Data Security
- Status: Free Trial
Cisco Learning and Certifications
Skills you'll gain: Cyber Threat Hunting, MITRE ATT&CK Framework, Incident Response, Windows PowerShell, Linux, Cyber Threat Intelligence, Endpoint Security, Cryptography, Computer Security Incident Management, File Systems, Microsoft Windows, Network Security, Malware Protection, Threat Detection, Network Monitoring, Incident Management, Data Security, Cybersecurity, Security Information and Event Management (SIEM), Cyber Operations
- Status: Free Trial
Duke University
Skills you'll gain: Lending and Underwriting, Blockchain, Loans, FinTech, Payment Systems, Operational Risk, Cyber Risk, Regulatory Compliance, Financial Regulation, Scalability, Financial Systems, Risk Management, Derivatives, Cryptographic Protocols, Cryptography, Market Liquidity, Risk Analysis, Finance, Entrepreneurial Finance, Entrepreneurship
- Status: Free Trial
University of Colorado System
Skills you'll gain: TCP/IP, Routing Protocols, Digital Communications, Local Area Networks, Network Protocols, OSI Models, Network Security, Network Architecture, Open Shortest Path First (OSPF), Network Routing, Network Planning And Design, Network Infrastructure, General Networking, Computer Networking, Network Performance Management, Wireless Networks, Telecommunications, Software-Defined Networking, Application Programming Interface (API), Mobile Security
- Status: Free Trial
Skills you'll gain: Generative AI, Incident Response, Data Ethics, Endpoint Detection and Response, Security Information and Event Management (SIEM), Cyber Threat Hunting, Cyber Security Assessment, Cybersecurity, Computer Security Incident Management, Threat Management, Threat Detection, Prompt Engineering, Malware Protection, Vulnerability Management, Artificial Intelligence
- Status: Free Trial
Microsoft
Skills you'll gain: Penetration Testing, Vulnerability Management, Threat Modeling, Vulnerability Assessments, Security Testing, Intrusion Detection and Prevention, Threat Detection, Cyber Security Assessment, Cybersecurity, Microsoft Azure, Network Security, Cloud Security, Cyber Threat Intelligence, Firewall, Incident Response, Virtual Private Networks (VPN), System Testing
In summary, here are 10 of our most popular cyber threat hunting courses
- Certified Cloud Security Professional (CCSP): Unit 2:Â Pearson
- CISSP Domain 8: Software development security:Â Infosec
- The Pearson Complete Course for CISM Certification:Â Pearson
- AI for Cybersecurity:Â Johns Hopkins University
- The Foundations of Cybersecurity:Â Kennesaw State University
- Cybersecurity Risk Management Frameworks:Â Kennesaw State University
- Cybersecurity Risk Management Framework:Â Infosec
- Cybersecurity Operations Fundamentals:Â Cisco Learning and Certifications
- Decentralized Finance (DeFi): The Future of Finance:Â Duke University
- Computer Communications:Â University of Colorado System