Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: NewStatus: Free Trial
Skills you'll gain: Security Testing, Cyber Security Assessment, Penetration Testing, Application Security, Continuous Monitoring, Vulnerability Assessments, Vulnerability Scanning, Intrusion Detection and Prevention, Security Controls, Software Testing, Test Tools, Risk Management Framework
- Status: NewStatus: Free Trial
Skills you'll gain: Application Security, Software Development Life Cycle, Software Development Methodologies, Application Programming Interface (API), Risk Management Framework, Secure Coding, Web Applications, Threat Modeling, Software Testing, Agile Methodology, Vulnerability Assessments, Database Systems
- Status: NewStatus: Free Trial
Skills you'll gain: Data Security, Personally Identifiable Information, Threat Management, Data Governance, Data Loss Prevention, Information Management, Security Controls, Data Storage Technologies, Identity and Access Management
- Status: NewStatus: Free Trial
Skills you'll gain: Computer Security Incident Management, Threat Modeling, Security Management, Risk Management, Business Continuity, Governance, Disaster Recovery, Contingency Planning, Governance Risk Management and Compliance, Continuous Monitoring, Program Management, Security Controls, Ethical Standards And Conduct, Enterprise Security, Cybersecurity, Cloud Computing, IT Management, Information Assurance, Test Planning, Malware Protection
- Status: NewStatus: Preview
Coursera Instructor Network
Skills you'll gain: Project Risk Management, Risk Management, Agile Methodology, Performance Metric, Process Development, Ethical Standards And Conduct
- Status: NewStatus: Free Trial
Skills you'll gain: OSI Models, Network Security, TCP/IP, Network Protocols, Distributed Denial-Of-Service (DDoS) Attacks, General Networking, Wireless Networks, Threat Modeling, Network Model
- Status: NewStatus: Preview
Board Infinity
Skills you'll gain: DevSecOps, DevOps, Application Security, Continuous Integration, CI/CD, Continuous Delivery, Containerization, Security Testing, Security Strategy, Security Controls, Security Awareness, Automation, Threat Detection, Collaborative Software, Incident Response
- Status: New
Google Cloud
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Large Language Modeling, Application Security, Secure Coding, Security Controls, Prompt Engineering, Google Cloud Platform, Systems Architecture, Application Programming Interface (API)
- Status: NewStatus: Free Trial
Skills you'll gain: Data Integrity, Data Management, Cloud Storage, Data Loss Prevention, Data Encryption Standard, Key Management, Identity and Access Management
- Status: NewStatus: Free Trial
Skills you'll gain: Malware Protection, Cybersecurity, Intrusion Detection and Prevention, Network Security, Event Monitoring, Threat Detection, Data Integrity, Web Applications, Microsoft Windows, Email Security, Mac OS, Encryption, Linux, File Systems
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Generative AI, Threat Detection, Anomaly Detection, Malware Protection, Feature Engineering, Cybersecurity, Authentications, Network Security, Artificial Intelligence, Jupyter, Data Processing, Threat Modeling, Network Analysis, Email Security, Applied Machine Learning, Natural Language Processing, Deep Learning, Machine Learning, Computer Vision, Security Testing
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Risk Management Framework, Risk Management, Risk Appetite, Security Management, Cyber Governance, Threat Management, Cybersecurity, Cyber Attacks, Vulnerability Assessments, ISO/IEC 27001, Vulnerability Management, Enterprise Risk Management (ERM), Operational Risk, Risk Analysis, Business Risk Management, Cyber Risk, Governance Risk Management and Compliance, Risk Mitigation, Cyber Threat Intelligence, Cost Benefit Analysis
In summary, here are 10 of our most popular cyber threat hunting courses
- CISSP Domain 6: Security Assessment and Testing:Â Infosec
- CISSP Domain 8: Software development security:Â Infosec
- CISSP Domain 2: Asset Security:Â Infosec
- The Pearson Complete Course for CISM Certification:Â Pearson
- Cybersecurity & Data Privacy for Technical Product Managers:Â Coursera Instructor Network
- (SSCP) Systems Security Certified Practitioner: Unit 5:Â Pearson
- Advanced Git Features:Â Board Infinity
- Model Armor: Securing AI Deployments:Â Google Cloud
- Certified Cloud Security Professional (CCSP): Unit 2:Â Pearson
- Digital Forensics Essentials: Hands-On Edition:Â EC-Council