Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
Skills you'll gain: Interviewing Skills, Data Analysis, Data Processing, Analytical Skills, Artificial Intelligence, R Programming, Data-Driven Decision-Making, Data Storytelling, Project Documentation, Presentations, Portfolio Management
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Threat Management, Cybersecurity, Cyber Security Strategy, Cyber Security Assessment, Application Security, Threat Detection, Security Strategy, Microsoft Azure, Cloud Security, Internet Of Things, Secure Coding, Network Security, Security Controls, Data Security, Vulnerability Assessments, Identity and Access Management
Skills you'll gain: Incident Response, Security Controls, Cryptography, Malware Protection, Key Management, Vulnerability Assessments, Risk Management, Continuous Monitoring, Public Key Infrastructure, Endpoint Security, Disaster Recovery, Computer Security Incident Management, OSI Models, Network Security, Encryption, Authentications, Mobile Security, Operational Risk, Security Awareness, Authorization (Computing)
Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Incident Response, Cyber Threat Hunting, Key Management, Data Security, Threat Modeling, Computer Security Incident Management, File Systems, Threat Detection, Endpoint Security, Cryptography, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Linux, Malware Protection, Encryption, Cyber Threat Intelligence, Incident Management, Information Systems Security, Threat Management
Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Cyber Risk, Cyber Governance, NIST 800-53, Regulatory Compliance, Auditing, Cybersecurity, Cyber Security Policies, Compliance Management, ISO/IEC 27001, Control Objectives for Information and Related Technology (COBIT), Security Controls, Artificial Intelligence, Open Web Application Security Project (OWASP), Risk Management, Payment Card Industry (PCI) Data Security Standards, General Data Protection Regulation (GDPR), Business Ethics
- Status: AI skills
Google Cloud
Skills you'll gain: Cloud Security, Identity and Access Management, Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Threat Management, Cyber Threat Hunting, Risk Management Framework, Cyber Operations, Vulnerability Management, Continuous Monitoring, Event Monitoring, Disaster Recovery, Incident Management, Generative AI, DevSecOps, Cloud Computing, Data Security, Google Cloud Platform, Cybersecurity
Microsoft
Skills you'll gain: Penetration Testing, Security Testing, System Testing, Vulnerability Management, Cloud Security, Cybersecurity, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Microsoft Azure, Firewall, Virtual Private Networks (VPN)
- Status: Free
University of Maryland, College Park
Skills you'll gain: Cyber Risk, Cyber Security Policies, Security Management, Cybersecurity, Risk Management, Cyber Security Strategy, Cyber Attacks, Cyber Governance, Computer Security Awareness Training, Threat Detection, General Networking, Vulnerability
Google Cloud
Skills you'll gain: Google Cloud Platform, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Kubernetes, Cloud Security, Containerization, OAuth, Cloud Storage, Cloud Applications, Cloud Services, Application Deployment, Virtual Machines, Security Controls, Cloud Computing, Threat Management, Generative AI, Application Security, Virtual Private Networks (VPN)
University of Virginia
Skills you'll gain: Design Thinking, Digital Transformation, Creative Problem-Solving, New Product Development, Ideation, Business Transformation, Product Management, Technology Strategies, Agile Product Development, Innovation, Creativity, Product Lifecycle Management, Strategic Thinking, Product Improvement, Market Opportunities, Information Technology, Competitive Analysis, Business Analysis, Business Strategy, Cyber Risk
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Record Keeping, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
Skills you'll gain: Cybersecurity, Technical Support and Services, Information Technology, Network Security, Cyber Security Strategy, Computer Security Awareness Training, Application Security, Security Management
In summary, here are 10 of our most popular cyber threat hunting courses
- Google Data Analytics Capstone: Complete a Case Study:Â Google
- Advanced Cybersecurity Concepts and Capstone Project:Â Microsoft
- ISC2 Systems Security Certified Practitioner (SSCP):Â ISC2
- Cybersecurity Operations Fundamentals:Â Cisco Learning and Certifications
- Cybersecurity Compliance Framework, Standards & Regulations:Â IBM
- Google Cloud Cybersecurity:Â Google Cloud
- Cybersecurity Tools and Technologies:Â Microsoft
- Cybersecurity for Everyone:Â University of Maryland, College Park
- Security in Google Cloud:Â Google Cloud
- Leading the Modern Day Business:Â University of Virginia