Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
Infosec
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Detection, Threat Modeling, Endpoint Detection and Response, Distributed Denial-Of-Service (DDoS) Attacks, Generative AI, Security Information and Event Management (SIEM), Anomaly Detection, Event Monitoring, System Monitoring, Network Analysis, Linux
- Status: Free Trial
Skills you'll gain: Cyber Threat Intelligence, Penetration Testing, Cyber Threat Hunting, Vulnerability Management, Threat Modeling, Cybersecurity, Threat Detection, Cryptography, Security Testing, Vulnerability Assessments, Application Security, MITRE ATT&CK Framework, Encryption, Open Web Application Security Project (OWASP), Network Analysis
- Status: Free TrialStatus: AI skills
Google
Skills you'll gain: Threat Modeling, Intrusion Detection and Prevention, Network Security, Open Web Application Security Project (OWASP), Event Monitoring, Security Controls, Threat Management, Computer Security Incident Management, Security Awareness, Threat Detection, Incident Response, Vulnerability Management, Cyber Attacks, Cybersecurity, Debugging, Relational Databases, Linux, Interviewing Skills, Python Programming, SQL
- Status: Free Trial
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Intrusion Detection and Prevention, Cybersecurity, Security Management, Threat Detection, Security Information and Event Management (SIEM), Cyber Attacks, Cyber Threat Hunting, Event Monitoring, Data Analysis Software, Technical Communication, Data Integrity, Technical Documentation
- Status: Free Trial
New York University
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Threat Modeling, Cyber Attacks, Cybersecurity, Malware Protection, Cyber Risk, Unix, Computer Security, Information Systems Security, Cryptography
- Status: Preview
The State University of New York
Skills you'll gain: Cyber Threat Intelligence, Cyber Attacks, Incident Response, Cyber Operations, Cybersecurity, Cyber Governance, International Relations, Security Management, Cyber Security Assessment, Conflict Management, Network Infrastructure, Governance, Psychology
What brings you to Coursera today?
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Cyber Governance, Threat Modeling, Cyber Security Strategy, Incident Response, Threat Management, Risk Management, Cyber Threat Intelligence, Cyber Risk, Cybersecurity, Cyber Attacks, Cyber Security Policies, Leadership and Management, Governance, Leadership, Threat Detection, Cyber Security Assessment, Compliance Management, ISO/IEC 27001, Resilience, NIST 800-53
- Status: Free Trial
Multiple educators
Skills you'll gain: Security Controls, Network Security, Incident Response, Penetration Testing, Software Development Life Cycle, Computer Security Incident Management, Information Assurance, Cloud Computing Architecture, Computing Platforms, Microsoft Windows, Cyber Governance, Cloud Computing, Encryption, Data Security, Authorization (Computing), Data Storage, Application Security, Cybersecurity, Information Technology, Cryptography
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Cyber Governance, Cyber Security Strategy, Cyber Security Policies, Cyber Risk, Regulatory Compliance, Security Strategy, Compliance Management, Cyber Security Assessment, ISO/IEC 27001, Cybersecurity, Regulation and Legal Compliance, Enterprise Security, Governance, NIST 800-53, Threat Modeling, Risk Management, Risk Mitigation, Risk Analysis, Audit Planning, Policy Analysis
- Status: NewStatus: Free Trial
Skills you'll gain: Intellectual Property, IT Security Architecture, Security Testing, Identity and Access Management, Threat Modeling, Computer Security Incident Management, Network Security, Application Security, Data Security, Information Systems Security, Cryptography, Asset Protection, Cloud Security, Cryptographic Protocols, Incident Response, Contingency Planning, Risk Management Framework, Digital Assets, Public Key Cryptography Standards (PKCS), Risk Management
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Intrusion Detection and Prevention, Anomaly Detection, Threat Detection, Cyber Security Strategy, Cyber Threat Intelligence, Artificial Intelligence and Machine Learning (AI/ML), Cybersecurity, Threat Modeling, Applied Machine Learning, Malware Protection, MLOps (Machine Learning Operations), Network Security, Machine Learning Methods, Machine Learning, Artificial Intelligence, Network Analysis, Machine Learning Algorithms, Data-Driven Decision-Making
- Status: NewStatus: Free Trial
Skills you'll gain: Data Security, Personally Identifiable Information, Threat Management, Data Governance, Data Loss Prevention, Information Management, Security Controls, Data Storage Technologies, Identity and Access Management
In summary, here are 10 of our most popular cyber threat hunting courses
- Cyber Threat Hunting:Â Infosec
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM
- Google Cybersecurity:Â Google
- Incident Response and Digital Forensics:Â IBM
- Introduction to Cyber Attacks:Â New York University
- International Cyber Conflicts:Â The State University of New York
- Cyber Security Management and Leadership:Â Macquarie University
- IBM and ISC2 Cybersecurity Specialist:Â IBM
- Cyber Strategy, Planning & Compliance:Â Macquarie University
- Certified Information Systems Security Professional (CISSP):Â Infosec