Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
Institut Mines-Télécom
Skills you'll gain: Threat Modeling, Threat Detection, Security Requirements Analysis, Cybersecurity, Cyber Attacks, Application Security, Network Security, Security Testing, Vulnerability Assessments, Secure Coding, SQL
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Email Security, Mobile Security, Network Security, Open Web Application Security Project (OWASP), Network Monitoring, Threat Detection, Network Analysis, TCP/IP, Network Protocols, Cybersecurity, Application Security, Splunk, Information Privacy
- Status: New
Skills you'll gain: MITRE ATT&CK Framework, Endpoint Security, Cyber Threat Hunting, Cyber Threat Intelligence, Endpoint Detection and Response, Cloud Security, Threat Detection, Cyber Operations, Threat Management, Microsoft Copilot, Malware Protection, Security Information and Event Management (SIEM), Microsoft Azure, Vulnerability Management, Cloud Computing, Incident Response, Computer Security Incident Management, Azure Active Directory, Hybrid Cloud Computing, Incident Management
Skills you'll gain: Penetration Testing, Threat Modeling, Secure Coding, Web Development, Web Applications, Full-Stack Web Development, Security Testing, Vulnerability Assessments, Application Security, Angular, Ajax, Javascript
- Status: NewStatus: Free Trial
Skills you'll gain: Endpoint Security, Vulnerability Management, Infrastructure as Code (IaC), Cloud Computing Architecture, Cloud Security, Cyber Threat Intelligence, Vulnerability Assessments, Cloud Computing, Zero Trust Network Access, Cybersecurity, Network Security, Cyber Security Assessment, Threat Detection, Mobile Security, Hardening, Security Controls, Disaster Recovery, Authentications
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Large Language Modeling, Network Security, Cybersecurity, Infrastructure Security, Information Systems Security, Intrusion Detection and Prevention, Threat Modeling, Firewall, Governance, Network Protocols, Data Ethics, Artificial Intelligence
Coursera Project Network
Skills you'll gain: Competitive Analysis, Business Strategy, Strategic Thinking, Market Analysis, Market Dynamics, Market Opportunities, New Business Development, Supplier Management, Company, Product, and Service Knowledge, Consumer Behaviour
- Status: NewStatus: Free Trial
Skills you'll gain: Computer Security Incident Management, Incident Response, Incident Management, Vulnerability Management, Risk Management Framework, Security Management, Threat Management, Disaster Recovery, Vulnerability Assessments, Information Assurance, Cyber Security Policies, Computer Security Awareness Training, Continuous Monitoring, Security Controls, Technical Communication
- Status: Free Trial
Google Cloud
Skills you'll gain: Google Cloud Platform, Cloud Computing, Cloud Security, Generative AI, Vulnerability Assessments, Security Controls, Security Engineering, Threat Detection, System Configuration
Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, Application Security, Software Development Life Cycle, DevSecOps, Security Testing, Secure Coding, Security Software, Security Engineering, Cloud Security, Encryption, Vulnerability Scanning, Software Development, Threat Detection, Cryptography, Engineering Software, Software Testing, CI/CD, Cloud Platforms, Vulnerability Assessments
Skills you'll gain: Security Testing, Penetration Testing, Open Web Application Security Project (OWASP), Cyber Security Assessment, Vulnerability Scanning, Application Security, Vulnerability Assessments, Test Tools, Web Development Tools, Web Applications, SQL
- Status: NewStatus: Free Trial
Skills you'll gain: Email Security, Cloud Security, Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Incident Management, Vulnerability Management, Risk Management Framework, Malware Protection, Security Management, Threat Management, Application Security, Cloud Computing, Cybersecurity, Cyber Attacks, Network Security, Disaster Recovery, Cyber Threat Intelligence, Vulnerability Assessments, Threat Detection
In summary, here are 10 of our most popular cyber threat hunting courses
- Cybersécurité : comment sécuriser un site web: Institut Mines-Télécom
- Advanced Network Security and Analysis: Johns Hopkins University
- Exam Prep SC-200: Microsoft Security Operations Analyst: Whizlabs
- Web Hacking Expert - Full-Stack Exploitation Mastery: Packt
- Cloud Security, Resiliency, and Vulnerability Management: Packt
- Artificial Intelligence Industrial Control Systems Security: Johns Hopkins University
- Using Porter’s Five Forces Model for Competitive Analysis : Coursera Project Network
- Foundations of Information Security and Incident Handling: Packt
- Gemini for Security Engineers: Google Cloud
- Fundamentals of Secure Software: Packt