Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
Google Cloud
Skills you'll gain: Cloud API, Application Programming Interface (API), Google Cloud Platform, Cloud Security, Load Balancing, Threat Management, Threat Detection
- Status: New
Skills you'll gain: Open Web Application Security Project (OWASP), API Design, Application Programming Interface (API), Application Security, Secure Coding, Security Testing, Threat Modeling, DevSecOps, OAuth, Cloud API, Restful API, Security Controls, Vulnerability Assessments, Authorization (Computing), Security Engineering, Cryptography, Authentications, Server Side, Encryption, Incident Response
- Status: New
Macquarie University
Skills you'll gain: Authentications, Identity and Access Management, Single Sign-On (SSO), Security Assertion Markup Language (SAML), Multi-Factor Authentication, User Provisioning, OAuth, Threat Modeling, Authorization (Computing), IT Security Architecture, Zero Trust Network Access, Systems Architecture, Role-Based Access Control (RBAC), Vulnerability Assessments, Cryptography
Google Cloud
Skills you'll gain: Cloud Security, Threat Detection, Security Information and Event Management (SIEM), Configuration Management, Google Cloud Platform, Security Management, Vulnerability Scanning, Continuous Monitoring, Vulnerability Management
- Status: NewStatus: Free Trial
Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Multi-Factor Authentication, Network Security, Information Systems Security, Patch Management, Network Monitoring, Data Security, Malware Protection, Mobile Security, Authorization (Computing), Identity and Access Management
- Status: NewStatus: Free Trial
Skills you'll gain: Network Security, Endpoint Security, Hardening, Virtual Private Networks (VPN), Firewall, Cloud Security, Cybersecurity, Infrastructure Security, Role-Based Access Control (RBAC), Cloud Computing, Authorization (Computing), Identity and Access Management, Email Security, Network Infrastructure, Network Protocols, Authentications, System Configuration
- Status: NewStatus: Free Trial
Skills you'll gain: Risk Analysis, Risk Management, Incident Response, Business Continuity Planning, Security Management, Threat Modeling, Threat Management, Disaster Recovery, Vulnerability Assessments, Cyber Risk, Cyber Threat Intelligence, Continuous Monitoring, Cybersecurity, Security Strategy, General Data Protection Regulation (GDPR)
- Status: New
Skills you'll gain: MITRE ATT&CK Framework, Generative AI, Cyber Threat Intelligence, Cyber Security Strategy, Cybersecurity, Threat Modeling, Computer Security, Cyber Attacks, Threat Detection, Artificial Intelligence, Anomaly Detection, Data Ethics, Information Privacy, Innovation
Skills you'll gain: Cloud Security, Threat Detection, Google Cloud Platform, Threat Management, Intrusion Detection and Prevention, Network Security, Firewall, Security Information and Event Management (SIEM), Incident Response, Endpoint Security
Coursera Instructor Network
Skills you'll gain: Cloud Security, Oracle Cloud, Identity and Access Management, Encryption, Infrastructure Security, Network Security, Data Security, Continuous Monitoring, Security Controls, Cloud Computing, Cloud Infrastructure, Security Strategy, Threat Detection, Data Encryption Standard, Authorization (Computing), Authentications
Skills you'll gain: Google Cloud Platform, Intrusion Detection and Prevention, Network Monitoring, Virtual Machines, Security Information and Event Management (SIEM), Cloud Infrastructure, General Networking, Threat Detection, Network Infrastructure, Load Balancing, System Configuration
- Status: New
Coursera Instructor Network
Skills you'll gain: Prompt Engineering, Risk Modeling, Risk Analysis, Continuous Monitoring, Generative AI, Project Risk Management, Risk Management Framework, Risk Management, Operational Risk, Data-Driven Decision-Making, Business Risk Management, Data Integration, Anomaly Detection, Artificial Intelligence, Threat Detection, Automation
In summary, here are 10 of our most popular cyber threat hunting courses
- Protecting APIs with Apigee X and Cloud Armor:Â Google Cloud
- A Detailed Guide to the OWASP Top 10:Â Packt
- Identity Access Management (IAM) and Secure Authentication:Â Macquarie University
- Security Command Center Fundamentals:Â Google Cloud
- Comprehensive Cisco Security Techniques and Automation:Â Packt
- Advanced Network Security and Endpoint Strategies:Â Packt
- Risk Management and Incident Response:Â Packt
- Generative AI and its Impact on Cybersecurity:Â Packt
- Enhanced Network Security Approach on Google Cloud:Â Google Cloud
- Demystifying Oracle Cloud Infrastructure (OCI) Security:Â Coursera Instructor Network