Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: NewStatus: Free Trial
Duke University
Skills you'll gain: Health Disparities, Health Equity, Public Health and Disease Prevention, Health Systems, Public Health, Health Care, Community Health, Healthcare Industry Knowledge, Environmental Issue, Environment Health And Safety, Patient Education And Counseling, Emergency Response, Environmental Science, Advocacy, Leadership Development
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: Cloud Security, DevSecOps, Serverless Computing, Cloud Applications, Threat Management, Containerization, Security Controls, Application Deployment, Application Programming Interface (API)
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, OSI Models, TCP/IP, Network Protocols, Cybersecurity, Open Web Application Security Project (OWASP), Vulnerability Scanning, Cyber Threat Intelligence, Cyber Attacks, Large Language Modeling, Vulnerability Assessments, Prompt Engineering, Scripting, Python Programming, SQL
- Status: Free Trial
Skills you'll gain: Encryption, Internet Of Things, Application Security, Hardware Architecture, Security Engineering, Security Strategy, Endpoint Security, Information Systems Security, Data Security, Network Security, Threat Modeling, Cybersecurity, Vulnerability Assessments, Security Requirements Analysis, Vulnerability Management, Information Privacy, General Data Protection Regulation (GDPR), Authentications, Authorization (Computing)
Skills you'll gain: Network Security, Vulnerability Assessments, Cyber Security Assessment, Cybersecurity, Software Installation, System Configuration, Microsoft Windows, Web Applications, Linux, Configuration Management
- Status: Free Trial
Skills you'll gain: Amazon Elastic Compute Cloud, Amazon DynamoDB, AWS Identity and Access Management (IAM), Amazon Web Services, Firewall, Amazon CloudWatch, Cyber Security Policies, Scalability, Continuous Deployment, Infrastructure As A Service (IaaS), Cloud Security, Security Controls, Network Troubleshooting, Network Security, Virtual Private Networks (VPN), Disaster Recovery
- Status: Free Trial
Board Infinity
Skills you'll gain: Risk Management Framework, Incident Response, Risk Management, Security Management, Cyber Risk, Computer Security Incident Management, Operational Risk, Cyber Threat Intelligence, Governance Risk Management and Compliance, Cybersecurity, Control Objectives for Information and Related Technology (COBIT), Security Information and Event Management (SIEM), ISO/IEC 27001, Performance Metric, Threat Detection, Security Controls, Cloud Security, Key Performance Indicators (KPIs)
- Status: Preview
University of Copenhagen
Skills you'll gain: Political Sciences, Environmental Policy, Environmental Issue, International Relations, Policy Analysis, Lobbying, Public Affairs, Social Justice, Community Organizing, Diplomacy, Governance, Environmental Laws, Advocacy
Skills you'll gain: Incident Response, Email Security, Computer Security Incident Management, Cyber Operations, Threat Detection, Security Information and Event Management (SIEM), IT Automation, Google Cloud Platform
- Status: Free Trial
University of Michigan
Skills you'll gain: Debugging, Unit Testing, Test Case, Integrated Development Environments, Computer Programming, Development Testing, Data Import/Export, File Management
- Status: Free Trial
Google Cloud
Skills you'll gain: Email Security, Data Loss Prevention, Security Management, Google Workspace, Malware Protection, Threat Management, Security Controls, Content Management
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: DevSecOps, Infrastructure as Code (IaC), Azure DevOps, Secure Coding, DevOps, Security Engineering, Infrastructure Security, Kubernetes, Cybersecurity, API Design, Software Design, Containerization, Machine Learning, Software Architecture, Role-Based Access Control (RBAC), Software Engineering, Git (Version Control System)
In summary, here are 10 of our most popular cyber threat hunting courses
- Climate and Health for Healthcare Professions:Â Duke University
- Check Point Jump Start - CloudGuard Workload Protection:Â Check Point Software Technologies Ltd.
- Advanced Web Exploits, Python Scripting & Network Attacks:Â Packt
- Implementing Security in IoT and Edge Devices:Â LearnQuest
- Nessus Scanner - Network Scanning from Beginner to Advanced:Â Packt
- AWS: Resilient Solutions and Security Controls:Â Whizlabs
- Advanced Cybersecurity Risk Management:Â Board Infinity
- Making Democracy Fit for Climate:Â University of Copenhagen
- Automating Response to Phishing with Cortex XSOAR:Â Google Cloud
- Debugging: Hunting and Squashing Bugs:Â University of Michigan