Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
University of Maryland, College Park
Skills you'll gain: Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Application Specific Integrated Circuits, Cryptography, Encryption, Emerging Technologies, Authentications, System Design and Implementation, Computational Logic
- Status: Free Trial
University of California, Irvine
Skills you'll gain: Security Strategy, Cyber Governance, Security Management, Cyber Risk, Compliance Management, Risk Management, Regulatory Compliance, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Data Governance, Program Standards, Computer Security
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Security Strategy, Cybersecurity, Mobile Security, Cyber Threat Intelligence, Network Security, Internet Of Things, Data Security, Emerging Technologies, Technology Strategies, Business, Enterprise Application Management
- Status: Free Trial
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Cyber Operations, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Network Security, Network Monitoring, Data Security, Network Analysis, Malware Protection, Vulnerability Assessments
- Status: Free Trial
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Security Awareness, Cyber Attacks, Network Security, Vulnerability Assessments, Cloud Services, Data Security, Human Factors (Security)
Coursera Project Network
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Cyber Security Assessment, Vulnerability Management, Security Testing, Network Security, Threat Detection, Operating Systems, Technical Services
- Status: Free Trial
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Computer Security Incident Management, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Malware Protection, Endpoint Security, Network Security, Firewall
Universiteit Leiden
Skills you'll gain: Risk Management Framework, Safety and Security, Security Management, Threat Management, Public Safety and National Security, Cybersecurity, Incident Management, International Relations, Environmental Issue, Governance
- Status: Free Trial
University of Colorado System
Skills you'll gain: TCP/IP, Local Area Networks, Routing Protocols, Network Routing, Digital Communications, OSI Models, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Network Planning And Design, Network Security, Network Architecture, Network Performance Management, Computer Networking, Network Model, Network Infrastructure, Wireless Networks, Telecommunications, Software-Defined Networking, Algorithms, System Programming
- Status: Free Trial
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Threat Management, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Threat Detection, Event Monitoring, Business Continuity, System Monitoring, Verification And Validation, Technical Communication
- Status: Free Trial
Skills you'll gain: Incident Response, Stakeholder Communications, Cyber Threat Intelligence, Cybersecurity, Incident Management, Security Awareness, Data Ethics, Security Information and Event Management (SIEM), Stakeholder Engagement, Data Security, Asset Protection, Information Privacy, Communication, Artificial Intelligence, Professional Networking
- Status: Free Trial
Skills you'll gain: MITRE ATT&CK Framework, Cybersecurity, Cyber Threat Intelligence, Cyber Operations, Network Security, IT Automation, Scripting, Python Programming
In summary, here are 10 of our most popular cyber threat hunting courses
- Hardware Security:Â University of Maryland, College Park
- Security Governance & Compliance:Â University of California, Irvine
- Cybersecurity and Mobility:Â Kennesaw State University
- Technical Deep Dive with Incident Response Tools:Â Infosec
- Cyber Threats and Attack Vectors:Â University of Colorado System
- Vulnerability Scanning with Nmap: Network Scanning:Â Coursera Project Network
- Detecting and Mitigating Cyber Threats and Attacks:Â University of Colorado System
- Security & Safety Challenges in a Globalized World:Â Universiteit Leiden
- Computer Communications:Â University of Colorado System
- Stages of Incident Response:Â Infosec