Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Patient Safety, Stakeholder Engagement, Change Management, Organizational Change, Conflict Management, Systems Thinking, Solution Design, Health Systems, Data Analysis, Corrective and Preventive Action (CAPA), Risk Analysis, Data Presentation, Safety Assurance, Nursing Management, Continuous Quality Improvement (CQI), Data Visualization Software, Risk Management, Patient Flow, Safety Training, Collaboration
University of Maryland, College Park
Skills you'll gain: Cyber Risk, Cyber Security Policies, Security Management, Cybersecurity, Risk Management, Cyber Security Strategy, Cyber Attacks, Cyber Governance, Infrastructure Security, Telecommunications, Computer Security Awareness Training, Threat Detection, Enterprise Security, Security Awareness, General Networking, Data Security, Vulnerability, Public Safety and National Security, Governance, Political Sciences
- Status: Free Trial
LearnKartS
Skills you'll gain: Cloud Security, Penetration Testing, Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Malware Protection, Cybersecurity, Threat Modeling, Cloud Computing, Mobile Security, Cyber Security Assessment, Cyber Attacks, Security Testing, Cloud Services, Threat Detection, Cloud Infrastructure, Information Systems Security, Intrusion Detection and Prevention, Cyber Threat Intelligence, Firewall, Incident Response
- Status: Free Trial
Skills you'll gain: IT Service Management, Information Technology Infrastructure Library, Cyber Risk, Data Ethics, Cyber Governance, NIST 800-53, Information Technology, Cybersecurity, ISO/IEC 27001, Security Management, Control Objectives for Information and Related Technology (COBIT), Artificial Intelligence, Risk Management Framework, Open Web Application Security Project (OWASP), Payment Card Industry (PCI) Data Security Standards, General Data Protection Regulation (GDPR)
- Status: Free Trial
Multiple educators
Skills you'll gain: Network Security, Incident Response, Cloud Computing Architecture, Penetration Testing, Computer Security Incident Management, Cloud Services, Business Continuity, Security Controls, Disaster Recovery, Peripheral Devices, Cybersecurity, Configuration Management, Computing Platforms, Cloud Security, Cloud Platforms, Network Protocols, Encryption, Cyber Attacks, Cloud Computing, Software Development Life Cycle
- Status: Free Trial
Duke University
Skills you'll gain: Blockchain, Loans, FinTech, Lending and Underwriting, Cyber Risk, Operational Risk, Scalability, Security Testing, Regulatory Compliance, Interoperability, Commercial Lending, Payment Systems, General Lending, Risk Management, Derivatives, Key Management, Cryptography, Emerging Technologies, Financial Regulations, Digital Assets
- Status: NewStatus: Free Trial
Vanderbilt University
Skills you'll gain: Prompt Engineering, ChatGPT, Generative AI, Crisis Management, Productivity, Incident Response, AI Personalization, OpenAI, Artificial Intelligence, Personalized Service, Large Language Modeling, Business Ethics, Information Privacy, Personally Identifiable Information, Cross-Functional Collaboration, Threat Detection, Expense Management, Threat Modeling, Creative Thinking, Cyber Security Strategy
- Status: Free Trial
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Infrastructure Security, Authorization (Computing), Multi-Factor Authentication
- Status: Free Trial
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Cybersecurity, Computer Networking, Cyber Security Strategy, Computer Architecture, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Data Cleansing, Data Management, Data Validation, Data Quality, Data Integrity, Technical Communication, Automation, Requirements Analysis, Machine Learning
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Cyber Security Policies, Cyber Security Strategy, Cyber Governance, Threat Detection, Human Factors (Security), Business Risk Management, Cybersecurity, Threat Management, Security Awareness, Enterprise Risk Management (ERM), Information Management, Mobile Security, Business Ethics, Performance Measurement, Network Security
- Status: Free Trial
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Computer Security Incident Management, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Cloud Security, Security Strategy, Computer Security Awareness Training, Malware Protection, Risk Management, Vulnerability Assessments, Enterprise Security
In summary, here are 10 of our most popular cyber threat hunting courses
- Patient Safety:Â Johns Hopkins University
- Cybersecurity for Everyone:Â University of Maryland, College Park
- Certified Ethical Hacking (v12):Â LearnKartS
- Cybersecurity Compliance Framework, Standards & Regulations:Â IBM
- IBM and ISC2 Cybersecurity Specialist:Â ISC2
- Decentralized Finance (DeFi): The Future of Finance:Â Duke University
- Generative AI Cybersecurity & Privacy for Leaders:Â Vanderbilt University
- Introduction to Cybersecurity Tools & Cyberattacks:Â IBM
- Cyber Security – Technology and Governance: Royal Holloway, University of London
- Introduction to the Threat Intelligence Lifecycle :Â IBM