Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
Skills you'll gain: Network Security, Vulnerability Assessments, Cyber Security Assessment, Cybersecurity, Software Installation, System Configuration, Microsoft Windows, Web Applications, Linux, Configuration Management
- Status: Free Trial
Skills you'll gain: Encryption, Internet Of Things, Application Security, Hardware Architecture, Security Engineering, Security Strategy, Endpoint Security, Information Systems Security, Data Security, Network Security, Threat Modeling, Cybersecurity, Vulnerability Assessments, Security Requirements Analysis, Vulnerability Management, Information Privacy, General Data Protection Regulation (GDPR), Authentications, Authorization (Computing)
- Status: Preview
University of Copenhagen
Skills you'll gain: Political Sciences, Environmental Policy, Environmental Issue, International Relations, Policy Analysis, Lobbying, Public Affairs, Social Justice, Community Organizing, Diplomacy, Governance, Environmental Laws, Advocacy
Skills you'll gain: Incident Response, Email Security, Computer Security Incident Management, Cyber Operations, Threat Detection, Security Information and Event Management (SIEM), IT Automation, Google Cloud Platform
- Status: Free Trial
Google Cloud
Skills you'll gain: Email Security, Data Loss Prevention, Security Management, Google Workspace, Malware Protection, Threat Management, Security Controls, Content Management
- Status: Free Trial
Skills you'll gain: Vulnerability Management, Infrastructure as Code (IaC), Endpoint Security, Cloud Security, Vulnerability Assessments, Network Security, Cloud Computing Architecture, Threat Detection, Zero Trust Network Access, Infrastructure Security, Cybersecurity, Security Strategy, Disaster Recovery, Mobile Security, Wireless Networks
- Status: Free Trial
LearnQuest
Skills you'll gain: Threat Management, Remote Access Systems, Threat Detection, Security Awareness, Application Security, Security Software, Vulnerability Assessments, Cybersecurity, Infrastructure Security, Security Controls, Security Management, Endpoint Security, Cyber Security Strategy, Virtual Private Networks (VPN), Multi-Factor Authentication
- Status: Free Trial
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Email Security, Security Management, Vulnerability Management, Intrusion Detection and Prevention, Risk Management Framework, Malware Protection, Threat Detection, Cloud Security, Information Assurance, Threat Management, Information Systems Security, Vulnerability Assessments, Application Security, Cybersecurity, Cyber Security Policies, Risk Management, Network Security
- Status: Free Trial
FAIR Institute
Skills you'll gain: Cyber Governance, Cyber Risk, Risk Appetite, Risk Management, Governance Risk Management and Compliance, Risk Analysis, Business Communication, Cyber Security Strategy, Technical Communication, Regulatory Requirements, Compliance Management, Strategic Communication
- Status: NewStatus: Free Trial
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Amazon Web Services, Amazon Redshift, Amazon DynamoDB, AWS CloudFormation, Identity and Access Management, Amazon S3, Serverless Computing, Infrastructure as Code (IaC), AWS Kinesis, Cloud Management, Cloud Security, Amazon Elastic Compute Cloud, AWS SageMaker, Cloud Storage, Key Management, Threat Detection, Network Architecture, Containerization
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Cybersecurity, Threat Detection, Application Security, Malware Protection, Vulnerability Assessments, Network Security, Security Awareness, Web Applications, Remote Access Systems, Javascript
- Status: Free Trial
Skills you'll gain: Application Security, IT Security Architecture, Security Testing, Security Engineering, Software Development Life Cycle, Security Requirements Analysis, Software Architecture, Threat Modeling, DevSecOps, Security Strategy, Secure Coding, Software Development Methodologies, Penetration Testing, Compliance Management, Business Priorities, Usability
In summary, here are 10 of our most popular cyber threat hunting courses
- Nessus Scanner - Network Scanning from Beginner to Advanced:Â Packt
- Implementing Security in IoT and Edge Devices:Â LearnQuest
- Making Democracy Fit for Climate:Â University of Copenhagen
- Automating Response to Phishing with Cortex XSOAR:Â Google Cloud
- Google Workspace Mail Management 日本語版: Google Cloud
- Cloud Security, Resiliency, and Vulnerability Management:Â Packt
- Fundamentals of Remote Team Security:Â LearnQuest
- Certified Incident Handler (ECIH) v2:Â Packt
- Executive Communication and Governance:Â FAIR Institute
- Exam Prep (SAP-C02): AWS Solutions Architect - Professional:Â Whizlabs