Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
Universiteit Leiden
Skills you'll gain: Risk Management Framework, Safety and Security, Security Management, Threat Management, Public Safety and National Security, Cybersecurity, Incident Management, International Relations, Environmental Issue, Governance
- Status: Free Trial
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Security Awareness, Cyber Attacks, Network Security, Vulnerability Assessments, Cloud Services, Data Security, Human Factors (Security)
Edureka
Skills you'll gain: Cybersecurity, Secure Coding, Cyber Security Strategy, Threat Detection, Network Security, Cyber Threat Intelligence, Application Security, IT Security Architecture, Generative AI, Incident Response, Artificial Intelligence, Machine Learning
- Status: Free Trial
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Modeling, Threat Detection, Threat Management, MITRE ATT&CK Framework, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Security Management, Cybersecurity, Code Review, Vulnerability Scanning, Vulnerability Assessments
- Status: Free Trial
University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, Usability Testing, User Interface and User Experience (UI/UX) Design, Vulnerability Management, Technical Design, Security Engineering, Software Architecture, Secure Coding, Software Design Patterns, Database Management, Software Engineering, Software Visualization, Software Development Life Cycle, Systems Design
- Status: Free Trial
Skills you'll gain: Interviewing Skills, Data Analysis, Data Processing, Analytical Skills, Artificial Intelligence, Recruitment, Data-Driven Decision-Making, Data Storytelling, Project Documentation, Presentations, Portfolio Management
- Status: Free Trial
University of California, Irvine
Skills you'll gain: Security Strategy, Cyber Governance, Security Management, Cyber Risk, Compliance Management, Risk Management, Regulatory Compliance, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Data Governance, Program Standards, Computer Security
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Human Factors (Security), Threat Management, Security Awareness, Cybersecurity, Cyber Risk, Compliance Training, Employee Training, Behavior Management, Insurance
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cyber Governance, Vulnerability Management, Cyber Attacks, Cybersecurity, Cyber Risk, Threat Management, Security Management, Vulnerability Assessments, Threat Detection, Cyber Security Strategy, Risk Management, Security Awareness, Information Systems Security, Cyber Operations, Incident Response, Network Security, Asset Management
University of Copenhagen
Skills you'll gain: Epidemiology, Pollution Prevention, Public Health, Environment Health And Safety, Health Disparities, Environmental Policy, Environmental Science, Environmental Monitoring, Health Assessment, Respiratory Care, Chronic Diseases, Mitigation, Vulnerability
Yale University
Skills you'll gain: Political Sciences, Policy Analysis, Social Justice, Social Sciences, European History, Law, Regulation, and Compliance, Governance, Ethical Standards And Conduct, Socioeconomics, Economics
- Status: Free Trial
Skills you'll gain: Debugging, Python Programming, Cybersecurity, Cyber Security Assessment, Scripting, Programming Principles, Algorithms, Automation, Integrated Development Environments, File Management, Data Structures
In summary, here are 10 of our most popular cyber threat hunting courses
- Security & Safety Challenges in a Globalized World:Â Universiteit Leiden
- Cyber Threats and Attack Vectors:Â University of Colorado System
- Gen AI in Cybersecurity:Â Edureka
- Security Analyst Fundamentals:Â IBM
- Secure Software Design:Â University of Colorado System
- Google Data Analytics Capstone: Complete a Case Study:Â Google
- Security Governance & Compliance:Â University of California, Irvine
- Cybersecurity and the X-Factor:Â Kennesaw State University
- Cybersecurity Foundations for Risk Management:Â Kennesaw State University
- Air Pollution – a Global Threat to our Health: University of Copenhagen