Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Cyber Operations, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Network Security, Network Monitoring, Data Security, Network Analysis, Malware Protection, Vulnerability Assessments
- Status: Free Trial
Universidad de los Andes
Skills you'll gain: IT Security Architecture, Computer Security Incident Management, Network Security, Incident Response, Cryptography, Security Requirements Analysis, Penetration Testing, Information Systems Security, Human Factors (Security), Cybersecurity, Threat Detection, Cloud Security, Vulnerability Assessments, Threat Modeling, Encryption, Cyber Security Strategy, Vulnerability Management, Cyber Security Assessment, Risk Management Framework, Data Security
- Status: Free Trial
Google
Skills you'll gain: Vulnerability Management, Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Stakeholder Communications, Vulnerability Assessments, Threat Detection, Hardening, Network Security, Security Controls, Threat Management, Security Information and Event Management (SIEM), TCP/IP, Risk Management Framework, Bash (Scripting Language), Linux, Debugging, Cybersecurity
- Status: Free Trial
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Threat Management, Network Planning And Design, Firewall, Network Protocols, Cloud Computing, TCP/IP, Encryption
- Status: Free Trial
University of Minnesota
Skills you'll gain: Software Design Patterns, Software Design, Engineering Software, Software Quality Assurance, Software Engineering, Program Development, Application Security, Object Oriented Design, Software Architecture, Software Quality (SQA/SQC), Development Testing, Threat Modeling, Maintainability, Development Environment, Code Review, Application Deployment, Test Tools, Continuous Deployment, Quality Assurance, Continuous Delivery
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Medical Privacy, Health Information Management, Security Awareness, Cloud Security, Personally Identifiable Information, Encryption, Health Care, Health Care Procedure and Regulation, Data Security, Cyber Attacks, Cryptography, Health Policy, Information Privacy, Regulatory Compliance, Cloud Computing, Patient Safety
The University of Hong Kong
Skills you'll gain: Infectious Diseases, Epidemiology, Public Health and Disease Prevention, Public Health, Healthcare Ethics, Emergency Response, Research, Microbiology, Risk Analysis, Media and Communications, Molecular, Cellular, and Microbiology
- Status: Free Trial
Skills you'll gain: Azure Active Directory, Data Security, Multi-Factor Authentication, Microsoft Azure, Role-Based Access Control (RBAC), Cloud Security, Active Directory, Threat Modeling, Security Strategy, Data Storage, Application Security, Database Architecture and Administration, Virtual Machines, Infrastructure Security, Kubernetes, Continuous Monitoring, Web Applications, Cyber Governance, System Monitoring, Network Security
Duke University
Skills you'll gain: Child Development, Advocacy, Research, Research Methodologies, Social Sciences, Data Collection, Anthropology, Nutrition and Diet, Environmental Issue, Community Development, Biology, Conflict Management
- Status: Free Trial
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Threat Management, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Threat Detection, Event Monitoring, Business Continuity, System Monitoring, Verification And Validation, Technical Communication
Erasmus University Rotterdam
Skills you'll gain: Email Security, Human Factors (Security), Cyber Security Policies, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Risk, Computer Security Awareness Training, Patient Safety, Malware Protection, Encryption, Health Technology, Data Security, Safety and Security, Telehealth, Information Privacy, General Data Protection Regulation (GDPR)
- Status: Free Trial
Skills you'll gain: OAuth, Cloud API, Application Programming Interface (API), Restful API, Security Controls, Application Security, Network Security, Data Security, JSON, Identity and Access Management, Threat Management
In summary, here are 10 of our most popular cyber threat hunting courses
- Technical Deep Dive with Incident Response Tools:Â Infosec
- Ciberseguridad:Â Universidad de los Andes
- Cybersécurité Google: Google
- Network Security:Â ISC2
- Engineering Practices for Building Quality Software:Â University of Minnesota
- Healthcare Data Security, Privacy, and Compliance:Â Johns Hopkins University
- Epidemics:Â The University of Hong Kong
- Microsoft Azure Security Engineer Associate (AZ-500):Â Microsoft
- Chimpanzee Behavior and Conservation:Â Duke University
- Stages of Incident Response:Â Infosec