Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Risk Analysis, Risk Management, Threat Management, Cyber Risk, Security Management, IT Management, Governance, Cybersecurity, Cyber Security Strategy, Asset Management, Cyber Security Assessment, Project Documentation, Presentations
- Status: Free Trial
University of Colorado System
Skills you'll gain: Infrastructure Security, Cyber Risk, Cyber Security Policies, Cyber Security Assessment, Cybersecurity, Cyber Security Strategy, Risk Management Framework, Technology Roadmaps, Network Infrastructure, Transportation Operations, Infrastructure Architecture, Mobile Security
Coursera Project Network
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Cybersecurity, Command-Line Interface, Virtual Machines, Technical Communication
Coursera Instructor Network
Skills you'll gain: General Data Protection Regulation (GDPR), Personally Identifiable Information, Governance Risk Management and Compliance, Information Privacy, Data Governance, Data Security, Cybersecurity, Data Management, Data Storage, Cyber Risk, Data Processing, Data Access, Encryption
- Status: NewStatus: Free Trial
SkillUp EdTech
Skills you'll gain: Data Security, Data Migration, Data Governance, Extract, Transform, Load, Cloud Storage, Data Management, Data Integration, Data Architecture, Enterprise Architecture, Data Storage, Data Modeling, Data Quality, Personally Identifiable Information, Incident Response, Security Controls, Data Infrastructure, Security Strategy, Data Warehousing, Threat Management, Threat Detection
- Status: Free Trial
Skills you'll gain: Linux Commands, Linux, Penetration Testing, Open Web Application Security Project (OWASP), Vulnerability Scanning, Command-Line Interface, Scripting, Vulnerability Assessments, Cyber Security Assessment, General Networking, Python Programming, Network Security, Cybersecurity, Application Security, Firewall, Web Applications, Data Ethics, Email Security, Computer Security Awareness Training, Malware Protection
EIT Digital
Skills you'll gain: Computational Logic, Markov Model, Verification And Validation, Theoretical Computer Science, Mathematical Modeling, Systems Analysis, Probability, Algorithms, Real-Time Operating Systems, Probability Distribution
- Status: Free Trial
Skills you'll gain: Database Management, Databases, Relational Databases, Database Architecture and Administration, Data Security, User Accounts, Secure Coding, SQL, Application Security, Vulnerability Scanning, NoSQL, Role-Based Access Control (RBAC), Encryption
Erasmus University Rotterdam
Skills you'll gain: Journalism, Media and Communications, Public Affairs, Research, Technical Communication, Scientific Methods, Persuasive Communication, Digital Communications, Threat Detection, Policy Analysis, Public Policies, Policy Development, Content Creation, Social Sciences, Ethical Standards And Conduct
- Status: Free Trial
Imperial College London
Skills you'll gain: Microbiology, Public Health, Sanitation, Infectious Diseases, Epidemiology, Preventative Care, Emergency Response, Health And Safety Standards, Healthcare Ethics, Radiation Protection, Environmental Science
- Status: Free Trial
Skills you'll gain: Business Continuity Planning, Continuous Monitoring, ISO/IEC 27001, Security Management, Security Controls, Threat Management, Risk Management, Risk Analysis, Security Strategy, Business Risk Management, Cyber Risk, Regulation and Legal Compliance, Cyber Governance, Threat Modeling, Governance Risk Management and Compliance, Cyber Security Strategy, NIST 800-53, Cybersecurity, Compliance Management, Cyber Security Policies
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Encryption, Bash (Scripting Language), Security Strategy
In summary, here are 10 of our most popular cyber threat hunting courses
- Implementing a Risk Management Framework :Â Kennesaw State University
- Cybersecurity Policy for Aviation and Internet Infrastructures:Â University of Colorado System
- Metasploit for Beginners: Ethical Penetration Testing:Â Coursera Project Network
- Introduction to Data Protection and Privacy:Â Coursera Instructor Network
- Enterprise Data Integration, Governance and Architecture:Â SkillUp EdTech
- The Complete Ethical Hacking Bootcamp: Beginner To Advanced:Â Packt
- Quantitative Model Checking:Â EIT Digital
- Database Essentials and Vulnerabilities:Â IBM
- Science Communication: Communicating Trustworthy Information in the Digital World:Â Erasmus University Rotterdam
- Foundations of Public Health Practice: Health Protection:Â Imperial College London