Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
University of Copenhagen
Skills you'll gain: Epidemiology, Pollution Prevention, Public Health, Environment Health And Safety, Health Disparities, Environmental Policy, Environmental Science, Environmental Monitoring, Health Assessment, Respiratory Care, Chronic Diseases, Mitigation, Vulnerability
- Status: Free Trial
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Computer Security Incident Management, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Malware Protection, Endpoint Security, Network Security, Firewall
- Status: Free Trial
Technical University of Munich (TUM)
Skills you'll gain: Global Positioning Systems, Human Factors, Manufacturing Processes, Digital Transformation, Aerospace Basic Quality System Standards, Environmental Monitoring, Control Systems, Production Process, Automation, Manufacturing and Production, Structural Analysis, Leadership, Big Data, Human Machine Interfaces, Cybersecurity, Mathematical Modeling, Artificial Intelligence, Engineering Design Process, Threat Detection, Network Architecture
- Status: Free Trial
Skills you'll gain: Identity and Access Management, Cloud Security, DevSecOps, Cloud Computing, Google Cloud Platform, Network Security, Cloud Infrastructure, Data Security, Cloud Computing Architecture, IT Automation, General Networking, Computer Networking, Cybersecurity, Infrastructure Security, Security Controls, Infrastructure as Code (IaC)
- Status: Free Trial
University of California, Irvine
Skills you'll gain: Security Strategy, Cyber Governance, Security Management, Cyber Risk, Compliance Management, Risk Management, Regulatory Compliance, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Data Governance, Program Standards, Computer Security
- Status: Free Trial
University of Colorado System
Skills you'll gain: Windows Servers, Linux Administration, Contingency Planning, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, OSI Models, User Accounts, Group Policy, Security Management, Cyber Security Policies, Systems Administration, Virtualization, Red Hat Enterprise Linux, Information Technology, Information Systems Security
- Status: Free Trial
Skills you'll gain: Software Development Life Cycle, Computing Platforms, Cloud Computing Architecture, Cloud Services, Peripheral Devices, Cybersecurity, Cloud Security, Cloud Technologies, Cloud Infrastructure, Cloud Applications, Network Troubleshooting, Encryption, Data Storage, Cyber Attacks, Technical Support, Networking Hardware, Computer Hardware, Information Technology, Cloud Computing, Databases
Kennesaw State University
Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Cyber Operations, Cryptography, Cyber Risk, Encryption, Authorization (Computing), Secure Coding, Systems Development Life Cycle, Security Controls, Cyber Governance, Cyber Security Policies, Infrastructure Security, Security Awareness, Safety and Security, Identity and Access Management, Incident Management
- Status: Free Trial
University of Colorado System
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Infrastructure Security, Cyber Attacks, Cyber Operations, Cyber Risk, Cyber Security Policies, Cyber Governance, Incident Response, Risk Management Framework, Technology Solutions, Legal Risk
The Pennsylvania State University
Skills you'll gain: Infectious Diseases, Epidemiology, Public Health and Disease Prevention, Microbiology, Public Health, Social Sciences, Community Health, Emerging Technologies, Mathematical Modeling, Molecular Biology
- Status: Free Trial
EIT Digital
Skills you'll gain: Embedded Systems, Embedded Software, Internet Of Things, Operating Systems, Real-Time Operating Systems, Wireless Networks, System Programming, Hardware Architecture, Simulations, C (Programming Language), Network Protocols
University of Maryland, College Park
Skills you'll gain: Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Application Specific Integrated Circuits, Cryptography, Encryption, Emerging Technologies, Authentications, System Design and Implementation, Computational Logic
In summary, here are 10 of our most popular cyber threat hunting courses
- Air Pollution – a Global Threat to our Health: University of Copenhagen
- Detecting and Mitigating Cyber Threats and Attacks: University of Colorado System
- Digitalisation in Aeronautics and Space: Technical University of Munich (TUM)
- Introduction to Security Principles in Cloud Computing: Google Cloud
- Security Governance & Compliance: University of California, Irvine
- Computer Security and Systems Management: University of Colorado System
- Information Technology (IT) and Cloud Fundamentals: IBM
- Cybersecurity and Its Ten Domains: Kennesaw State University
- Homeland Security and Cybersecurity Future: University of Colorado System
- Epidemics - the Dynamics of Infectious Diseases: The Pennsylvania State University