Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
Universidad de los Andes
Skills you'll gain: IT Security Architecture, Computer Security Incident Management, Network Security, Incident Response, Cryptography, Security Requirements Analysis, Penetration Testing, Information Systems Security, Human Factors (Security), Cybersecurity, Threat Detection, Cloud Security, Vulnerability Assessments, Threat Modeling, Encryption, Cyber Security Strategy, Vulnerability Management, Cyber Security Assessment, Risk Management Framework, Data Security
The University of Hong Kong
Skills you'll gain: Infectious Diseases, Epidemiology, Public Health and Disease Prevention, Public Health, Healthcare Ethics, Emergency Response, Research, Microbiology, Risk Analysis, Media and Communications, Molecular, Cellular, and Microbiology
- Status: Free Trial
New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
- Status: Free Trial
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Threat Management, Network Planning And Design, Firewall, Network Protocols, Cloud Computing, TCP/IP, Encryption
Coursera Instructor Network
Skills you'll gain: Cyber Threat Intelligence, Cybersecurity, Penetration Testing, Threat Detection, Security Information and Event Management (SIEM), Incident Response, Generative AI, Data Ethics, Security Testing, Vulnerability Assessments, Prompt Engineering
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Medical Privacy, Health Information Management, Security Awareness, Cloud Security, Personally Identifiable Information, Encryption, Health Care, Health Care Procedure and Regulation, Data Security, Cyber Attacks, Cryptography, Health Policy, Information Privacy, Regulatory Compliance, Cloud Computing, Patient Safety
- Status: Free Trial
Skills you'll gain: OAuth, Cloud API, Application Programming Interface (API), Restful API, Security Controls, Application Security, Network Security, Data Security, JSON, Identity and Access Management, Threat Management
- Status: Free Trial
Google
Skills you'll gain: Vulnerability Management, Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Stakeholder Communications, Vulnerability Assessments, Threat Detection, Hardening, Network Security, Security Controls, Threat Management, Security Information and Event Management (SIEM), TCP/IP, Risk Management Framework, Bash (Scripting Language), Linux, Debugging, Cybersecurity
- Status: Free Trial
Skills you'll gain: Azure Active Directory, Data Security, Multi-Factor Authentication, Microsoft Azure, Role-Based Access Control (RBAC), Cloud Security, Active Directory, Threat Modeling, Security Strategy, Data Storage, Application Security, Database Architecture and Administration, Virtual Machines, Infrastructure Security, Kubernetes, Continuous Monitoring, Web Applications, Cyber Governance, System Monitoring, Network Security
Erasmus University Rotterdam
Skills you'll gain: Email Security, Human Factors (Security), Cyber Security Policies, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Risk, Computer Security Awareness Training, Patient Safety, Malware Protection, Encryption, Health Technology, Data Security, Safety and Security, Telehealth, Information Privacy, General Data Protection Regulation (GDPR)
- Status: Free Trial
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Threat Management, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Threat Detection, Event Monitoring, Business Continuity, System Monitoring, Verification And Validation, Technical Communication
Duke University
Skills you'll gain: Child Development, Advocacy, Research, Research Methodologies, Social Sciences, Data Collection, Anthropology, Nutrition and Diet, Environmental Issue, Community Development, Biology, Conflict Management
In summary, here are 10 of our most popular cyber threat hunting courses
- Ciberseguridad:Â Universidad de los Andes
- Epidemics:Â The University of Hong Kong
- Cyber Attack Countermeasures:Â New York University
- Network Security:Â ISC2
- GenAI for Cybersecurity Analysts:Â Coursera Instructor Network
- Healthcare Data Security, Privacy, and Compliance:Â Johns Hopkins University
- API Security on Google Cloud's Apigee API Platform:Â Google Cloud
- Cybersécurité Google: Google
- Microsoft Azure Security Engineer Associate (AZ-500):Â Microsoft
- Cybersecurity in Healthcare (Hospitals & Care Centres):Â Erasmus University Rotterdam