Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
Skills you'll gain: Security Information and Event Management (SIEM), Splunk, Threat Detection, System Monitoring, Cybersecurity, Event Monitoring, Incident Response, Data Analysis Software, Information Management, Data Management, Real Time Data, Data Import/Export, Data Storage, Configuration Management, Software Installation, User Interface (UI)
- Status: Free Trial
University of Colorado System
Skills you'll gain: Application Security, Vulnerability Assessments, Software Design, Threat Modeling, Vulnerability Management, Security Engineering, Secure Coding, Software Design Patterns, Software Architecture, Software Visualization, Cryptography, Blockchain, Public Key Cryptography Standards (PKCS)
- Status: Free Trial
L&T EduTech
Skills you'll gain: Fire And Life Safety, Building Codes, Pump Stations, Blueprint Reading, Process Flow Diagrams, Construction, Safety Training, Hydraulics, Construction Inspection, Safety Assurance, Plumbing, Building Design, Electrical Systems, Engineering Drawings, System Requirements, Safety and Security, Facility Management and Maintenance, Structural Analysis, Threat Detection, Water Resources
- Status: Free Trial
Skills you'll gain: Cybersecurity, Cyber Operations, Cyber Threat Hunting, Intrusion Detection and Prevention, Scripting, Python Programming, Authorization (Computing), Command-Line Interface, Operating Systems
- Status: Free Trial
University of California, Irvine
Skills you'll gain: Threat Modeling, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Risk Management Framework, Risk Mitigation, Vulnerability Assessments, Asset Management, Cyber Security Assessment, Security Controls
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Email Security, Personally Identifiable Information, Firewall, Threat Detection, Network Security, Cybersecurity, Security Awareness, Cloud Storage, Information Privacy, Cloud Computing, General Networking, Encryption
Coursera Instructor Network
Skills you'll gain: Cyber Threat Intelligence, Cybersecurity, Penetration Testing, Threat Detection, Security Information and Event Management (SIEM), Incident Response, Generative AI, Data Ethics, Security Testing, Vulnerability Assessments, Prompt Engineering
Coursera Project Network
Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Cybersecurity, Command-Line Interface, Virtual Machines, Technical Communication
- Status: Free Trial
University of Colorado System
Skills you'll gain: Infrastructure Security, Cyber Risk, Cyber Security Policies, Cyber Security Assessment, Cybersecurity, Cyber Security Strategy, Risk Management Framework, Technology Roadmaps, Network Infrastructure, Transportation Operations, Infrastructure Architecture, Mobile Security
- Status: Free Trial
Skills you'll gain: Database Management, Databases, Relational Databases, Database Architecture and Administration, Data Security, User Accounts, Secure Coding, SQL, Application Security, Vulnerability Scanning, NoSQL, Role-Based Access Control (RBAC), Encryption
- Status: Free Trial
Skills you'll gain: Linux Commands, Linux, Penetration Testing, Open Web Application Security Project (OWASP), Vulnerability Scanning, Command-Line Interface, Scripting, Vulnerability Assessments, Cyber Security Assessment, General Networking, Python Programming, Network Security, Cybersecurity, Application Security, Firewall, Web Applications, Data Ethics, Email Security, Computer Security Awareness Training, Malware Protection
- Status: Free Trial
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Security Controls, Key Management, Threat Modeling, Authorization (Computing), Encryption, Data Integrity, Authentications, Vulnerability Assessments
In summary, here are 10 of our most popular cyber threat hunting courses
- Introduction to SIEM (Splunk):Â EDUCBA
- Software Design Threats and Mitigations:Â University of Colorado System
- Fire and Life Safety Systems:Â L&T EduTech
- Execution, persistence, privilege escalation and evasion:Â Infosec
- Introduction to Risk Management:Â University of California, Irvine
- Cybersecurity: Protecting your Information at Home:Â Kennesaw State University
- GenAI for Cybersecurity Analysts:Â Coursera Instructor Network
- Metasploit for Beginners: Ethical Penetration Testing:Â Coursera Project Network
- Cybersecurity Policy for Aviation and Internet Infrastructures:Â University of Colorado System
- Database Essentials and Vulnerabilities:Â IBM