Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free Trial
Skills you'll gain: Threat Management, Incident Management, Remote Access Systems, Incident Response, Security Management, Data Security, Vulnerability Assessments, Threat Detection, Computer Security Incident Management, Cybersecurity, Security Controls, Continuous Monitoring, Cyber Security Assessment, Security Software, Vulnerability Management, Computer Security Awareness Training, Security Strategy, Telecommuting, Infrastructure Security, Cyber Security Policies
Skills you'll gain: Feature Engineering, Big Data, Anomaly Detection, Google Cloud Platform, Unsupervised Learning, Data Manipulation, Applied Machine Learning, Decision Tree Learning, Machine Learning Methods, Risk Modeling, Threat Detection, Supervised Learning, Advanced Analytics, Predictive Modeling, Predictive Analytics, Transaction Processing
- Status: New
Skills you'll gain: Security Management, Incident Management, Vulnerability Assessments, Threat Management, IT Management, Security Strategy, Cyber Governance, Risk Management Framework, Security Controls, Cyber Risk, Security Awareness, Disaster Recovery
- Status: Free Trial
Infosec
Skills you'll gain: Risk Management Framework, Federal Information Security Management Act, NIST 800-53, Systems Development Life Cycle, Cyber Risk, Security Management, Continuous Monitoring, Cyber Security Policies, Security Controls, Authorization (Computing), Information Privacy, Information Systems
- Status: Free Trial
Skills you'll gain: Splunk, Data Modeling, Role-Based Access Control (RBAC), System Monitoring, Incident Response, User Accounts, Security Information and Event Management (SIEM), Machine Learning, Systems Administration, Performance Tuning, Data Visualization, Threat Detection, Anomaly Detection, Correlation Analysis, Data Analysis, Authentications, Data Collection, Configuration Management
University of Maryland, College Park
Skills you'll gain: Application Security, Secure Coding, Vulnerability Assessments, Security Software, Security Testing, Cybersecurity, Collaborative Software, Threat Modeling, Debugging, Systems Design, Version Control
- Status: Free Trial
Skills you'll gain: Remote Access Systems, Local Area Networks, Software Installation, Command-Line Interface, Microsoft Windows, System Configuration, Threat Detection, Information Technology Operations, Wireless Networks, Network Security, TCP/IP, Mobile Security, Information Systems Security, Linux, Peripheral Devices, USB, Operating Systems, Computer Hardware, Data Storage Technologies, Hardware Troubleshooting
Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Cyber Threat Hunting, Computer Security Incident Management, Security Information and Event Management (SIEM), Threat Detection, Incident Management
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Cybersecurity, Computer Security Awareness Training, Cyber Attacks, Cyber Risk, Personally Identifiable Information, Threat Detection, Information Privacy, Authentications, General Data Protection Regulation (GDPR), Human Factors (Security), NIST 800-53
Skills you'll gain: Threat Modeling, Cyber Governance, Cybersecurity, Cyber Security Policies, Cryptography, Network Security, Cyber Risk, Cyber Attacks, Cyber Security Strategy, Threat Detection, Vulnerability Assessments, Incident Response
- Status: Free Trial
Skills you'll gain: Audit Planning, Auditing, Internal Controls, Risk Analysis, Risk Management, Continuous Monitoring, Compliance Auditing, Project Coordination, Quality Assurance, Information Systems Security, Cyber Security Assessment, Governance, Presentations
- Status: Free Trial
University of Michigan
Skills you'll gain: Data Quality, Data Cleansing, Data Collection, Data Validation, Data Analysis, Data Processing, Threat Detection, Data Access, Sampling (Statistics)
In summary, here are 10 of our most popular cyber threat hunting courses
- Identifying and Managing Security Gaps for Remote Teams:Â LearnQuest
- Fraud Detection on Financial Transactions with Machine Learning on Google Cloud:Â Google Cloud
- Certified Information Security Manager (CISM):Â Packt
- NIST DoD RMF:Â Infosec
- Splunk Administration and Advanced Topics:Â EDUCBA
- Cybersecurity Capstone Project:Â University of Maryland, College Park
- CompTIA A+ Certification Core 2 (220-1102):Â Packt
- Managing Threat Intelligence with Cortex XSOAR:Â Google Cloud
- What Is Cybersecurity?:Â Kennesaw State University
- Introduction to Automotive Cybersecurity & Vehicle Networks:Â Starweaver