Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: System Configuration, Firewall, Network Troubleshooting, Security Management, System Monitoring, Network Security, Patch Management, Software Installation, System Implementation, Threat Detection, Identity and Access Management
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Vulnerability Assessments, Security Management, Vulnerability Management, Cybersecurity, Threat Modeling, Data Security, Cyber Attacks, Cyber Security Assessment, Threat Management, Cyber Risk, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Payment Card Industry (PCI) Data Security Standards, Email Security, Network Infrastructure
Google Cloud
Skills you'll gain: Cloud Security, Google Cloud Platform, Cyber Security Policies, Cloud Management, Security Management, Vulnerability Assessments
- Status: New
Skills you'll gain: Generative AI, Cloud Computing Architecture, Systems Architecture, Cloud-Native Computing, Scalability, Solution Architecture, Large Language Modeling, Cloud Platforms, Artificial Intelligence and Machine Learning (AI/ML), Security Engineering, Threat Modeling, System Monitoring, Containerization, MLOps (Machine Learning Operations), Simulations, Disaster Recovery
- Status: Free Trial
University of California San Diego
Skills you'll gain: Energy and Utilities, Social Justice, Mitigation, Socioeconomics, International Relations, Electric Power Systems, Social Sciences, Cultural Responsiveness, Pollution Prevention, Consumer Behaviour, Environmental Policy, Community Development, Advocacy, Natural Resource Management, Environment, Health Disparities, Transportation Operations, Environmental Engineering, Economics, Corporate Sustainability
Skills you'll gain: Cryptography, Authentications, Application Security, .NET Framework, Threat Modeling, Data Security, Authorization (Computing), Vulnerability Management, Security Controls, Application Development, Data Validation, File Management, SQL
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Anomaly Detection, Threat Detection, Cyber Security Policies, Security Information and Event Management (SIEM), Cyber Threat Hunting, Cybersecurity, Network Security, Cyber Risk, Network Analysis, Cloud Security, NIST 800-53, Graph Theory
- Status: NewStatus: Free Trial
Whizlabs
Skills you'll gain: AWS Identity and Access Management (IAM), Identity and Access Management, Cloud Security, Amazon S3, Key Management, Threat Detection, Network Security, Data Security, Vulnerability Assessments, Encryption, Amazon Elastic Compute Cloud, Authentications, Multi-Factor Authentication, Public Key Infrastructure
- Status: Preview
Skills you'll gain: PostgreSQL, SQL, Databases, Database Management, Secure Coding, Relational Databases, User Provisioning, Data Security, Role-Based Access Control (RBAC), Data Integrity, Threat Detection, Encryption
- Status: Preview
University of Colorado Boulder
Skills you'll gain: Teaching, Differentiated Instruction, Diversity Training, Diversity Awareness, Cultural Diversity, Pedagogy, Cultural Responsiveness, Advocacy, Diversity Equity and Inclusion Initiatives, Student Engagement, Parent Communication, Social Justice, Curriculum Planning, Empathy, Community Outreach, Rapport Building, Relationship Building
- Status: New
University of Maryland, College Park
Skills you'll gain: Cyber Risk, Risk Management, Cybersecurity, Cyber Attacks, Threat Modeling, Cyber Security Assessment, Risk Analysis, Technical Communication, Stakeholder Communications, Communication Strategies
- Status: Preview
University of Colorado Boulder
Skills you'll gain: Internet Of Things, Real-Time Operating Systems, Wireless Networks, General Networking, Cybersecurity, Cryptography, Infrastructure Security, Network Security, Network Protocols, Threat Modeling, Software-Defined Networking, Emerging Technologies, Encryption, Cloud Platforms, Digital Transformation
In summary, here are 10 of our most popular cyber threat hunting courses
- Check Point Jump Start: Quantum Management: Check Point Software Technologies Ltd.
- Cybersecurity Specialist Capstone: IBM
- Securing Google Cloud with CFT Scorecard: Google Cloud
- Architecting AI Solutions – Scalable GenAI Systems: Packt
- Bending the Curve: Climate Change Solutions: University of California San Diego
- Writing Secure Code in ASP.NET: Packt
- Advanced Network Analysis and Incident Response: Johns Hopkins University
- AWS: Security and Key Management: Whizlabs
- SQL for Security Specialist: Codio
- Teaching for Justice and Inclusivity In Challenging Times: University of Colorado Boulder