Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
Google Cloud
Skills you'll gain: Threat Detection, Cloud Security, Security Information and Event Management (SIEM), Google Cloud Platform, Security Management, Infrastructure Security, Continuous Monitoring, Configuration Management, Identity and Access Management, Vulnerability Management
- Status: Preview
Institut Mines-Télécom
Skills you'll gain: Cybersecurity, Cyber Attacks, Application Security, Security Testing, Secure Coding, Security Awareness, Vulnerability Assessments, SQL
Google Cloud
Skills you'll gain: Cloud Security, Infrastructure Security, Cloud Infrastructure, Kubernetes, Google Cloud Platform, Cloud Computing, Threat Management
- Status: New
Skills you'll gain: Cyber Operations, Cybersecurity, Intrusion Detection and Prevention, Threat Management, Incident Response, Cyber Security Assessment, Computer Security Incident Management, Risk Management Framework, Network Security, Data Security, Incident Management, Security Controls, Network Analysis, Data Integrity
Google Cloud
Skills you'll gain: Cloud API, Application Programming Interface (API), Google Cloud Platform, Cloud Security, Load Balancing, Threat Management, Threat Detection
Coursera Project Network
Skills you'll gain: Competitive Analysis, Customer Analysis, Market Analysis, Business Strategy, Market Share, Market Dynamics, Strategic Planning, Supplier Management, New Business Development, Leadership, Entrepreneurship
Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Assessments, Application Programming Interface (API), API Design, Secure Coding, Vulnerability Management, Threat Modeling, Application Security, Authentications, Authorization (Computing), Server Side, Encryption, SQL
- Status: Preview
Coursera Instructor Network
Skills you'll gain: Oracle Cloud, Cloud Security, Threat Detection, Continuous Monitoring, Encryption, Cloud Infrastructure, Infrastructure Security, Network Security, Infrastructure As A Service (IaaS), Cloud Computing, Threat Management, Data Encryption Standard, Identity and Access Management, Data Security, Firewall, Key Management
- Status: New
Kennesaw State University
Skills you'll gain: Endpoint Security, Cyber Security Policies, Cybersecurity, Threat Detection, Cyber Attacks, Security Awareness, Computer Security Awareness Training, Remote Access Systems, Telecommuting, Human Factors (Security), Mobile Security, Malware Protection, Incident Response, Email Security, Virtual Private Networks (VPN)
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Cybersecurity, Threat Detection, Application Security, Malware Protection, Vulnerability Assessments, Network Security, Security Awareness, Web Applications, Remote Access Systems, Javascript
Skills you'll gain: Cloud Security, Threat Detection, Google Cloud Platform, Threat Management, Cloud Computing, Intrusion Detection and Prevention, Network Security, Firewall, Security Information and Event Management (SIEM), Incident Response, Endpoint Security
- Status: NewStatus: Free Trial
Skills you'll gain: Network Troubleshooting, Network Administration, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, General Networking, Technical Support and Services, Hardening, Network Infrastructure, Network Protocols, Intrusion Detection and Prevention, Threat Modeling, Identity and Access Management, Authentications, Virtual Local Area Network (VLAN), Encryption, Key Management
In summary, here are 10 of our most popular cyber threat hunting courses
- Security Command Center Fundamentals: Google Cloud
- Cybersécurité : comment sécuriser un site web: Institut Mines-Télécom
- Securing Google Cloud Compute with Prisma Cloud: Google Cloud
- Cisco CyberOps Associate (200-201): Packt
- Protecting APIs with Apigee X and Cloud Armor: Google Cloud
- Using Porter’s Five Forces Model for Competitive Analysis : Coursera Project Network
- A Detailed Guide to the OWASP Top 10: Packt
- Demystifying Oracle Cloud Infrastructure (OCI) Security: Coursera Instructor Network
- An Employee's Guide to Cybersecurity: Kennesaw State University
- Web Security, Social Engineering & External Attacks: Packt