Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Security Engineering, Cyber Threat Intelligence, Information Systems Security, Software Installation
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Cyber Governance, Incident Response, Computer Security Incident Management, Cyber Security Strategy, Cyber Risk, Risk Management, Cyber Threat Intelligence, Cybersecurity, Cyber Security Policies, Cyber Attacks, Governance, Cyber Security Assessment, Threat Management, ISO/IEC 27001, Leadership and Management, Threat Detection, Leadership, Compliance Management, NIST 800-53, Resilience
- Status: NewStatus: Preview
Coursera Instructor Network
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Cyber Security Strategy, Data Ethics, Cybersecurity, Penetration Testing, Threat Detection, Vulnerability Assessments, Artificial Intelligence, Data Security, Incident Response, Tensorflow, Risk Management Framework, Data Integrity
- Status: Free Trial
Skills you'll gain: Cybersecurity, Cyber Attacks, Security Awareness, Hardening, Data Security, Application Security, Computer Security Awareness Training, Network Security, Personally Identifiable Information, Information Systems Security, Security Controls, Threat Management, Malware Protection, Cryptography, Encryption, Multi-Factor Authentication, Authentications
- Status: Free Trial
Skills you'll gain: Cybersecurity, Security Controls, Cyber Attacks, Security Management, Cyber Security Strategy, Incident Response, Cyber Risk, Security Information and Event Management (SIEM), Information Assurance, Data Ethics, Network Analysis, Ethical Standards And Conduct
- Status: Free TrialStatus: AI skills
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Intrusion Detection and Prevention, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Intrusion Detection and Prevention, Malware Protection, Continuous Monitoring, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Email Security, System Design and Implementation, Network Security, Artificial Intelligence and Machine Learning (AI/ML), Threat Modeling, Jupyter, Authentications, Deep Learning, Machine Learning Software
- Status: Free Trial
Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Risk, NIST 800-53, Authorization (Computing), Malware Protection, Authentications, Security Strategy, Security Controls, Risk Management Framework, Identity and Access Management, Cryptography
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Human Factors (Security), Security Awareness, Computer Security Awareness Training, Cyber Governance, Cyber Security Strategy, Cyber Security Policies, Cyber Attacks, Cyber Risk, Data Ethics, Usability, Cyber Security Assessment, Security Strategy, Cybersecurity, Cyber Threat Intelligence, Security Management, Cyber Threat Hunting, Data Security, Network Security, Cloud Security, Mobile Security
- Status: NewStatus: Free
Skills you'll gain: Prompt Engineering, ChatGPT, Security Testing, Data Ethics, Penetration Testing, OpenAI, Threat Modeling, Application Security, Cyber Operations, Generative AI, Vulnerability Assessments, Large Language Modeling, Application Programming Interface (API), Artificial Intelligence, Scripting
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Anomaly Detection, Intrusion Detection and Prevention, Applied Machine Learning, Malware Protection, Cyber Threat Intelligence, Cyber Security Strategy, Threat Modeling, Artificial Intelligence and Machine Learning (AI/ML), Cybersecurity, Threat Detection, MLOps (Machine Learning Operations), Machine Learning, Network Security, Machine Learning Algorithms, Network Analysis, Artificial Intelligence, Data-Driven Decision-Making, Artificial Neural Networks
- Status: Free Trial
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Infrastructure Security, Authorization (Computing), Multi-Factor Authentication
In summary, here are 10 of our most popular cyber threat hunting courses
- Exploitation and Penetration Testing with Metasploit:Â IBM
- Cyber Security Management and Leadership:Â Macquarie University
- Cybersecurity Strategies for AI-Driven Organizations:Â Coursera Instructor Network
- Introduction to Cybersecurity Essentials:Â IBM
- Foundations of Cybersecurity:Â Google
- IBM Cybersecurity Analyst:Â IBM
- AI for Cybersecurity:Â Johns Hopkins University
- Assets, Threats, and Vulnerabilities:Â Google
- Workplace Cyber Security:Â Macquarie University
- ChatGPT for Offensive Security:Â Infosec