Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
Skills you'll gain: Cloud Computing, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Computer Security Incident Management, Cloud Security, Operating Systems, Windows Servers, Endpoint Detection and Response, Network Routing, Microsoft Windows, Threat Management
Skills you'll gain: Identity and Access Management, Cloud Security, DevSecOps, Cloud Computing, Role-Based Access Control (RBAC), Google Cloud Platform, Network Security, Cloud Computing Architecture, IT Automation, General Networking, Infrastructure Security, Security Controls, Infrastructure as Code (IaC), Virtualization
Infosec
Skills you'll gain: Cyber Risk, Risk Management Framework, Cybersecurity, Continuous Monitoring, Cyber Governance, Cyber Security Strategy, Risk Management, Infrastructure Security, Cyber Security Assessment, Cyber Security Policies, Incident Response, Security Controls, Vulnerability Assessments, Stakeholder Communications, Business Continuity Planning, Asset Management
Skills you'll gain:
- Status: Free
Yale University
Skills you'll gain: Political Sciences, Policy Analysis, Social Justice, Public Policies, Social Sciences, Law, Regulation, and Compliance, Governance, Ethical Standards And Conduct, Socioeconomics, Economics
LearnKartS
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Penetration Testing, Network Security, Malware Protection, Cybersecurity, Cloud Computing, Mobile Security, Application Security, Cyber Attacks, Cyber Security Assessment, Security Testing, Threat Detection, Information Systems Security, Cyber Threat Intelligence, Intrusion Detection and Prevention, Virtualization, Firewall, Vulnerability Assessments, Threat Modeling
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Endpoint Detection and Response, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Intrusion Detection and Prevention, Security Management
University of Virginia
Skills you'll gain: Design Thinking, Digital Transformation, Creative Problem-Solving, New Product Development, Ideation, Business Transformation, Product Management, Technology Strategies, Agile Product Development, Innovation, Creativity, Product Lifecycle Management, Strategic Thinking, Product Improvement, Human Centered Design, Information Technology, Competitive Analysis, Business Analysis, Business Strategy, Cyber Risk
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Record Keeping, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
Skills you'll gain: Clinical Trials, Pharmaceuticals, Patient Safety, Clinical Research, Competitive Intelligence, Medical Science and Research, Medication Administration, Safety Assurance, New Product Development, Healthcare Industry Knowledge, Research Design, Experimentation, Science and Research, Risk Analysis, Process Validation, Process Development, Product Development, Verification And Validation, Regulatory Compliance, General Science and Research
LearnKartS
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Penetration Testing, Cloud Computing, Cybersecurity, Mobile Security, Application Security, Cyber Threat Intelligence, Virtualization, Encryption, Cryptography, Vulnerability Assessments, SQL
University of Colorado System
Skills you'll gain: TCP/IP, Local Area Networks, Routing Protocols, Network Routing, Digital Communications, OSI Models, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Network Security, Network Planning And Design, Network Architecture, General Networking, Network Performance Management, Computer Networking, Wireless Networks, Software-Defined Networking, Algorithms, System Programming, Data Integrity, Virtualization
In summary, here are 10 of our most popular cyber threat hunting courses
- IT Fundamentals for Cybersecurity:Â IBM
- Introduction to Security Principles in Cloud Computing:Â Google Cloud
- NIST CSF:Â Infosec
- Introduction to the Threat Intelligence Lifecycle :Â IBM
- Moral Foundations of Politics :Â Yale University
- Certified Ethical Hacking (v12):Â LearnKartS
- Cyber Incident Response:Â Infosec
- Leading the Modern Day Business:Â University of Virginia
- Sound the Alarm: Detection and Response:Â Google
- Drug Hunting: The Science of Making New Medicines:Â Novartis