Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: Free
Infosec
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Detection, Threat Modeling, MITRE ATT&CK Framework, Endpoint Detection and Response, Cybersecurity, Malware Protection, Security Information and Event Management (SIEM), Anomaly Detection, Generative AI, Network Analysis
- Status: New AI skills
Google
Skills you'll gain: Network Security, Incident Response, Computer Security Incident Management, Hardening, Stakeholder Communications, Intrusion Detection and Prevention, Security Management, Threat Management, Cybersecurity, Network Protocols, Cloud Security, Network Architecture, Event Monitoring, Cyber Risk, TCP/IP, Operating Systems, File Systems, Security Controls, Debugging, Python Programming
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
Skills you'll gain: Penetration Testing, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Vulnerability Assessments, Network Security, Threat Detection, Vulnerability Scanning, Security Awareness, Cyber Threat Intelligence, Malware Protection, Intrusion Detection and Prevention, Cybersecurity, Data Security, Application Security, Cyber Attacks, Web Applications, Computer Security Awareness Training, Data Integrity, Incident Response
Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Cyber Threat Intelligence, Threat Detection, Security Strategy, Intrusion Detection and Prevention, Threat Management, Cybersecurity, Continuous Monitoring, Security Information and Event Management (SIEM), Technical Communication
New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Threat Detection, Information Systems Security, Network Security, Computer Security, Malware Protection
- Status: Free
The State University of New York
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Policies, Cybersecurity, International Relations, Cyber Risk, Cyber Operations, Cyber Governance, Infrastructure Security, Law, Regulation, and Compliance, Security Management, Political Sciences, Media and Communications, Computer Networking, Psychology
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cyber Threat Hunting, Incident Management, Cybersecurity, Security Management, Security Information and Event Management (SIEM), Data Integrity
- Status: AI skills
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Cloud Security, Threat Management, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
Kennesaw State University
Skills you'll gain: Network Security, Incident Response, Vulnerability Management, Cybersecurity, Contingency Planning, Cyber Governance, Cyber Attacks, Disaster Recovery, Computer Security Incident Management, Cyber Security Policies, Security Management, Firewall, Network Monitoring, General Networking, Cyber Security Strategy, Crisis Management, Vulnerability Assessments, Cyber Security Assessment, Cyber Risk, Risk Management
Infosec
Skills you'll gain: Penetration Testing, Cyber Security Policies, Linux Commands, Cyber Security Assessment, Command-Line Interface, Cybersecurity, Cloud Computing, Linux, Risk Management Framework, Network Monitoring, Security Management, Operating Systems, Cyber Risk, Cloud Services, Cloud Platforms, General Networking, Windows PowerShell, Cyber Governance, Unix Commands, Cyber Security Strategy
Skills you'll gain: Network Security, Incident Response, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Configuration Management, Cybersecurity, Security Awareness, Security Management, Computer Security Incident Management, Cyber Attacks, Data Security, Infrastructure Security, Risk Management Framework, Event Monitoring, Encryption, Role-Based Access Control (RBAC), Authorization (Computing)
In summary, here are 10 of our most popular cyber threat hunting courses
- Cyber Threat Hunting:Â Infosec
- Google Cybersecurity:Â Google
- Penetration Testing, Threat Hunting, and Cryptography:Â IBM
- Cybersecurity Attack and Defense Fundamentals:Â EC-Council
- Advanced Threat Hunting and Incident Response:Â LearnQuest
- Introduction to Cyber Attacks:Â New York University
- International Cyber Conflicts:Â The State University of New York
- Incident Response and Digital Forensics:Â IBM
- Microsoft Cybersecurity Analyst:Â Microsoft
- Managing Cybersecurity:Â Kennesaw State University