Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat hunting"
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Network Analysis, Document Management, Technical Documentation, Record Keeping
Kennesaw State University
Skills you'll gain: Risk Management, Cyber Governance, Cost Benefit Analysis, Security Management, Risk Management Framework, Vulnerability Management, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Operational Risk, Risk Analysis, Enterprise Risk Management (ERM), Business Risk Management, Risk Mitigation, Cyber Threat Intelligence, Vulnerability Assessments, ISO/IEC 27001, Threat Detection, Risk Modeling
- Status: [object Object]
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Cloud Security, Threat Management, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
- Status: Free
University of Maryland, College Park
Skills you'll gain: Cyber Risk, Cyber Security Policies, Security Management, Cybersecurity, Risk Management, Cyber Security Strategy, Cyber Attacks, Cyber Governance, Computer Security Awareness Training, Threat Detection, General Networking, Vulnerability
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Cybersecurity, Security Strategy, Risk Management Framework, Security Controls, Enterprise Security, Information Privacy
Kennesaw State University
Skills you'll gain: Network Security, Security Management, Firewall, Cyber Attacks, Network Monitoring, Cybersecurity, Cyber Security Assessment, Network Protocols, Computer Networking, Virtual Private Networks (VPN), Wireless Networks, Vulnerability Assessments, Cloud Security, Continuous Monitoring, TCP/IP, Intrusion Detection and Prevention, Threat Detection, Mobile Security, Cryptography, Encryption
- Status: Free
Universiteit Leiden
Skills you'll gain: Public Safety and National Security, Research, Research Methodologies, Policy Analysis, Media and Communications, Social Studies, International Relations, Political Sciences, Trend Analysis, Investigation, Psychology
L&T EduTech
Skills you'll gain: Engineering Drawings, Plumbing, Construction Engineering, Structural Analysis, Design Specifications, Hydraulics, Mechanical Design, Blueprint Reading, Civil Engineering, Failure Analysis, Manufacturing Standards, Engineering Analysis, Engineering Calculations, Engineering Practices, Mechanical Engineering, Facility Repair And Maintenance, Safety Assurance, Process Flow Diagrams, Process Analysis, Process Engineering
Skills you'll gain: Interviewing Skills, Data Analysis, Data Processing, Analytical Skills, Artificial Intelligence, Business Analytics, R Programming, Recruitment, Data-Driven Decision-Making, Data Storytelling, Project Documentation, Presentations, Portfolio Management
Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Incident Response, Cyber Threat Hunting, Key Management, Data Security, Threat Modeling, Computer Security Incident Management, File Systems, Threat Detection, Endpoint Security, Cryptography, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Linux, Malware Protection, Encryption, Cyber Threat Intelligence, Incident Management, Information Systems Security, Threat Management
Skills you'll gain: Cloud Computing, Linux, Linux Servers, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Security Controls, Virtual Machines, Firewall, Virtualization, User Accounts
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
Searches related to threat hunting
In summary, here are 10 of our most popular threat hunting courses
- Sound the Alarm: Detection and Response:Â Google
- Cybersecurity Risk Management Frameworks:Â Kennesaw State University
- Microsoft Cybersecurity Analyst:Â Microsoft
- Cybersecurity for Everyone:Â University of Maryland, College Park
- The GRC Approach to Managing Cybersecurity:Â Kennesaw State University
- Managing Network Security:Â Kennesaw State University
- Terrorism and Counterterrorism: Comparing Theory and Practice:Â Universiteit Leiden
- Design of Industrial Piping Systems:Â L&T EduTech
- Google Data Analytics Capstone: Complete a Case Study:Â Google
- Cybersecurity Operations Fundamentals:Â Cisco Learning and Certifications