Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat hunting"
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Network Analysis, Document Management, Technical Documentation, Record Keeping
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
- Status: Free
West Virginia University
Skills you'll gain: Auditing, Internal Controls, Financial Controls, Threat Detection, Anomaly Detection, Financial Auditing, Cybersecurity, Financial Data, Investigation, Analytics, Specialized Accounting, Advanced Analytics, Security Awareness, Financial Statement Analysis, Big Data, Business Ethics, Analysis, Data Analysis Software, Ethical Standards And Conduct
Infosec
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Vulnerability Assessments, Application Security, Vulnerability Management, Event Monitoring, Secure Coding, Security Controls, Data Integrity, Security Testing, Cybersecurity, Patch Management, Authorization (Computing), Network Security, Cryptography, Extensible Markup Language (XML), System Configuration, Scripting, Encryption, Software Design
- Status: Free
Coursera Instructor Network
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Assessment, Cybersecurity, Threat Detection, Incident Response, Cyber Operations, Generative AI, Data Ethics, Security Testing, Vulnerability Assessments
Skills you'll gain: Network Security, Encryption, Cybersecurity, Security Awareness, Cyber Attacks, Security Management, Security Strategy, Threat Detection, Firewall, Wireless Networks, Technical Support, Malware Protection, Authentications, Multi-Factor Authentication, Authorization (Computing), Generative AI
Infosec
Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Cybersecurity, Network Security, Cyber Security Strategy, System Monitoring, Cyber Operations, Threat Management, Continuous Monitoring, Cyber Threat Intelligence, Incident Response, Cyber Attacks, Scripting, IT Automation, Network Monitoring, Command-Line Interface, Python Programming, Data Access, Intrusion Detection and Prevention
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Threat Management, Cybersecurity, Cyber Security Strategy, Application Security, Threat Detection, Security Strategy, Microsoft Azure, Cloud Security, Internet Of Things, Secure Coding, Network Security, Computer Security, Security Controls, Vulnerability Assessments, Identity and Access Management
Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Network Architecture, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Intrusion Detection and Prevention, Cyber Threat Intelligence, Computer Networking, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
University of Maryland, College Park
Skills you'll gain: Cybersecurity, Cyber Security Strategy, Cyber Governance, Cyber Risk, Security Strategy, Cyber Security Policies, Security Management, Security Awareness, Personally Identifiable Information, Threat Modeling, Information Privacy, Infrastructure Security, Risk Management, Vulnerability Assessments
Kennesaw State University
Skills you'll gain: Network Security, Security Management, Firewall, Cyber Attacks, Network Monitoring, Cybersecurity, Cyber Security Assessment, Network Protocols, Computer Networking, Virtual Private Networks (VPN), Wireless Networks, Vulnerability Assessments, Cloud Security, Continuous Monitoring, TCP/IP, Intrusion Detection and Prevention, Threat Detection, Mobile Security, Cryptography, Encryption
Searches related to threat hunting
In summary, here are 10 of our most popular threat hunting courses
- Sound the Alarm: Detection and Response:Â Google
- Detecting and Mitigating Cyber Threats and Attacks:Â University of Colorado System
- Forensic Accounting and Fraud Examination:Â West Virginia University
- OWASP Top 10 - 2021:Â Infosec
- GenAI for Cybersecurity Analysts:Â Coursera Instructor Network
- IT Security: Defense against the digital dark arts :Â Google
- Python for Cybersecurity:Â Infosec
- Cybersecurity Threat Vectors and Mitigation:Â Microsoft
- Advanced Cybersecurity Concepts and Capstone Project:Â Microsoft
- Computer Networks and Network Security:Â IBM