Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat hunting"
Skills you'll gain: Cybersecurity, Network Security, Cyber Attacks, Cryptography, Threat Modeling, Information Systems Security, Identity and Access Management, Firewall, Encryption, Threat Detection, Public Key Infrastructure, Infrastructure Security, Security Controls, Authentications, Risk Management Framework, Authorization (Computing)
Skills you'll gain: Interviewing Skills, Professional Networking, Presentations, LinkedIn, Cybersecurity, Applicant Tracking Systems, Market Research, Social Media, Business Research, Recruitment, Portfolio Management, Negotiation, Company, Product, and Service Knowledge, Writing, Talent Recruitment, Compensation Strategy, Communication, Branding
University of Minnesota
Skills you'll gain: Enterprise Resource Planning, Business Systems Analysis, Systems Analysis, Requirements Analysis, Cybersecurity, Business Requirements, Business Systems, Cyber Threat Intelligence, Cloud Computing, Cloud Services, IT Management, Change Management, Business Technologies, Organizational Change, Technology Strategies, System Implementation, User Requirements Documents, Information Technology, Portfolio Management, Governance
Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Network Architecture, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Intrusion Detection and Prevention, Cyber Threat Intelligence, Computer Networking, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
University of Michigan
Skills you'll gain: Computational Thinking, Programming Principles, Problem Solving, Computer Science, Disaster Recovery, Algorithms, Threat Detection, Epidemiology
Novartis
Skills you'll gain: Pharmaceuticals, Clinical Research, Medical Science and Research, Bioinformatics, Healthcare Industry Knowledge
Skills you'll gain: Vulnerability Management, Azure Active Directory, Cloud Security, Distributed Denial-Of-Service (DDoS) Attacks, Penetration Testing, Generative AI, Vulnerability Scanning, Vulnerability Assessments, Intrusion Detection and Prevention, Single Sign-On (SSO), Microsoft Azure, Security Management, Cyber Security Policies, Identity and Access Management, Data Management, Records Management, Authentications, System Monitoring, Data Ethics, ChatGPT
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon CloudWatch, Threat Detection, Amazon Web Services, Incident Response, Continuous Monitoring, Cloud Security, Data Security, Identity and Access Management, Amazon Elastic Compute Cloud, Network Security, Cloud Computing
Skills you'll gain: Vulnerability Assessments, Risk Management, Continuous Monitoring, Operational Risk, Threat Management, Intrusion Detection and Prevention, Cyber Risk, Vulnerability Management, Security Controls, Enterprise Risk Management (ERM), Risk Mitigation, Risk Analysis, Compliance Management, Security Information and Event Management (SIEM), Technical Communication, Auditing
Kennesaw State University
Skills you'll gain: Internet Of Things, Cybersecurity, Cyber Security Strategy, Mobile Security, Security Awareness, Wireless Networks, Information Privacy, Network Security, Data Security, Emerging Technologies, Risk Management Framework
Skills you'll gain: Encryption, Cybersecurity, Cyber Security Strategy, Cyber Attacks, Threat Management, Authentications, Threat Detection, Network Security, Authorization (Computing), Cryptography, Data Security, Active Directory, Identity and Access Management, Firewall, Multi-Factor Authentication
- Status: Free
Coursera Instructor Network
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Data Security, Threat Modeling, Personally Identifiable Information, Malware Protection, Email Security, Incident Response
Searches related to threat hunting
In summary, here are 10 of our most popular threat hunting courses
- Security Foundations, Threats, and Network Protection:Â Packt
- Cybersecurity Job Search, Resume, and Interview Prep:Â IBM
- Information​ ​Systems: University of Minnesota
- Computer Networks and Network Security:Â IBM
- Problem Solving Using Computational Thinking:Â University of Michigan
- Targets, Assays & Screening:Â Novartis
- Microsoft Azure Cybersecurity Tools and Solutions:Â Microsoft
- AWS: Threat Detection, Logging and Monitoring:Â Whizlabs
- Risk Identification, Monitoring, and Analysis:Â ISC2
- Cybersecurity and the Internet of Things:Â Kennesaw State University