Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat analysis"
- Status: Free
Infosec
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Detection, Threat Modeling, MITRE ATT&CK Framework, Endpoint Detection and Response, Cybersecurity, Malware Protection, Security Information and Event Management (SIEM), Anomaly Detection, Generative AI, Network Analysis
- Status: [object Object]
Google
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Security Controls, Vulnerability Management, Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Vulnerability Assessments, Event Monitoring, Network Security, Security Awareness, Threat Detection, Risk Management, Cybersecurity, Hardening, Bash (Scripting Language), Data Ethics, Linux Commands, Debugging
Skills you'll gain: Jupyter, Automation, Web Scraping, Python Programming, Data Manipulation, Data Import/Export, Scripting, Data Structures, Data Processing, Data Collection, Application Programming Interface (API), Pandas (Python Package), Programming Principles, NumPy, Object Oriented Programming (OOP), Computer Programming
Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Penetration Testing, Threat Detection, Cryptography, Security Testing, Application Security, Encryption, Code Review, Vulnerability Scanning, Vulnerability Assessments, Artificial Intelligence
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
- Status: [object Object]
Microsoft
Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, Penetration Testing, Azure Active Directory, Network Security, Computer Systems, Security Information and Event Management (SIEM), Security Testing, Encryption, Cybersecurity, Cyber Security Strategy, System Testing, Cloud Security, Threat Management, Cloud Computing, Business Software, Cyber Attacks, Authentications, Active Directory, Data Management
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
- Status: Free
The State University of New York
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Policies, Cybersecurity, International Relations, Cyber Risk, Cyber Operations, Cyber Governance, Infrastructure Security, Law, Regulation, and Compliance, Security Management, Political Sciences, Media and Communications, Computer Networking, Psychology
Skills you'll gain: Excel Formulas, Microsoft Excel, Data Cleansing, Data Analysis, Data Import/Export, Spreadsheet Software, Data Quality, Pivot Tables And Charts, Google Sheets, Data Entry, Data Manipulation, Information Privacy
Skills you'll gain: Big Data, Data Analysis, Statistical Analysis, Apache Hadoop, Apache Hive, Data Collection, Data Mart, Data Warehousing, Data Storytelling, Apache Spark, Data Cleansing, Data Lakes, Data Visualization Software, SQL
Skills you'll gain: Data Wrangling, Data Cleansing, Data Analysis, Data Manipulation, Data Transformation, Data Import/Export, Exploratory Data Analysis, Predictive Analytics, Statistical Analysis, Regression Analysis, Predictive Modeling, Pandas (Python Package), Scikit Learn (Machine Learning Library), Statistical Modeling, Machine Learning Methods, Feature Engineering, Python Programming, Data Pipelines, NumPy
- Status: [object Object]
Microsoft
Skills you'll gain: Data Storytelling, Dashboard, Excel Formulas, Extract, Transform, Load, Power BI, Data Analysis Expressions (DAX), Microsoft Excel, Data Modeling, Data-Driven Decision-Making, Star Schema, Data Analysis, Data Presentation, Data Visualization Software, Microsoft Power Platform, Data Integrity, Spreadsheet Software, Data Validation, Data Transformation, Data Cleansing, Data Visualization
In summary, here are 10 of our most popular cyber threat analysis courses
- Cyber Threat Hunting: Infosec
- Google Cybersecurity: Google
- Python for Data Science, AI & Development: IBM
- Penetration Testing, Threat Hunting, and Cryptography: IBM
- IT Fundamentals for Cybersecurity: IBM
- Microsoft Cybersecurity Analyst: Microsoft
- IBM Cybersecurity Analyst: IBM
- International Cyber Conflicts: The State University of New York
- Excel Basics for Data Analysis: IBM
- Introduction to Data Analytics: IBM