Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat hunting"
- Status: New
Skills you'll gain: Mobile Security, Open Web Application Security Project (OWASP), Network Security, Wireless Networks, Cryptography, Encryption, Penetration Testing, Application Security, Intrusion Detection and Prevention, Web Applications, Vulnerability Assessments, Infrastructure Security, Threat Detection, Internet Of Things, Cloud Security
Skills you'll gain: Cloud Security, Security Management, Data Management, Records Management, Cloud Computing Architecture, Data Security, General Data Protection Regulation (GDPR), Cloud Computing, Data Governance, Personally Identifiable Information, Information Privacy, Threat Detection, Microsoft Azure, Cybersecurity, Security Controls
- Status: Free
DeepLearning.AI
Skills you'll gain: Security Testing, Threat Modeling, Application Security, Continuous Monitoring, Security Engineering, Threat Detection, System Monitoring, Personally Identifiable Information, Generative AI, Data Security
University of Michigan
Skills you'll gain: Debugging, Unit Testing, Integrated Development Environments, Development Testing, Development Environment, Technical Communication, Computer Programming, Python Programming, File Management
Skills you'll gain: Application Security, Hardware Architecture, Security Engineering, Security Controls, Internet Of Things, Encryption, Secure Coding, Vulnerability Assessments, Cloud Security, Threat Modeling, Data Security, Security Requirements Analysis, Vulnerability Management, General Data Protection Regulation (GDPR), Personally Identifiable Information, Cryptography, Information Privacy, Authentications, Authorization (Computing)
- Status: New
Skills you'll gain: Endpoint Security, Multi-Factor Authentication, Patch Management, Network Security, Information Systems Security, Cybersecurity, Network Monitoring, Data Security, Authentications, Malware Protection, Mobile Security, Continuous Monitoring, Authorization (Computing), Identity and Access Management
- Status: New
Skills you'll gain: Threat Detection, Vulnerability Management, Cyber Threat Hunting, Vulnerability Assessments, Cloud Security, Multi-Cloud, Threat Management, Google Cloud Platform
Skills you'll gain: Remote Access Systems, Threat Detection, Information Technology Operations, Wireless Networks, Network Security, Mobile Security, Information Systems Security, Virtual Private Networks (VPN), General Networking, Cybersecurity, Network Administration, Network Troubleshooting, Document Management, Data Security, Malware Protection, Augmented and Virtual Reality (AR/VR), Emerging Technologies, Change Control, Encryption, Multi-Factor Authentication
- Status: NewStatus: Free
Coursera Instructor Network
Skills you'll gain: Cloud Security, Oracle Cloud, Identity and Access Management, Encryption, Infrastructure Security, Network Security, Data Security, Continuous Monitoring, Security Controls, Cloud Computing, Cloud Infrastructure, Security Strategy, Threat Detection, Data Encryption Standard, Authorization (Computing), Authentications
University of Colorado Boulder
Skills you'll gain: Diversity Awareness, Teaching, Diversity Equity and Inclusion Initiatives, Pedagogy, Cultural Responsiveness, Cultural Diversity, Advocacy, Social Justice, Parent Communication, Student Engagement, Community Outreach, Curriculum Planning, Rapport Building
- Status: New
Google Cloud
Skills you'll gain: Firewall, Network Security, Cloud Security, Cloud Infrastructure, Threat Modeling, Cloud Management, Network Monitoring
Skills you'll gain: Incident Response, Email Security, Computer Security Incident Management, Cyber Operations, Threat Detection, Security Information and Event Management (SIEM), IT Automation, Google Cloud Platform
Searches related to threat hunting
In summary, here are 10 of our most popular threat hunting courses
- Advanced Network Attacks, Web Hacking, and Cryptography:Â Packt
- Cybersecurity Planning, Management, and Compliance:Â Microsoft
- Quality and Safety for LLM Applications:Â DeepLearning.AI
- Debugging: Hunting and Squashing Bugs:Â University of Michigan
- Implementing Security in IoT and Edge Devices:Â LearnQuest
- Comprehensive Cisco Security Techniques and Automation:Â Packt
- Getting Started with Security Command Center Enterprise:Â Google Cloud
- Advanced Networking, Security, and IT Operations:Â Packt
- Demystifying Oracle Cloud Infrastructure (OCI) Security:Â Coursera Instructor Network
- Teaching for Justice and Inclusivity In Challenging Times:Â University of Colorado Boulder