Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "threat hunting"
- Status: NewStatus: Free
Coursera Project Network
Skills you'll gain: Network Protocols, Network Performance Management, Network Monitoring, Network Troubleshooting, Threat Detection, Network Analysis, TCP/IP, Web Servers, Network Security
Skills you'll gain: IT Security Architecture, Information Systems Security Assessment Framework (ISSAF), Information Systems Security, Systems Architecture, Zero Trust Network Access, Risk Management Framework, Security Requirements Analysis, Application Security, Computer Security, Threat Modeling, Cybersecurity, Security Management, Vulnerability Assessments, Network Security, Solution Architecture, Security Strategy, Security Controls, Data Security, Cyber Security Assessment, Cyber Risk
- Status: New
Kennesaw State University
Skills you'll gain: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Personally Identifiable Information, Threat Detection, Information Privacy, Safety and Security, Multi-Factor Authentication
Google Cloud
Skills you'll gain: Google Cloud Platform, Cloud Computing, Cloud Security, Generative AI, Vulnerability Assessments, Security Controls, Threat Detection, Security Management
Institut Mines-Télécom
Skills you'll gain: Threat Modeling, Threat Detection, Security Requirements Analysis, Cybersecurity, Cyber Attacks, Application Security, Security Testing, Vulnerability Assessments, Secure Coding, SQL, Databases
- Status: New
Skills you'll gain: Zero Trust Network Access, Threat Management, DevSecOps, Threat Modeling, Endpoint Security, Identity and Access Management, Application Security, Data Security, Security Management, IT Security Architecture, Threat Detection, Infrastructure Security, Cyber Security Strategy, Cloud Security, Cybersecurity, Microsoft Azure, Azure Active Directory, IT Automation, Incident Management, Cyber Security Assessment
Skills you'll gain: Incident Response, IT Security Architecture, Identity and Access Management, Continuous Monitoring, Network Security, Security Awareness, Information Systems Security, Security Information and Event Management (SIEM), Application Security, Disaster Recovery, Security Controls, Cloud Security, Cyber Security Strategy, Threat Detection, Cyber Governance, Risk Management Framework, Authentications
Google Cloud
Skills you'll gain: Kubernetes, Threat Modeling, Hardening, Verification And Validation, Google Cloud Platform, Security Controls, Vulnerability Assessments, Infrastructure Security
Skills you'll gain: Penetration Testing, Linux, Linux Commands, Network Security, General Networking, Intrusion Detection and Prevention, Network Administration, Cybersecurity, Command-Line Interface, Threat Detection, System Configuration, Software Installation, Network Analysis, Virtual Machines
- Status: New
Skills you'll gain: Cybersecurity, Incident Response, Cryptography, Information Systems Security, Network Security, Encryption, Security Controls, Vulnerability Assessments, Risk Management Framework, Infrastructure Security, Penetration Testing, Cloud Security, Intrusion Detection and Prevention, Authorization (Computing), Firewall, Identity and Access Management, Linux, Microsoft Windows
LearnQuest
Skills you'll gain: Event Monitoring, General Networking, Network Architecture, Systems Integration, Incident Response, Computer Security Incident Management, Threat Management, Cybersecurity, Security Management, Networking Hardware, Information Technology, Cloud-Based Integration, Network Security, Firewall, Data Governance, Network Routers, Data Management, Command-Line Interface, Security Strategy, Enterprise Security
- Status: New
Skills you'll gain: Vulnerability Management, Cybersecurity, Risk Analysis, Risk Management, Authentications, Network Security, Disaster Recovery, Cloud Security, Incident Response, Security Management, Business Continuity Planning, Application Security, Information Systems Security, Risk Management Framework, Vulnerability Assessments, Threat Modeling, Data Security, Cyber Risk, Identity and Access Management, Security Awareness
Searches related to threat hunting
In summary, here are 10 of our most popular threat hunting courses
- Wireshark for Packet Capture: Analyze web traffic:Â Coursera Project Network
- Fundamentals of Information System Security Architecture:Â LearnQuest
- Cybersecurity: What to Do When You Are a Victim:Â Kennesaw State University
- Gemini for Security Engineers:Â Google Cloud
- Cybersécurité : comment sécuriser un site web: Institut Mines-Télécom
- Microsoft Cybersecurity Architect - SC-100 Exam Prep:Â Packt
- Managing Information System Security Architecture:Â LearnQuest
- Hardening Default GKE Cluster Configurations:Â Google Cloud
- Learn Man in the Middle Attacks from Scratch:Â Packt
- GIAC Security Essentials (GSEC):Â Packt