Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
University of Virginia
Skills you'll gain: Design Thinking, Digital Transformation, Creative Problem-Solving, New Product Development, Ideation, Business Transformation, Product Management, Technology Strategies, Agile Product Development, Innovation, Creativity, Product Lifecycle Management, Strategic Thinking, Product Improvement, Human Centered Design, Information Technology, Competitive Analysis, Business Analysis, Business Strategy, Cyber Risk
Microsoft
Skills you'll gain: Penetration Testing, Security Testing, System Testing, Vulnerability Management, Cloud Security, Cybersecurity, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Microsoft Azure, Firewall, Virtual Private Networks (VPN)
EC-Council
Skills you'll gain: Penetration Testing, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Vulnerability Assessments, Network Security, Threat Detection, Vulnerability Scanning, Security Awareness, Cyber Threat Intelligence, Cybersecurity, Intrusion Detection and Prevention, Cyber Attacks, Application Security, Web Applications, Mobile Security, Internet Of Things, Authentications, Encryption, Wireless Networks
Skills you'll gain: Cyber Threat Intelligence, Security Information and Event Management (SIEM), Generative AI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Natural Language Processing, Anomaly Detection, Vulnerability Management, Incident Management, Artificial Intelligence
Skills you'll gain: Cybersecurity, Technical Support and Services, Information Technology, Network Security, Cyber Security Strategy, Computer Security Awareness Training, Application Security, Security Management
Skills you'll gain: Incident Response, Computer Security Incident Management, Intrusion Detection and Prevention, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Record Keeping, Network Analysis, Splunk, Technical Documentation, TCP/IP, Network Protocols
Skills you'll gain: Cyber Threat Intelligence, Threat Management, Threat Detection, Data Quality, Data Security, Technical Communication, Automation, Requirements Analysis, Machine Learning
University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Cybersecurity, Computer Networking, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks, Cyber Risk
Skills you'll gain: ChatGPT, Generative AI, Cyber Threat Intelligence, Security Information and Event Management (SIEM), OpenAI, Threat Detection, Cybersecurity, Incident Response, Malware Protection, Artificial Intelligence, Natural Language Processing, IBM Cloud, Artificial Intelligence and Machine Learning (AI/ML), Anomaly Detection, Vulnerability Management, Software Development Tools, Augmented and Virtual Reality (AR/VR), Deep Learning, Image Analysis, Technical Communication
- Status: Free
Stanford University
Skills you'll gain: Physics, Timelines, Scientific Methods, Research, Experimentation, Mechanics, Mathematical Modeling
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Network Planning And Design, Network Protocols, Network Model, Cloud Computing, TCP/IP
Johns Hopkins University
Skills you'll gain: Electronic Medical Record, Patient Safety, Health Information Management and Medical Records, Personally Identifiable Information, Encryption, Help Desk Support, Desktop Support, System Support, Technical Support and Services, End User Training and Support, Healthcare Industry Knowledge, Decision Support Systems, Health Care Procedure and Regulation, Computerized Physician Order Entry, Data Security, Health Care, Technical Support, Cyber Attacks, Health Systems, Information Technology Operations
In summary, here are 10 of our most popular cyber threat hunting courses
- Leading the Modern Day Business:Â University of Virginia
- Cybersecurity Tools and Technologies:Â Microsoft
- Ethical Hacking Essentials (EHE):Â EC-Council
- Generative AI: Boost Your Cybersecurity Career :Â IBM
- Introduction to Cybersecurity Careers:Â IBM
- Sound the Alarm: Detection and Response:Â Google
- Introduction to the Threat Intelligence Lifecycle :Â IBM
- Cyber Security – Technology and Governance: University of London
- IBM Generative AI for Cybersecurity Professionals:Â IBM
- Understanding Einstein: The Special Theory of Relativity:Â Stanford University