Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
- Status: NewStatus: Preview
Coursera Instructor Network
Skills you'll gain: Project Risk Management, Risk Management, Agile Methodology, Performance Metric, Process Development, Ethical Standards And Conduct
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: DevSecOps, Infrastructure as Code (IaC), Azure DevOps, Secure Coding, DevOps, Security Engineering, Infrastructure Security, Kubernetes, Cybersecurity, API Design, Software Design, Containerization, Machine Learning, Software Architecture, Role-Based Access Control (RBAC), Software Engineering, Git (Version Control System)
- Status: New
Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Threat Management, Cybersecurity, Incident Response, Continuous Monitoring, Vulnerability Assessments, Infrastructure Security, Generative AI Agents
- Status: New
Google Cloud
Skills you'll gain: Cyber Threat Intelligence, Threat Detection, Threat Management, Endpoint Detection and Response, Incident Response, Vulnerability Management, Continuous Monitoring, Interactive Data Visualization, Generative AI Agents, Artificial Intelligence
- Status: NewStatus: Free Trial
Skills you'll gain:
- Status: New
Skills you'll gain: Microsoft 365, Cloud Services, Identity and Access Management, Cloud Computing, Productivity Software, Endpoint Security, Microsoft Teams, Collaborative Software, Software As A Service, Azure Active Directory, Cloud Security, Threat Management, Compliance Management, Technical Support
- Status: New
Skills you'll gain:
- Status: New
Google Cloud
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Large Language Modeling, Application Security, Secure Coding, Security Controls, Prompt Engineering, Cloud Security, Google Cloud Platform, Systems Architecture, Application Programming Interface (API)
- Status: NewStatus: Preview
Macquarie University
Skills you'll gain: Incident Response, Computer Security Incident Management, Incident Management, Cyber Security Strategy, Intrusion Detection and Prevention, Security Management, Threat Detection, Disaster Recovery, Cyber Attacks, Cyber Threat Intelligence, Crisis Management, Cybersecurity, Cyber Security Policies, Cyber Risk, Cyber Security Assessment, Threat Management, Safety and Security, Security Software, Strategic Communication, Regulation and Legal Compliance
- Status: Free Trial
Skills you'll gain: Cybersecurity, Incident Response, Malware Protection, Identity and Access Management, Cyber Attacks, Cyber Threat Intelligence, Network Security, Multi-Factor Authentication, Computer Security Incident Management, Security Controls, Security Awareness, Threat Management, Authentications, Threat Detection, Authorization (Computing), Distributed Denial-Of-Service (DDoS) Attacks, Human Factors (Security)
- Status: Free Trial
Skills you'll gain: Analytical Skills, Data Analysis, Spreadsheet Software, Data Storytelling, Interviewing Skills, Data Presentation, LinkedIn, Dashboard, Business Analysis, Presentations, Portfolio Management, Data Visualization, Data Cleansing, Communication
- Status: Free Trial
Vanderbilt University
Skills you'll gain: Prompt Engineering, ChatGPT, Generative AI, Cyber Threat Intelligence, OpenAI, Data Ethics, Threat Modeling, Cyber Security Strategy, AI Personalization, Information Privacy, Threat Detection, Personally Identifiable Information, Artificial Intelligence, Large Language Modeling, Cyber Security Assessment, Cyber Attacks, Security Awareness, Cybersecurity, Incident Response, Data Security
In summary, here are 10 of our most popular cyber threat hunting courses
- Cybersecurity & Data Privacy for Technical Product Managers: Coursera Instructor Network
- DevSecOps: Macquarie University
- Google Threat Intelligence 한국어: Google Cloud
- Google Threat Intelligence - 繁體中文: Google Cloud
- Certified Ethical Hacker (CEH): Pearson
- Microsoft 365 Fundamentals (MS-900) : Packt
- Practical Cybersecurity Fundamentals: Pearson
- Model Armor: Securing AI Deployments: Google Cloud
- Cyber Response and Recovery: Macquarie University
- Introduction to Cybersecurity Tools & Cyberattacks: IBM