Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
Google Cloud
Skills you'll gain: Threat Detection, Cloud Security, Security Information and Event Management (SIEM), Google Cloud Platform, Security Management, Infrastructure Security, Continuous Monitoring, Configuration Management, Identity and Access Management, Vulnerability Management
Google Cloud
Skills you'll gain: Cloud API, Application Programming Interface (API), Google Cloud Platform, Cloud Security, Load Balancing, Threat Management, Threat Detection
Coursera Project Network
Skills you'll gain: Competitive Analysis, Customer Analysis, Market Analysis, Business Strategy, Market Share, Market Dynamics, Strategic Planning, Supplier Management, New Business Development, Leadership, Entrepreneurship
Skills you'll gain: Cloud Security, Threat Detection, Google Cloud Platform, Threat Management, Cloud Computing, Intrusion Detection and Prevention, Network Security, Firewall, Security Information and Event Management (SIEM), Incident Response, Endpoint Security
- Status: Preview
Coursera Instructor Network
Skills you'll gain: Oracle Cloud, Cloud Security, Threat Detection, Continuous Monitoring, Encryption, Cloud Infrastructure, Infrastructure Security, Network Security, Infrastructure As A Service (IaaS), Cloud Computing, Threat Management, Data Encryption Standard, Identity and Access Management, Data Security, Firewall, Key Management
- Status: New
Kennesaw State University
Skills you'll gain: Endpoint Security, Cyber Security Policies, Cybersecurity, Threat Detection, Cyber Attacks, Security Awareness, Computer Security Awareness Training, Remote Access Systems, Telecommuting, Human Factors (Security), Mobile Security, Malware Protection, Incident Response, Email Security, Virtual Private Networks (VPN)
Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Assessments, Application Programming Interface (API), API Design, Secure Coding, Vulnerability Management, Threat Modeling, Application Security, Authentications, Authorization (Computing), Server Side, Encryption, SQL
Skills you'll gain: Google Cloud Platform, Intrusion Detection and Prevention, Network Monitoring, Network Security, Virtual Machines, Security Information and Event Management (SIEM), Cloud Infrastructure, General Networking, Threat Detection, Network Infrastructure, Load Balancing, System Configuration, Network Analysis
- Status: NewStatus: Free Trial
Skills you'll gain: Network Troubleshooting, Network Administration, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, General Networking, Technical Support and Services, Hardening, Network Infrastructure, Network Protocols, Intrusion Detection and Prevention, Threat Modeling, Identity and Access Management, Authentications, Virtual Local Area Network (VLAN), Encryption, Key Management
- Status: Free
Check Point Software Technologies Ltd.
Skills you'll gain: System Configuration, Firewall, Network Troubleshooting, Security Management, System Monitoring, Network Security, Patch Management, Software Installation, System Implementation, Threat Detection, Identity and Access Management
Google Cloud
Skills you'll gain: Cloud Security, Google Cloud Platform, Cyber Security Policies, Cloud Management, Security Management, Vulnerability Assessments
- Status: New
Skills you'll gain: Generative AI, Cloud Computing Architecture, Systems Architecture, Cloud-Native Computing, Scalability, Solution Architecture, Large Language Modeling, Cloud Platforms, Artificial Intelligence and Machine Learning (AI/ML), Security Engineering, Threat Modeling, System Monitoring, Containerization, MLOps (Machine Learning Operations), Simulations, Disaster Recovery
In summary, here are 10 of our most popular cyber threat hunting courses
- Security Command Center Fundamentals:Â Google Cloud
- Protecting APIs with Apigee X and Cloud Armor:Â Google Cloud
- Using Porter’s Five Forces Model for Competitive Analysis : Coursera Project Network
- Enhanced Network Security Approach on Google Cloud:Â Google Cloud
- Demystifying Oracle Cloud Infrastructure (OCI) Security:Â Coursera Instructor Network
- An Employee's Guide to Cybersecurity:Â Kennesaw State University
- A Detailed Guide to the OWASP Top 10:Â Packt
- Google Cloud Packet Mirroring with OpenSource IDS:Â Google Cloud
- Network Security, Troubleshooting, & Certification Prep:Â Packt
- Check Point Jump Start: Quantum Management:Â Check Point Software Technologies Ltd.