Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber threat hunting"
Google Cloud
Skills you'll gain: Cloud Security, Google Cloud Platform, Cyber Security Policies, Cloud Management, Security Management, Vulnerability Assessments
- Status: New
Skills you'll gain: Security Testing, Vulnerability Scanning, Secure Coding, Data Security, Application Security, Cyber Security Assessment, Vulnerability Assessments, Web Applications, Web Servers, Information Privacy, SQL
Skills you'll gain: AWS Identity and Access Management (IAM), Amazon Web Services, Penetration Testing, Identity and Access Management, Vulnerability Assessments, Cloud Security, Amazon Elastic Compute Cloud, Cloud API, Exploitation techniques, Cyber Security Policies, Amazon S3, Scenario Testing, Command-Line Interface, Cloud Storage
- Status: New
Packt
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Vulnerability Assessments, Data Security, Cybersecurity, Exploitation techniques, Test Tools, User Requirements Documents, Authorization (Computing), Technical Documentation, Computing Platforms, Requirements Analysis, Command-Line Interface, Technical Communication
- Status: Preview
University of Michigan
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Security Strategy, Policy Analysis, Public Policies, Vulnerability, Threat Detection, Human Factors, Human Computer Interaction, Technology Strategies, Emerging Technologies
- Status: NewStatus: Free Trial
Skills you'll gain: Application Security, Cloud Applications, Cloud Security, Identity and Access Management, Secure Coding, Security Awareness, Threat Modeling, Security Testing, Data Security, Software Development, Verification And Validation, Software Quality Assurance, Threat Management, Single Sign-On (SSO), Authentications, Multi-Factor Authentication
Skills you'll gain: Incident Response, Computer Security Incident Management, Cybersecurity, Google Cloud Platform, Malware Protection, Threat Detection, Security Information and Event Management (SIEM)
- Status: Free Trial
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Data Loss Prevention, Cloud Security, Malware Protection, Continuous Monitoring, Vulnerability Management, Data Security, System Monitoring, Security Management, Security Information and Event Management (SIEM), Threat Detection, Information Privacy
- Status: NewStatus: Free Trial
Skills you'll gain: Vulnerability Management, Authentications, Security Controls, Vulnerability Assessments, Authorization (Computing), Continuous Monitoring, Identity and Access Management, Security Management, Information Systems Security, Role-Based Access Control (RBAC), Network Security, User Accounts, Multi-Factor Authentication, Threat Detection
- Status: New
Google Cloud
Skills you'll gain: LLM Application, Threat Modeling, Open Web Application Security Project (OWASP), Large Language Modeling, Secure Coding, Security Controls, Security Software, Security Information and Event Management (SIEM), Application Programming Interface (API), System Configuration
- Status: Preview
Universiteit Leiden
Skills you'll gain: Risk Management, Safety and Security, Threat Management, Public Safety and National Security, Security Strategy, Case Studies, Crisis Management, Cybersecurity, International Relations, Governance, Environmental Issue, Cultural Diversity, Complex Problem Solving
- Status: Preview
Erasmus University Rotterdam
Skills you'll gain: Cyber Governance, Governance, Law, Regulation, and Compliance, Data Governance, Legal Technology, Court Systems, Political Sciences, Regulation and Legal Compliance, Market Dynamics, General Data Protection Regulation (GDPR), Emerging Technologies, Compliance Management, Governance Risk Management and Compliance, Data Ethics, Digital Transformation, Public Administration, Information Privacy, Economics, Policy, and Social Studies, Social Sciences, Decision Making
In summary, here are 10 of our most popular cyber threat hunting courses
- Securing Google Cloud with CFT Scorecard: Google Cloud
- Web Application Security Testing with Google Hacking: Packt
- Introduction to AWS Pentesting: Packt
- Practical Pentesting : Packt
- 디지털 민주주의의 명암: University of Michigan
- Certified Cloud Security Professional (CCSP): Unit 4: Pearson
- Responding to Post-Intrusion Ransomware with Cortex XSOAR: Google Cloud
- Mitigating Security Vulnerabilities on Google Cloud 日本語版: Google Cloud
- (SSCP) Systems Security Certified Practitioner: Unit 3: Pearson
- Model Armor: Securing AI Deployments: Google Cloud